Crypto-Stego: A Hybrid Method for Encrypting Text Messages or Text Files within Images Using AES and LSB Algorithms

Authors

  • Harshal V. Patil, Vaibhav P. Sonaje

Keywords:

Cryptography, Steganography, Cover-Image, Stego-Image, Plain-Text, Cipher Text, AES, LSB, PSNR, MSE, SNR.

Abstract

In recent times, the volume of data transferred over the internet has expanded globally, resulting in increased data security concerns. The security of data is of paramount importance to both individuals and business owners. Cryptography and steganography are two primary data security techniques. Cryptography is used to encrypt secret messages, while steganography conceals secret messages within digital media and images. The present paper implements a secure model that integrates the Advanced Encryption Standard (AES) and Least Significant Bit (LSB) algorithms in instruction to deliver enhanced safety, data protection, and user-friendliness. AES is utilized in cryptography, while LSB is utilized in steganography. The combination of both algorithms guarantees that data remains completely secure and protected. The proposed solution entails a comprehensive analysis of various encryption techniques, which enables a more effective and secure encryption method. By incorporating different encryption mechanisms, the paper presents a thorough analysis that demonstrates its suitability and effectiveness. In conclusion, the paper's contribution to the field of encryption is substantial, and it provides a valuable framework for future research.

Downloads

Download data is not yet available.

References

Guo, L., B. Yan & Y. Shen 2010. Study on Secure System Architecture of IOT. Information Security and Communications Privacy 12: 042.

Saraireh, S., Al-Saraireh, J. A. A. F. E. R., Al-Sbou, Y. A. Z. E. E. D., & Saraireh, M.(2018). A Hybrid Text-Image Security Technique. Journal of Theoretical & Applied Information Technology, 96(9).

Zmudzinski, S., B. Munir & M. Steinebach 2012. Digital audio authentication by robust feature embedding. IS&T/SPIE Electronic Imaging. pp. 83030I-83030I-7.

Rainie, L., S. Kiesler, R. Kang, M. Madden, M. Duggan, S. Brown & L. Dabbish 2013. Anonymity, privacy, and security online. Pew Research Center.

Kothmayr, T., C. Schmitt, W. Hu, M. Brünig & G. Carle 2013. DTLS based security and two-way authentication for the Internet of Things. Ad Hoc Networks 11(8): 2710-2723.

Sreekutty, M. S., & Baiju, P. S. (2017, April). Security enhancement in image steganography for medical integrity verification system. In Circuit, Power and Computing Technologies (ICCPCT), 2017 International Conference on (pp. 1-5). IEEE.

Al-Saraireh, J. A. (2017). Hvm: A Method For Improving The Performance Of Executing Sql-Query Over Encrypted Database. Journal Of Theoretical & Applied Information Technology, 95(14).

Tirthani, N. & R. Ganesan 2014. Data Security in Cloud Architecture Based on Diffie Hellman and Elliptical Curve Cryptography. IACR Cryptology ePrint Archive 2014:49

Al Hasib, A. & A. A. M. M. Haque 2008. A comparative study of the performance and security issues of AES and RSA cryptography. Convergence and Hybrid Information Technology, 2008. ICCIT'08. Third International Conference on. 2 pp. 505-510.

Inzunza-González, E., C. Cruz-Hernández, R. López-Gutiérrez, E. García-Guerrero, L. Cardoza-Avendaño & H. Serrano-Guerrero 2009. Software to Encrypt Messages Using Public-Key Cryptography. World Academy of Science, Engineering and Technology 54.

Goshwe, N. Y. (2013). "Data Encryption and Decryption Using RSA Algorithm in a Network Environment." IJCSNS 13(7): 10.

Chang, C.-C. & C.-Y. Lee 2013. A Smart Card-based Authentication Scheme Using User Identify Cryptography. IJ Network Security 15(2): 139-147.

Dhillon.J 2014. Symmetric and Asymmetric Cryptography Algorithm for Improving Data Security. International Journal of Scientific Engineering and Technology Volume No.3 (Issue No.8): 1123-1125.

Adale, D. A. 2011. Hybrid Information Security Models: Crypto-Steg And Steg-Crypto

Systems.Tesis HOWARD UNIVERSITY.Washington.

Rahim, R., Nurdiyanto, H., Hidayat, R., Ahmar, A. S., Siregar, D., Siahaan, A. P. U.,

Zamsuri, A. (2018). Combination Base64 Algorithm and EOF Technique for Steganography.

Paper presented at the Journal of Physics: Conference Series.

Abood, M. H. (2017, March). An efficient image cryptography using hash-LSB steganography with RC4 and pixel shuffling encryption algorithms. In New Trends in Information & Communications Technology Applications (NTICT), 2017 Annual Conference on (pp. 86-90). IEEE.

Parah, S. A., Sheikh, J. A., Akhoon, J. A., Loan, N. A., & Bhat, G. M. (2018). Information hiding in edges: a high capacity information hiding technique using hybrid edge detection. Multimedia Tools and Applications, 77(1), 185-207.

