A SECURE STEGANOGRAPHY CREATION ALGORITHM FOR MULTIPLE FILE FORMATS
PDF
PDF

How to Cite

Vinothkanna, R. 2019. “A SECURE STEGANOGRAPHY CREATION ALGORITHM FOR MULTIPLE FILE FORMATS”. Journal of Innovative Image Processing 1 (1): 20-30. https://doi.org/10.36548/jiip.2019.1.003.

Keywords

— Steganography
— Cryptography
— RSA
— PSNR
— SSIM
— Capacity
— Security and Robustness
Published: 30-09-2019

Abstract

The technological advancements in the information sharing and the development of many techniques to make the information conveyance easy necessitate a protection methodology that could prevent the personal information that is transmitted from being hacked. Some of the protection methods that have emerged are the cryptography, steganography, watermarking, digital signature etc. As steganography is a popular method of transmitting the covered secret information in order to avoid hacking and the misuse due to its major attributes such as the security, capacity and the robustness. This paper puts forward cryptography incorporated steganography (CICS) to provide a highly secure steganography algorithm for the files of the multiple formats, The performance analysis of the method and the measurement of the parameters such as the PSNR and the SSIM are done to ensure the efficiency of the proffered method.

References

  1. Johnson, Neil F., and Sushil Jajodia. "Exploring steganography: Seeing the unseen." Computer 31, no. 2 (1998): 26-34.
  2. Anderson, Ross J., and Fabien AP Petitcolas. "On the limits of steganography." IEEE Journal on selected areas in communications 16, no. 4 (1998): 474-481.
  3. Crandall, Ron. "Some notes on steganography." Posted on steganography mailing list (1998): 1-6.
  4. Provos, Niels, and Peter Honeyman. "Hide and seek: An introduction to steganography." IEEE security & privacy 1, no. 3 (2003): 32-44.
  5. Morkel, Tayana, Jan HP Eloff, and Martin S. Olivier. "An overview of image steganography." In ISSA, pp. 1-11. 2005.
  6. Sadek, Mennatallah M., Amal S. Khalifa, and Mostafa GM Mostafa. "Video steganography: a comprehensive review." Multimedia tools and applications 74, no. 17 (2015): 7063-7094.
  7. Shiu, Hung-Jr, Bor-Shing Lin, Bor-Shyh Lin, Po-Yang Huang, Chien-Hung Huang, and Chin-Laung Lei. "Data hiding on social media communications using text steganography." In International Conference on Risks and Security of Internet and Systems, pp. 217-224. Springer, Cham, 2017.
  8. Jiang, Nan, Na Zhao, and Luo Wang. "LSB based quantum image steganography algorithm." International Journal of Theoretical Physics 55, no. 1 (2016): 107-123.
  9. Ansari, Arshiya Sajid, Mohammad Sajid Mohammadi, and Mohammad Tanvir Parvez. "A comparative study of recent steganography techniques for multiple image formats." International Journal of Computer Network and Information Security 11, no. 1 (2019): 11.
  10. Piper, Fred. "Cryptography." Encyclopedia of Software Engineering (2002).
  11. Saxena, Sapna, and Bhanu Kapoor. "An efficient parallel algorithm for secured data communications using RSA public key cryptography method." In 2014 IEEE International Advance Computing Conference (IACC), pp. 850-854. IEEE, 2014.
  12. Subasree, S., and N. K. Sakthivel. "Design of a new security protocol using hybrid cryptography algorithms." IJRRAS 2, no. 2 (2010): 95-103.
  13. Gura, Nils, Arun Patel, Arvinderpal Wander, Hans Eberle, and Sheueling Chang Shantz. "Comparing elliptic curve cryptography and RSA on 8-bit CPUs." In International workshop on cryptographic hardware and embedded systems, pp. 119-132. Springer, Berlin, Heidelberg, 2004.
  14. Gupta, Shailender, Ankur Goyal, and Bharat Bhushan. "Information hiding using least significant bit steganography and cryptography." International Journal of Modern Education and Computer Science 4, no. 6 (2012): 27.
  15. Sun, Hung-Min, Mu-En Wu, Wei-Chi Ting, and M. Jason Hinek. "Dual RSA and its security analysis." IEEE Transactions on Information Theory 53, no. 8 (2007): 2922-2933.
  16. Wang, Suli, and Ganlai Liu. "File encryption and decryption system based on RSA algorithm." In 2011 International Conference on Computational and Information Sciences, pp. 797-800. IEEE, 2011.