Open Access Open Access  Restricted Access Subscription Access

A Smart Strategy for Data Hiding using Cryptography and Steganography


Affiliations
1 CSE Dept,Seshdri Rao Gudlavalleru Engineering College, Gudlavalleru 521 356, Andhra Pradesh, India., India
2 IT Dept Seshdri Rao Gudlavalleru Engineering College, Gudlavalleru 521 356, Andhra Pradesh, India., India
 

Confidential data maintained by Security sources has always been a substantial aspect of hampering unintended access. Technology is enhancing day by day towards information, especially in terms of multimedia file transmission. Combining cryptography and steganography, a crossover approach serves information security. Cryptography is a strategy for changing over from plain content Cipher Text. Steganography is the specialty of concealing plain text, which refers to hiding data within a message or file. The proposed method provides a hybridsystem in designing and utilizing cryptography and steganography techniques, making the communication system reliable in resisting attacks. In this paper, the play fair cipher method is used to encode the hidden textual content, which provides security in terms of effective level. Play fair cipher represents the plain text as a data unit and converts these units into unknown forms. Later, Discrete Cosine Transform (DCT) and Logical Operation Exclusive OR (XOR) techniques were combined with masking encrypted messages inside the picture. Noble security level results and histogram analysis are the achievements' values that indicate the offers designed by a system.

Keywords

DCT, Histogram, Play Fair Cipher, PSNR, XOR.
User
Notifications
Font Size

  • Khan Z, Shah M & Naeem M, Threshold-based steganography: A novel technique for improved payload and SNR, Int Arab J Inf Technol, 13(4) (2016) 380–386.
  • Nag A, Singh J P, Khan S, Ghosh S, Biswas S, Sarkar D & Sarkar P P, Image encryption using affine transform and XOR operation, Proc Int Conf Signal Process Commun Comput Netw Technol, 2011, DOI: 10.1109/ICSCCN.2011.6024565).
  • Artz D, Digital Steganography: Hiding data within data, IEEE Int Comput J, 5(3) (2001) 75–80.
  • Kishore D R, Suneetha D & Pradeep G G S, An improved method of DNA data encryption using XOR based data segments, Int J Rec Technol Eng, 8(1)(2019) 1834–1838.
  • Brassard G, Lütkenhaus N, Mor T & Sanders B C, Limitations on practical quantum cryptography, Phys Rev Lett, 85(6) (2000) 1330–1333.
  • An elliptical curve cryptography (ECC) Primer, Why ECC is the next generation of public key cryptography, The Certicom Catch the Curve White Paper Series(2004) 1–24
  • Janani S, Shalini M, Parkavi K & Chandrasekar A, Autonomous data hiding in anencrypted image using KM-DH algorithm, Int J Innov Technol Explo Eng, 9(2) (2019) 4950– 4952
  • Maiti C, Baksi D, Zamider I, Gorai P & Kisku D R, Data hiding in images using some efficient steganography techniques, in Signal Processing, Image Processing and Pattern Recognitionedited by Th Kim, H Adeli, C Ramos, B H Kang, SIP 2011, Commun Comput Inform Sci, 260(Springer, Berlin, Heidelberg) (2011) 195–203, https://doi.org/10.1007/978-3-642-27183-0_ 21 260
  • Essa R J, Abdulah N A & Al-Dabbagh R D, Steganography technique using genetic algorithm, Iraqi J Sci,59(3A)(2018) 1312–1325.
  • Ramadhan j, Mstafa & Bach C, Information hiding in images using steganography techniques, Northeast Conf American Soc Eng Edu (Norwich University) March 2013, DOI:10.13140/RG.2.1.1350.9360
  • Abuali M S, Rashidi C B, Salih M H, Raof R A & Hussein S S, Digital image steganography in spatial domain a comprehensive review, J Theor Appl Inf Technol,97(19) (2019) 5081–5102.
  • Alturki F & Mersereau R, A novel approach for increasing security and data embedding capacity in images for data hiding applications, Proc Int Conf Inf Technol Code Comput (IEEE) 2001, DOI:10.1109/ITCC.2001.918796
  • Malladi R, Srinivas C & Gupta N, Time-slot assignment based channel access scheme for reliable transmission in VANET, in Communication and Computing Systemsedited by B M K Prasad, K Singh, S Pandey, R O'Kennedy (CRC Press, London) 2019, https://doi.org/ 10.1201/9780429444272.
  • Abod Z A, Hybrid approach to steganography system based on quantum encryption and chaos algorithm, J Babylon Univ Pure Appl Sci 26(2) (2018) 280–294.

Abstract Views: 79

PDF Views: 62




  • A Smart Strategy for Data Hiding using Cryptography and Steganography

Abstract Views: 79  |  PDF Views: 62

Authors

Tumma Srinivasarao
CSE Dept,Seshdri Rao Gudlavalleru Engineering College, Gudlavalleru 521 356, Andhra Pradesh, India., India
Adilakshmi Yannam
CSE Dept,Seshdri Rao Gudlavalleru Engineering College, Gudlavalleru 521 356, Andhra Pradesh, India., India
Baburao Markapudi
CSE Dept,Seshdri Rao Gudlavalleru Engineering College, Gudlavalleru 521 356, Andhra Pradesh, India., India
Kavitha Chaduvula
IT Dept Seshdri Rao Gudlavalleru Engineering College, Gudlavalleru 521 356, Andhra Pradesh, India., India
Apparna Allada
CSE Dept,Seshdri Rao Gudlavalleru Engineering College, Gudlavalleru 521 356, Andhra Pradesh, India., India

Abstract


Confidential data maintained by Security sources has always been a substantial aspect of hampering unintended access. Technology is enhancing day by day towards information, especially in terms of multimedia file transmission. Combining cryptography and steganography, a crossover approach serves information security. Cryptography is a strategy for changing over from plain content Cipher Text. Steganography is the specialty of concealing plain text, which refers to hiding data within a message or file. The proposed method provides a hybridsystem in designing and utilizing cryptography and steganography techniques, making the communication system reliable in resisting attacks. In this paper, the play fair cipher method is used to encode the hidden textual content, which provides security in terms of effective level. Play fair cipher represents the plain text as a data unit and converts these units into unknown forms. Later, Discrete Cosine Transform (DCT) and Logical Operation Exclusive OR (XOR) techniques were combined with masking encrypted messages inside the picture. Noble security level results and histogram analysis are the achievements' values that indicate the offers designed by a system.

Keywords


DCT, Histogram, Play Fair Cipher, PSNR, XOR.

References