Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Secure Transmission of Data using Image Steganography


Affiliations
1 Department of Computer Science and Engineering, Calcutta Institute of Technology, India
2 Department of Computer Science and Technology, Indian Institute of Engineering Science and Technology, India
     

   Subscribe/Renew Journal


Data is one of the most relevant and important term from the ancient Greek age to modern science and business. The amount of data and use of data transformation for organizational work is increasing. So, for the sake of security and to avoid data loss and unauthorized access of data we have designed an image Steganographic algorithm implementing both Cryptography and Steganography. This algorithm imposed a cipher text within a cover image to conceal the existence of the cipher text and the stego-image is transferred from sender to intended receiver by invoking a distributed connection among them to achieve the data authenticity.

Keywords

Cryptography, Steganography, RSA, RMI Architecture, Distributed connection, JPEG image.
Subscription Login to verify subscription
User
Notifications
Font Size

  • Behrouz A. Forouzan, “Cryptography and Network Security”, McGraw Hill, 2007.
  • Herbert Schidlt, “Java the Complete Reference”, 8th Edition, McGraw Hill, 2011.
  • N.F. Johnson and S. Jajodia, “Exploring Steganography: Seeing the Unseen”, Computer, Vol. 31, No. 2, pp. 26-34, 1998.
  • S. Song, J. Zhang, X. Liao, J. Du and Q. Wen, “A Novel Secure Communication Protocol Combining Steganography and Cryptography”, Procedia Engineering, Vol. 15, pp. 2767-2772, 2011.
  • A.J. Raphael and V. Sundaram, “Cryptography and Steganography-A Survey”, International Journal of Computer Technology and Applications, Vol. 2, No. 3, pp. 626-630, 2016.
  • S.A. Laskar and K. Hemachandran, “An Analysis of Steganography and Steganalysis Techniques”, Assam University Journal of Science and Technology, Vol. 9, No. 2, pp. 83-103, 2012.
  • F.A.P. Petitcolas, R.J. Anderson and M.G. Kuhn, “Information Hiding-A Survey”, Proceedings of International Conference on Protection of Multimedia, pp. 1062-1078, 1999.
  • Y.S. Huang, Y.P. Huang, K.N. Huang and M.S. Young, “The Assessment System of Human Visual Spectral Sensitivity Curve by Frequency Modulated Light”, Proceedings of IEEE International Conference on Engineering in Medicine and Biology, pp. 263-265, 2005.
  • T. Morkel, J.H.P. Eloff and M.S. Oliver, “An Overview of Image Steganography”, Proceedings of 5th Annual Conference on Information Security, pp. 111-116, 2005.
  • T. Handel and M. Sandford, “Hiding Data in the OSI Network Model”, Proceedings of 1st International Workshop on Information Hiding, pp. 1-7, 1996
  • R. Doshi, P. Jain and L. Gupta, “Steganography and its Applications in Security”, International Journal of Modern Engineering Research, Vol. 2, No. 6, pp. 4634-4638, 2012.
  • M. Rouse, “Steganography”, Available at: https://searchsecurity.techtarget.com/definition/steganography
  • Jing-Ming Guo and Thanh Nam Le, “Secret Communication using JPEG Double Compression”, IEEE Signal Processing Letters, Vol. 17, No. 10, pp. 879-882, 2010.
  • Kamaldeep Joshi and Rajkumar Yadav, “A New LSB-S Image Steganography Method Blend with Cryptography for Secret Communication”, Proceedings of 3rd International Conference on Image Processing, pp. 86-90, 2015.
  • K.S. Seethalakshmi, B.A. Usha and K.N. Sangeetha, “Security Enhancement in Image Steganography using Neural Networks and Visual Cryptography”, Proceedings of International Conference on Computational Systems and Information Systems for Sustainable Solutions, pp. 396-403, 2016.
  • Nikhil Patel and Shweta Meena, “LSB Based Image Steganography using Dynamic Key Cryptography”, Proceedings of International Conference on Emerging Trends in Communication Technologies, pp. 448-457, 2016.
  • May H. Abood, “An Efficient Image Cryptography using Hash-LSB Steganography with RC4 and Pixel Shuffling Encryption Algorithms”, Proceedings of Annual Conference on New Trends in Information and Communications Technology Applications, pp. 86-90, 2017.
  • A.A.A. El-Latif, B. Abd El Atty, M.S. Hossain, M.D. A. Rahman, A. Alamri and B.B. Gupta, “Efficient Quantum Information Hiding for Remote Medical Image Sharing”, IEEE Access, Vol. 6, pp. 21075-21083, 2018.
  • Z. Qu, Z. Cheng and X. Wang, “Matrix Coding-Based Quantum Image Steganography Algorithm”, IEEE Access, Vol. 7, pp. 35684-35698, 2019.

Abstract Views: 333

PDF Views: 0




  • Secure Transmission of Data using Image Steganography

Abstract Views: 333  |  PDF Views: 0

Authors

Sourabh Chandra
Department of Computer Science and Engineering, Calcutta Institute of Technology, India
Smita Paira
Department of Computer Science and Technology, Indian Institute of Engineering Science and Technology, India

Abstract


Data is one of the most relevant and important term from the ancient Greek age to modern science and business. The amount of data and use of data transformation for organizational work is increasing. So, for the sake of security and to avoid data loss and unauthorized access of data we have designed an image Steganographic algorithm implementing both Cryptography and Steganography. This algorithm imposed a cipher text within a cover image to conceal the existence of the cipher text and the stego-image is transferred from sender to intended receiver by invoking a distributed connection among them to achieve the data authenticity.

Keywords


Cryptography, Steganography, RSA, RMI Architecture, Distributed connection, JPEG image.

References