Comparative Study of Image Encryption and Image Steganography Using Cryptographic Algorithms and Image Evaluation Metrics

被引:0
|
作者
Chavali, Surya Teja [1 ]
Kandavalli, Charan Tej [1 ]
Sugash, T. M. [1 ]
Prakash, G. [2 ]
机构
[1] Amrita Vishwa Vidyapeetham, Amrita Sch Engn, Dept Comp Sci & Engn, Bengaluru, Karnataka, India
[2] Vellore Inst Technol, Sch Comp Sci & Engn, Vellore 632014, Tamil Nadu, India
来源
关键词
Image Encryption & Decryption; Image Steganography; Hashing; SHA-256; MD5; AES; Triple-DES; PSNR; And SSIM;
D O I
10.1007/978-981-19-7126-6_22
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, Steganography is carried out by converting the message hidden into ciphertext using renowned cryptographic algorithms like Advanced Encryption Standard (AES) and Triple Data Encryption Algorithm (TDEA or Triple DEA). The embedding technique produces a Stego image. Considering this as the first level of encryption, we then encrypted the whole stego image using AES and TDEA algorithms, giving us the second layer of encryption. The encrypted stego image will be returned in enc format, unreadable without the proper key. We have good resistance to brute-force, statistical, and differential attacks due to the experimental results of two tiers of protection. In addition to the encryption and decryption process, this paper also talks about Image evaluation metrics like PSNR value and SSIM value, performed on stego images, which use ciphertext from AES and TDEA algorithms that provides the statistical information.
引用
收藏
页码:297 / 311
页数:15
相关论文
共 50 条
  • [1] Efficient Image Steganography Using Adaptive Cryptographic Algorithms
    Hasan, Mahadi
    Tabassum, Mehnaz
    Hossain, Md Jakir
    [J]. INTELLIGENT COMPUTING, VOL 1, 2019, 858 : 558 - 568
  • [2] Image Steganography Using LSB and Hybrid Encryption Algorithms
    Alanzy, May
    Alomrani, Razan
    Alqarni, Bashayer
    Almutairi, Saad
    [J]. APPLIED SCIENCES-BASEL, 2023, 13 (21):
  • [3] Enhanced Secure Image Steganography using Double Encryption Algorithms
    Manjula, Y.
    Shivakumar, K. B.
    [J]. PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 705 - 708
  • [4] A Survey on Image Steganography Algorithms and Evaluation
    Lashkari, Arash Habibi
    Manaf, Azizah Abdul
    Masrom, Maslin
    Daud, Salwani Mohd
    [J]. DIGITAL INFORMATION PROCESSING AND COMMUNICATIONS, PT 1, 2011, 188 : 406 - +
  • [5] Enhanced the Security of Image Steganography Through Image Encryption
    Bhardwaja, Rupali
    Khanna, Divya
    [J]. 2015 ANNUAL IEEE INDIA CONFERENCE (INDICON), 2015,
  • [6] A Comparative Study of Image Cryptographic Method
    Setiadi, De Rosal Ignatius Moses
    Rachmawanto, Eko Hari
    Sari, Christy Atika
    Susanto, Ajib
    Doheir, Mohamed
    [J]. 2018 5TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY, COMPUTER, AND ELECTRICAL ENGINEERING (ICITACEE), 2018, : 336 - 341
  • [7] Comparative Analysis and Implementation of Image Encryption Algorithms
    Kaur, Rajinder
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2013, 13 (12): : 53 - 57
  • [8] Comparative Study of Various Cryptographic Algorithms Used for Text, Image, and Video
    Advani, Nilesh
    Rathod, Chetan
    Gonsai, Atul M.
    [J]. EMERGING TRENDS IN EXPERT APPLICATIONS AND SECURITY, 2019, 841 : 393 - 399
  • [9] Enhancing Image Steganography using Hybrid Algorithms
    Bansal, Shivam
    Srivastava, Prakash
    [J]. PROCEEDINGS OF THE 2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION AND SIGNAL PROCESSING (ICCSP), 2018, : 1064 - 1068
  • [10] A New Image Encryption and Steganography Scheme
    Tang, Hongmei
    Jin, Gaochan
    Wu, Cuixia
    Song, Peijiao
    [J]. PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2009, : 60 - 63