Two New Approaches for Image Steganography Using Cryptography

被引:0
|
作者
Sharma, Vipul [1 ]
Madhusudan [2 ]
机构
[1] Natl Inst Technol, Dept Comp Sci & Engn, Srinagar, Jammu & Kashmir, India
[2] Himachal Pradesh Univ, Dept Comp Sci, Shimla 171005, Himachal Prades, India
关键词
Steganography; Cryptography; Least Significant Bit (LSB); DES; Stego image; secret key;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The process of jumbling up the contents of a secret message so as to secure it, is known as cryptography, whereas the process of hiding the very existence of a secret message is known as steganography. The term "steganography" describes the method by which the contents of a secret message are concealed inside some other medium, so as to avoid any kind of detection by an intruder. In this paper, we have proposed two new approaches wherein both cryptography and steganography are used to encrypt the data and also to conceal these encrypted contents in some other medium. In the first method proposed, we have secured an image by converting it into an encrypted text using S-DES algorithm and a secret key and then concealing this encrypted text in some other image, whereas in the second method, we have secured an image directly by encrypting it using S-DES algorithm and an image key. The contents thus obtained are concealed inside another image so as to hide its very existence. Both these techniques have been tested and it has been observed that they prevent the possibilities of steganalysis also.
引用
收藏
页码:202 / 207
页数:6
相关论文
共 50 条
  • [1] Image steganography with using QR code and cryptography
    Hajduk, Vladimir
    Broda, Martin
    Kovac, Ondrej
    Levicky, Dusan
    [J]. PROCEEDINGS OF THE 26TH INTERNATIONAL CONFERENCE RADIOELEKTRONIKA (RADIOELEKTRONIKA 2016), 2016, : 350 - 353
  • [2] Enhanced Blend of Image Steganography and Cryptography
    Phadte, Radha S.
    Dhanaraj, Rachel
    [J]. 2017 INTERNATIONAL CONFERENCE ON COMPUTING METHODOLOGIES AND COMMUNICATION (ICCMC), 2017, : 230 - 235
  • [3] LSB Based Image Steganography Using Dynamic Key Cryptography
    Patel, Nikhil
    Meena, Shweta
    [J]. 2016 INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN COMMUNICATION TECHNOLOGIES (ETCT), 2016,
  • [4] Digital Image Steganography Using Modified LSB and AES Cryptography
    Panwar, Subhash
    Kumar, Mukesh
    Sharma, Sakshi
    [J]. 4TH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS AND CONNECTED TECHNOLOGIES (ICIOTCT), 2019: INTERNET OF THINGS AND CONNECTED TECHNOLOGIES, 2020, 1122 : 366 - 375
  • [5] Online Voting Verification with Cryptography and Steganography Approaches
    Rura, Lauretha
    Issac, Biju
    Haldar, Manas Kumar
    [J]. 2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012, : 125 - 129
  • [6] Secure Medical Image Steganography with RSA Cryptography using Decision Tree
    Jain, Mamta
    Choudhary, Rishabh Charan
    Kumar, Anil
    [J]. PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING AND INFORMATICS (IC3I), 2016, : 291 - 295
  • [7] Security Enhancement in Image Steganography Using Neural Networks and Visual Cryptography
    Seethalakshmi, K. S.
    Usha, B. A.
    Sangeetha, K. N.
    [J]. 2016 INTERNATIONAL CONFERENCE ON COMPUTATION SYSTEM AND INFORMATION TECHNOLOGY FOR SUSTAINABLE SOLUTIONS (CSITSS), 2016, : 396 - 402
  • [8] Visual Cryptography and Image Steganography using Space Filling Hilbert Curves
    Sheidaeian, Hamed
    Abbasifard, Mohammad Reza
    Zolfaghari, Behrouz
    [J]. 4TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER THEORY AND ENGINEERING ( ICACTE 2011), 2011, : 763 - 767
  • [9] Image security using steganography and cryptography with sweeping computational ghost imaging
    Rajabi-Ghaleh, Sajjad
    Olyaeefar, Babak
    Kheradmand, Reza
    Ahmadi-Kandjani, Sohrab
    [J]. FRONTIERS IN PHYSICS, 2024, 12
  • [10] Secret information hiding in image randomly method using steganography and cryptography
    Hammoud, Awad Kadhim
    Mohaisen, Hatem Nahi
    Mohammed, Mohammed Q.
    [J]. INTERNATIONAL JOURNAL OF NONLINEAR ANALYSIS AND APPLICATIONS, 2021, 12 : 1283 - 1291