Data Security Using Cryptography and Steganography Techniques

被引:0
|
作者
Saleh, Marwa E. [1 ]
Aly, Abdelmgeid A. [1 ]
Omara, Fatma A. [1 ]
机构
[1] Menia Univ, Dept Comp Sci, Menia, Minya, Egypt
关键词
Image Steganography; Pixel Value Difference (PVD); Encryption; Decryption; Advance encryption standard (AES);
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Although cryptography and steganography could be used to provide data security, each of them has a problem. Cryptography problem is that, the cipher text looks meaningless, so the attacker will interrupt the transmission or make more careful checks on the data from the sender to the receiver. Steganography problem is that once the presence of hidden information is revealed or even suspected, the message is become known. According to the work in this paper, a merged technique for data security has been proposed using Cryptography and Steganography techniques to improve the security of the information. Firstly, the Advanced Encryption Standard (AES) algorithm has been modified and used to encrypt the secret message. Secondly, the encrypted message has been hidden using method in [1]. Therefore, two levels of security have been provided using the proposed hybrid technique. In addition, the proposed technique provides high embedding capacity and high quality stego images.
引用
收藏
页码:390 / 397
页数:8
相关论文
共 50 条
  • [1] Enhancing security of images by Steganography and Cryptography techniques
    Bukhari, Sadaf
    Arif, Muhammad Shoaib
    Anjum, M. R.
    Dilbar, Samia
    [J]. 2016 SIXTH INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING TECHNOLOGY (INTECH), 2016, : 531 - 534
  • [2] A New Approach for Data Security in Cryptography and Steganography
    Guttikonda, Prashanti
    Kaviti, Sandhya Rani
    Popuri, Ashok Kumar
    [J]. COMPUTER COMMUNICATION, NETWORKING AND INTERNET SECURITY, 2017, 5 : 35 - 44
  • [3] AN INFORMATION SECURITY SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
    Hossain, Md. Emran
    Grout, Vic
    Bhuiyan, Monir
    Miraz, Mandi H.
    [J]. PROCEEDINGS OF THE FOURTH INTERNATIONAL CONFERENCE ON INTERNET TECHNOLOGIES AND APPLICATIONS (ITA 11), 2011, : 607 - 608
  • [4] Advanced Network Security using Cryptography and Steganography
    Pandey, Jay Kumar
    Kushwaha, Amit
    Srivastava, Vibha
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION, COMMUNICATION AND ENERGY CONSERVATION INCACEC 2009 VOL 1, 2009, : 326 - 331
  • [5] Securing Data in Internet of Things (IoT) Using Cryptography and Steganography Techniques
    Khari, Manju
    Garg, Aditya Kumar
    Gandomi, Amir H.
    Gupta, Rashmi
    Patan, Rizwan
    Balusamy, Balamurugan
    [J]. IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2020, 50 (01): : 73 - 80
  • [6] Multilevel Multimedia Security by Integrating Visual Cryptography and Steganography Techniques
    Rani, M. Mary Shanthi
    Mary, G. Germine
    Euphrasia, K. Rosemary
    [J]. COMPUTATIONAL INTELLIGENCE, CYBER SECURITY AND COMPUTATIONAL MODELS, ICC3 2015, 2016, 412 : 403 - 412
  • [7] Hiding Data Using Efficient Combination of RSA Cryptography, and Compression Steganography Techniques
    Wahab, Osama Fouad Abdel
    Khalaf, Ashraf A. M.
    Hussein, Aziza I.
    Hamed, Hesham F. A.
    [J]. IEEE ACCESS, 2021, 9 : 31805 - 31815
  • [8] Hiding data using efficient combination of RSA cryptography, and compression steganography techniques
    Wahab, Osama Fouad Abdel
    Khalaf, Ashraf A.M.
    Hussein, Aziza I.
    Hamed, Hesham F.A.
    [J]. IEEE Access, 2021, 9 : 31805 - 31815
  • [9] Implementation of cryptography in steganography for enhanced security
    Harianto Antonio
    P. W. C. Prasad
    Abeer Alsadoon
    [J]. Multimedia Tools and Applications, 2019, 78 : 32721 - 32734
  • [10] Implementation of cryptography in steganography for enhanced security
    Antonio, Harianto
    Prasad, P. W. C.
    Alsadoon, Abeer
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (23) : 32721 - 32734