Comparative Study of Image Encryption and Image Steganography Using Cryptographic Algorithms and Image Evaluation Metrics

被引:0
|
作者
Chavali, Surya Teja [1 ]
Kandavalli, Charan Tej [1 ]
Sugash, T. M. [1 ]
Prakash, G. [2 ]
机构
[1] Amrita Vishwa Vidyapeetham, Amrita Sch Engn, Dept Comp Sci & Engn, Bengaluru, Karnataka, India
[2] Vellore Inst Technol, Sch Comp Sci & Engn, Vellore 632014, Tamil Nadu, India
来源
关键词
Image Encryption & Decryption; Image Steganography; Hashing; SHA-256; MD5; AES; Triple-DES; PSNR; And SSIM;
D O I
10.1007/978-981-19-7126-6_22
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, Steganography is carried out by converting the message hidden into ciphertext using renowned cryptographic algorithms like Advanced Encryption Standard (AES) and Triple Data Encryption Algorithm (TDEA or Triple DEA). The embedding technique produces a Stego image. Considering this as the first level of encryption, we then encrypted the whole stego image using AES and TDEA algorithms, giving us the second layer of encryption. The encrypted stego image will be returned in enc format, unreadable without the proper key. We have good resistance to brute-force, statistical, and differential attacks due to the experimental results of two tiers of protection. In addition to the encryption and decryption process, this paper also talks about Image evaluation metrics like PSNR value and SSIM value, performed on stego images, which use ciphertext from AES and TDEA algorithms that provides the statistical information.
引用
收藏
页码:297 / 311
页数:15
相关论文
共 50 条
  • [21] Comparative study of localization metrics for the evaluation of image interpretation systems
    Hemery, Baptiste
    Laurent, Helene
    Emile, Bruno
    Rosenberger, Christophe
    [J]. JOURNAL OF ELECTRONIC IMAGING, 2010, 19 (02)
  • [22] Image steganography with N-puzzle encryption
    Mukherjee, Srilekha
    Sanyal, Goutam
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (39-40) : 29951 - 29975
  • [23] An Edge Based Image Steganography with Compression and Encryption
    Mishra, Rina
    Mishra, Atish
    Bhanodiya, Praveen
    [J]. 2015 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION AND CONTROL (IC4), 2015,
  • [24] An Edge Based Image Steganography with Compression and Encryption
    Mishra, Rina
    Mishra, Atish
    Bhanodiya, Praveen
    [J]. 2015 International Conference on Computing, Communication and Security (ICCCS), 2015,
  • [25] Image steganography with N-puzzle encryption
    Srilekha Mukherjee
    Goutam Sanyal
    [J]. Multimedia Tools and Applications, 2020, 79 : 29951 - 29975
  • [26] Image Security using Image Encryption and Image Stitching
    Kankonkar, Jyoti T. G.
    Naik, Nitesh
    [J]. 2017 INTERNATIONAL CONFERENCE ON COMPUTING METHODOLOGIES AND COMMUNICATION (ICCMC), 2017, : 151 - 154
  • [27] A comparative study of image processing algorithms
    Koltsov P.P.
    [J]. Pattern Recognition and Image Analysis, 2011, 21 (2) : 148 - 151
  • [28] Comparative Study of Image Segmentation Algorithms
    Grebkov, I. V.
    Koltsov, P. P.
    Kotovich, N. V.
    Kravchenko, A. A.
    Koutsaev, A. S.
    Osipov, A. S.
    Zakharov, A. V.
    [J]. PROCEEDINGS OF THE 8TH WSEAS INTERNATIONAL CONFERENCE ON SIGNAL, SPEECH AND IMAGE PROCESSING (SSIP '08): SIGNAL, SPEECH AND IMAGE PROCESSING, 2008, : 21 - 28
  • [29] Comparative evaluation of visualization and experimental results using image comparison metrics
    Zhou, H
    Chen, M
    Webster, MF
    [J]. VIS 2002: IEEE VISUALIZATION 2002, PROCEEDINGS, 2002, : 315 - 322
  • [30] Hybrid Image Encryption and Steganography Using SCAN Pattern for Secure Communication
    Hazra, Tapan Kumar
    Samanta, Rumna
    Mukherjee, Nilanjana
    Chakraborty, Ajoy Kumar
    [J]. 2017 8TH ANNUAL INDUSTRIAL AUTOMATION AND ELECTROMECHANICAL ENGINEERING CONFERENCE (IEMECON), 2017, : 370 - 380