Improving Two-Layer Data Security in Image Steganography
A. Kaur1 , J. Kaur2
Section:Research Paper, Product Type: Journal Paper
Volume-6 ,
Issue-8 , Page no. 587-591, Aug-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i8.587591
Online published on Aug 31, 2018
Copyright © A. Kaur, J. Kaur . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: A. Kaur, J. Kaur, “Improving Two-Layer Data Security in Image Steganography,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.587-591, 2018.
MLA Style Citation: A. Kaur, J. Kaur "Improving Two-Layer Data Security in Image Steganography." International Journal of Computer Sciences and Engineering 6.8 (2018): 587-591.
APA Style Citation: A. Kaur, J. Kaur, (2018). Improving Two-Layer Data Security in Image Steganography. International Journal of Computer Sciences and Engineering, 6(8), 587-591.
BibTex Style Citation:
@article{Kaur_2018,
author = {A. Kaur, J. Kaur},
title = {Improving Two-Layer Data Security in Image Steganography},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {8 2018},
volume = {6},
Issue = {8},
month = {8},
year = {2018},
issn = {2347-2693},
pages = {587-591},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2738},
doi = {https://doi.org/10.26438/ijcse/v6i8.587591}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i8.587591}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2738
TI - Improving Two-Layer Data Security in Image Steganography
T2 - International Journal of Computer Sciences and Engineering
AU - A. Kaur, J. Kaur
PY - 2018
DA - 2018/08/31
PB - IJCSE, Indore, INDIA
SP - 587-591
IS - 8
VL - 6
SN - 2347-2693
ER -
VIEWS | XML | |
355 | 239 downloads | 158 downloads |
Abstract
In this paper, two security layers are added on the data using cryptography and steganography algorithms. The data is encrypted using lightweight RECTANGLE algorithm. Next, the data is hiding is done using steganography algorithm. In the steganography scheme, the edges of the cover image are determine using Canny Edge detection technique which can extract inclusive range of edges. Further, worked on theory of color which plane is more suitable for maximum/minimum data hiding. The encrypted data is splitted into 3:2:3 ratio and hide in the edges of the RGB plane simultaneously. The performance analysis is done based on PSNR and embedding capacity. The experimental results show that the Improved technique is secure, consume lesser area, less embedding capacity, and provide high PSNR. Further, data extraction is possible without communicating any extra information with stego image.
Key-Words / Index Term
Canny Edge Detection, RECTANGLE, PSNR, Multi-Layer Security
References
[1] Rajendran, Sujarani, and ManivannanDoraipandian. "Chaotic Map Based Random Image Steganography Using LSB Technique." International Journal of Network Security, vol. 19, no. 4, pp. 593-598, 2017.
[2] Amrital Singh and Harpal Singh, “An improved LSB based image steganography technique for RGB images,” IEEE International Conference on Electrical, Computer and Communication Technologies, August 2015.
[3] Panghal, Sandeep, Sachin Kumar, and Naveen Kumar. "Enhanced Security of Data using Image Steganography and AES Encryption Technique." International Journal of Computer Applications Recent Trends in Future Prospective in Engineering & Management Technology 2016.
[4] Patel, Komal, SumitUtareja, and Hitesh Gupta. "Information hiding using least significant bit steganography and blowfish algorithm." International Journal of Computer Applications, vol. 63, no. 13, 2013.
[5] Ramaiya, Manoj, Naveen Hemrajani, and Anil Kishore Saxena. "Secured steganography approach using AES." International Journal of Computer Science Engineering and Information Technology Research (IJCSEITR), vol. 3, pp. 185-192, 2013.
[6] Zhang, Wentao, et al. "RECTANGLE: a bit-slice lightweight block cipher suitable for multiple platforms." Science China Information Sciences vol. 58, no.12, pp. 1-15, 2015.
[7] Li, Li, et al. "A color Images steganography method by multiple embedding strategy based on Sobel operator." 2009 International Conference on Multimedia Information Networking and Security. IEEE, 2009.
[8] Bassil, Youssef. "Image steganography based on a parameterized canny edge detection algorithm." arXiv preprint arXiv:1212.6259, 2012.
[9] Chen, Wen-Jan, Chin-Chen Chang, and T. Hoang Ngan Le. "High payload steganography mechanism using hybrid edge detector." Expert Systems with applications, vol. 37, no. 4, pp. 3292-3301, 2010.
[10] Goodarzi, Mahdi Hassani, ArashZaeim, and Amir Shahab Shahabi. "Convergence between fuzzy logic and steganography for high payload data embedding and more security." Telecommunication Systems, Services, and Applications (TSSA), 2011 6th International Conference on. IEEE, 2011.
[11] Kousik Dasgupta, J.K. Mandal, and Paramartha Dutta, “Hash based Least Significant Bit Technique for Video Steganography,” International Journal of Security, Privacy, and Trust Management, vol. 1, pp. 1-11, April 2012.
[12] Debiprasad Bandyopadhyay, Kousik Dasgupta, J.k. Mandal, Paramartha Dutta, “A Novel Secure Image Steganography Method Based on Chaos Theory in Spatial Domain,” International Journal of Security, Privacy, and Trust Management, vol. 3, pp. 11-22, February 2014.
[13] G. R. Manjula and AjitDanti, “A Novel Hash Based Least Significant Bit (2-3-3) Image Steganography in Spatial Domain,” International Journal of Security, Privacy, and Trust Management, vol. 4, pp. 11-20, Februry2015.
[14]http://sipi.usc.edu/database/database.php?volume=misc&image=13#top
[15] Muhammad, Khan, et al. "Image steganography for authenticity of visual contents in social networks." Multimedia Tools and Applications, vol. 76, no. 18, pp. 18985-19004, 2017.