Skip to main content
Top

2021 | OriginalPaper | Chapter

Enhanced Image Security Using Stenography and Cryptography

Authors : Sushmita Matted, Gori Shankar, Bharat Bhushan Jain

Published in: Computer Networks and Inventive Communication Technologies

Publisher: Springer Nature Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In this age of information technology, the most vital part of information and communication exchange is the Internet. With advances in information technology and the Internet, digital media has become one of the best-known tools for data transfer, but this is still facing many challenges, including issues of authentication, modification, ad copyright protection. Many techniques such as encryption, authentication, and steganography can be used to protect these digital data. To secure information, encryption and information hiding are used widely. In the proposed work, a combination of encryption and information hiding is used to provide additional security, which means that it provides two-layer protection. The security level of the hidden image is measured in the term of PSNR and MSE parameters. In stenography, low MSE value and high PSNR value are better. The proposing work improves the result of previous work in the term of PSNR and MSE. To make the image security more robust and more secure, also add the cryptographic process with steganography.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Gopalakrishna Kini N, Kini VG, Gautam (2019) A secured steganography algorithm for hiding an image in an image. In: Integrated intelligent computing, communication and security, studies in computational intelligence. Springer Nature Singapore Pte Ltd., pp 771, 539–546 Gopalakrishna Kini N, Kini VG, Gautam (2019) A secured steganography algorithm for hiding an image in an image. In: Integrated intelligent computing, communication and security, studies in computational intelligence. Springer Nature Singapore Pte Ltd., pp 771, 539–546
2.
go back to reference Soni GK, Arora H, Jain B (2020) A novel image encryption technique using arnold transformation and asymmetric RSA algorithm. In: Springer international conference on artificial intelligence advances and application, published in springer series algorithm for intelligent system, pp 83–90 Soni GK, Arora H, Jain B (2020) A novel image encryption technique using arnold transformation and asymmetric RSA algorithm. In: Springer international conference on artificial intelligence advances and application, published in springer series algorithm for intelligent system, pp 83–90
3.
go back to reference Soni GK, Rawat A, Jain S, Sharma SK (2020) A pixel-based digital medical images protection using genetic algorithm with LSB watermark technique. In: Smart systems and IoT: innovations in computing, Springer, pp 483–492 Soni GK, Rawat A, Jain S, Sharma SK (2020) A pixel-based digital medical images protection using genetic algorithm with LSB watermark technique. In: Smart systems and IoT: innovations in computing, Springer, pp 483–492
4.
go back to reference Aqeel I, Suleman MB (2019) A survey on digital image steganography approaches. Springer Nature Singapore Pte Ltd. INTAP, CCIS pp 932, 769–778 Aqeel I, Suleman MB (2019) A survey on digital image steganography approaches. Springer Nature Singapore Pte Ltd. INTAP, CCIS pp 932, 769–778
5.
go back to reference Fadul IMA, Ahmed TMH (2013) Enhanced security of Rijndael algorithm using two secret keys. Int J Secur Appl 7(4):127–134 Fadul IMA, Ahmed TMH (2013) Enhanced security of Rijndael algorithm using two secret keys. Int J Secur Appl 7(4):127–134
6.
go back to reference Kazlauskas K, Smaliukas R, Vaicekauskas G (2016) A novel method to design S-boxes based on key-dependent permutation schemes and its quality analysis. Int J Adv Comput Sci Appl 7(4):93–99 Kazlauskas K, Smaliukas R, Vaicekauskas G (2016) A novel method to design S-boxes based on key-dependent permutation schemes and its quality analysis. Int J Adv Comput Sci Appl 7(4):93–99
7.
go back to reference Thinn AA, Thwin MMS (2019) Modification of AES algorithm by using second key and modified SubBytes operation for text encryption. In: Computational science and technology, lecture notes in electrical engineering, vol 481. Springer Nature Singapore Pte Ltd., pp 435–444 Thinn AA, Thwin MMS (2019) Modification of AES algorithm by using second key and modified SubBytes operation for text encryption. In: Computational science and technology, lecture notes in electrical engineering, vol 481. Springer Nature Singapore Pte Ltd., pp 435–444
8.
go back to reference Ms KC, Prasanna Venkatesan V (2020) An Antiquity to the contemporary of Secret Sharing Scheme. J Innov Image Process (JIIP) 2(1):1–13CrossRef Ms KC, Prasanna Venkatesan V (2020) An Antiquity to the contemporary of Secret Sharing Scheme. J Innov Image Process (JIIP) 2(1):1–13CrossRef
9.
go back to reference Sarreshtedari S, Akhaee MA (2014) One-third probability embedding: a new ±1 histogram compensating image least significant bit steganography scheme. Inst Eng Technol IET Image Process 8(2):78–89 Sarreshtedari S, Akhaee MA (2014) One-third probability embedding: a new ±1 histogram compensating image least significant bit steganography scheme. Inst Eng Technol IET Image Process 8(2):78–89
10.
go back to reference Swain G (2016) Digital image steganography using variable length group of bits substitution. In: ELSEVIER international conference on computational modeling and security (CMS 2016), procedia computer science, vol 85, pp 31–38 Swain G (2016) Digital image steganography using variable length group of bits substitution. In: ELSEVIER international conference on computational modeling and security (CMS 2016), procedia computer science, vol 85, pp 31–38
11.
go back to reference Jain MP, Lenka SK (2016) A review of digital image steganography using LSB and LSB Array. Int J Appl Eng Res 11(3):1820–1824 Jain MP, Lenka SK (2016) A review of digital image steganography using LSB and LSB Array. Int J Appl Eng Res 11(3):1820–1824
12.
go back to reference Hossain M, Haque SA, Sharmin F (2009) Variable rate steganography in gray scale digital images using neighborhood pixel information. In: Proceedings of 12th IEEE international conference on computer and information technology (ICCIT 2009), pp 567–272 Hossain M, Haque SA, Sharmin F (2009) Variable rate steganography in gray scale digital images using neighborhood pixel information. In: Proceedings of 12th IEEE international conference on computer and information technology (ICCIT 2009), pp 567–272
13.
go back to reference Rafrastara FA, Prahasiwi R, Setiadi DRIM, Rachmawanto EH, Sari CA (2019) Image steganography using inverted LSB based on 2nd, 3rd and 4th LSB pattern. In: IEEE international conference on information and communications technology (ICOIACT), pp 179–184 Rafrastara FA, Prahasiwi R, Setiadi DRIM, Rachmawanto EH, Sari CA (2019) Image steganography using inverted LSB based on 2nd, 3rd and 4th LSB pattern. In: IEEE international conference on information and communications technology (ICOIACT), pp 179–184
14.
go back to reference Sai Akhil G, Amarndah M, Kumar K (2016) A Technique to secure data storage and sharing using AES. Int J Sci Eng Res 7(12):35–39 Sai Akhil G, Amarndah M, Kumar K (2016) A Technique to secure data storage and sharing using AES. Int J Sci Eng Res 7(12):35–39
15.
go back to reference Arrag S, Hamdoun A, Tragha A, Khamlich SE (2013) Implementation of stronger AES by using dynamic S-Box dependent of master Key. J Theor Appl Inf Technol 8(9):196–204 Arrag S, Hamdoun A, Tragha A, Khamlich SE (2013) Implementation of stronger AES by using dynamic S-Box dependent of master Key. J Theor Appl Inf Technol 8(9):196–204
Metadata
Title
Enhanced Image Security Using Stenography and Cryptography
Authors
Sushmita Matted
Gori Shankar
Bharat Bhushan Jain
Copyright Year
2021
Publisher
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-15-9647-6_93