Saraireh S. S., Saraireh M. S., Saraireh S. S., and Saraireh M. S. (2017, Feb), “Filter Bank Block Cipher and LSB Based Steganography for Secure Data Exchange,” Int. J. Commun. Antenna Propag., vol. 7, no. 1, p. 1

Taha M S, et al. “Combination of Steganography and Cryptography: A short Survey”, 2nd International Conference on Sustainable Engineering Techniques (ICSET 2019), IOP Conf. Series: Materials Science and Engineering, 518 (2019), doi:10.1088/1757-899X/518/5/05200.

Douglas M, Bailey K, Leeney M and Curran K, “An overview of steganography techniques applied to the protection of biometric data”, Multimedia Tools and Applications, July 2018, Volume 77, Issue 13, pp 17333–17373.

AL-Shaaby A and AlKharobi T, “Cryptography and Steganography: New Approach”, Transactions on Networks and Communications. Volume 5 No. 6, December (2017); pp: 25-38.

Arya A and Soni S, “A Literature Review on Various Recent Steganography Techniques”, International Journal on Future Revolution in Computer Science & Communication Engineering, ISSN: 2454-4248 Volume: 4 Issue: 1, January 2018 pp: 143 – 149.

KASAPBAS M and ELMASRY W, “New LSB-based colour image steganography method to enhance the efficiency in payload capacity, security and integrity check”, Sådhanå, (2018), 43:68 Indian Academy of Sciences, https://doi.org/10.1007/s12046-018-0848-4.

Pelosi M, Poudel N, Lamichhane P, and Soomro D, “Steganography System with Application to Crypto-Currency Cold Storage and Secure Transfer”, Advances in Science, Technology and Engineering Systems Journal, Vol. 3, No. 2, 271-282 (2018), ISSN: 2415-6698.

Rahmani K, et al., “A Crypto-Steganography: A Survey”, (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 5, No. 7, 2014, pp 149-155, www.ijacsa.thesai.org.

Aung P P and Naing T M, “A novel secure combination technique of steganography and cryptography”, International Journal of Information Technology, Modeling and Computing (IJITMC), 2014, 2, pp: 55-62.

. Ria Das, Indrajit Das (2016). Secure Data Transfer in IoT environment: adopting both Cryptography and Steganography techniques. IEEE International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN).

. Ankit Gambhir and Sibaram Khara (2016). Integrating RSA Cryptography & Audio Steganography. IEEE ICCCA.

. Moresh Mukhedkar, Prajkta Powar and Peter Gaikwad (2015.). Secure non real time image encryption algorithm development using cryptography & Steganography. IEEE INDICON.

. Irfan Pratama (2016). Increasing the Security of MP3 Steganography Using AES Encryption and MD5 Hash Function”. International Conference on Science and Technology-Computer. (ICST), IEEE.

. Nikhil Patel, ShwetaMeena (2016). LSB Based Image Steganography Using Dynamic Key Cryptography. International Conference on Emerging Trends in Communication Technologies (ETCT).

. S. H. Gawanda and P. Y. Pawar, (2012). M-Commerce Security Using random LSB Steganography and Cryptography.” International Journal od Machine Learning and Computing, vol. 2(4).

N. A. Al-Otaibi and A. A. Gutub, “2-Leyer Security System for Hiding Sensitive Text Data on Personal Computers”, Lecture Notes on Information Theory, vol. 2, no. 2, (2014).

Kamaldeep Joshi, RajkumarYadav, “A New LSB-S Image Steganography Method Blend with Cryptography for Secret Communication”, IEEE ICIIP, 2015.

Moresh Mukhedkar, Prajkta Powar and Peter Gaikwad, “Secure non real time image encryption algorithm development using cryptography & Steganography”, IEEE INDICON, 2015

Saleh Saraireh, “A secure data communication system using cryptography and Steganography” , International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, pp. 125-137 May 2013.

Manju Bala, Secure Data Transmission techniques using AES cryptography along with Image Steganographic analysis, International Journal of Recent Research Aspects ISSN: 2349-7688, Vol. 4, Issue 4, pp. 21-24 Dec 2017.

Ali Ahmed and Abdelmotalib Ahmed, A Secure Image Steganography using LSB and Double XOR Operations IJCSNS International Journal of Computer Science and Network Security, VOL.20 No.5, May 2020

Aljahdali AO, Al-Harbi OA. Double layer steganography technique using DNA sequences and images. PeerJ Comput. Sci. 9:e1379 http://doi.org/10.7717/peerj-cs.1379 (2023).

Downloads

Published

12.12.2024

How to Cite

Harshal V. Patil. (2024). Crypto-Stego: A Hybrid Method for Encrypting Text Messages or Text Files within Images Using AES and LSB Algorithms. International Journal of Intelligent Systems and Applications in Engineering, 12(23s), 2780 –. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/7468

Issue

Section

Research Article