Open Access   Article Go Back

Literature Review on Improving Data Security using DES and DCT

Vikas Singhal1 , Devendra Singh2 , Sanjai Gupta3

Section:Research Paper, Product Type: Journal Paper
Volume-9 , Issue-7 , Page no. 78-83, Jul-2021

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v9i7.7883

Online published on Jul 31, 2021

Copyright © Vikas Singhal, Devendra Singh, Sanjai Gupta . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Vikas Singhal, Devendra Singh, Sanjai Gupta, “Literature Review on Improving Data Security using DES and DCT,” International Journal of Computer Sciences and Engineering, Vol.9, Issue.7, pp.78-83, 2021.

MLA Style Citation: Vikas Singhal, Devendra Singh, Sanjai Gupta "Literature Review on Improving Data Security using DES and DCT." International Journal of Computer Sciences and Engineering 9.7 (2021): 78-83.

APA Style Citation: Vikas Singhal, Devendra Singh, Sanjai Gupta, (2021). Literature Review on Improving Data Security using DES and DCT. International Journal of Computer Sciences and Engineering, 9(7), 78-83.

BibTex Style Citation:
@article{Singhal_2021,
author = {Vikas Singhal, Devendra Singh, Sanjai Gupta},
title = {Literature Review on Improving Data Security using DES and DCT},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {7 2021},
volume = {9},
Issue = {7},
month = {7},
year = {2021},
issn = {2347-2693},
pages = {78-83},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=5369},
doi = {https://doi.org/10.26438/ijcse/v9i7.7883}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v9i7.7883}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=5369
TI - Literature Review on Improving Data Security using DES and DCT
T2 - International Journal of Computer Sciences and Engineering
AU - Vikas Singhal, Devendra Singh, Sanjai Gupta
PY - 2021
DA - 2021/07/31
PB - IJCSE, Indore, INDIA
SP - 78-83
IS - 7
VL - 9
SN - 2347-2693
ER -

VIEWS PDF XML
489 353 downloads 189 downloads
  
  
           

Abstract

Steganography is the art and science for hiding information by embedding data into cover media. Image processing in steganography is done mainly by using spatial domain and frequency domain. In this review literature, hiding spatial domain using LSB technique and hiding frequency domain using DCT technique is studied and compared. BMP cover images with 256x256 and 512x512 resolutions for LSB and DCT techniques are used for experimental study. For DCT technique, various BMP image is converted to JPEG image. The DCT technique is used to hide the data into the JPEG cover image. The resultant stego image obtained in JPEG is converted to BMP stego image. Thereafter, the comparison tool PSNR is used to compare the BMP images obtained from LSB and DCT. The data security and privacy play an important role for data transmission for exchanging information over internet. The two techniques like; cryptography and steganography both are pillars to be utilized for securing digital data by using different methods specifically DES (Data Encryption Standard) and DCT (Discrete Cosine Transform). The mixture of DES and DCT improves the digital data security with multiple level of security for encryption process which shows better results. In this research, we analyze the combination of cryptographic method with DES technique and stenographic method with DCT technique to develop a framework for digital data security environment. This paper also presents a proposed least significant bit (LSB) based framework for DES and DCT to secure digital data with better compression approach.

Key-Words / Index Term

LSB, DCT, DES, Stego Image

References

[1] Anderson, R. J., & Petitcolas, F. A., On the limits of steganography.Selected Areas in Communications, IEEE Journal on, 16(4), 474- 481, 1998.
[2] Anderson, R., Stretching the limits of steganography. In Information Hiding. Springer Berlin Heidelberg, pp. 39-48, 1996, January.
[3] Amin, M. M., Salleh, M., Ibrahim, S., Katmin, M. R., & Shamsuddin, M. Z. I. Information hiding using steganography. InTelecommunication Technology, 2003. NCTT 2003 Proceedings. 4th National Conference on, pp. 21- 25, 2003, January. IEEE.
[4] Saraswat, P. K., & Gupta, D. R., A Review of Digital Image Steganography. Journal of Pure and Applied Science & Technology Copyright, 2(1), 98-106, 2011.
[5] General model of today’s Steganography. Retrieved on December 8, 2013 from: http://www.datahide.com
[6] Cheddad, A., Condell, J., Curran, K., & Mc Kevitt, P., Digital image steganography: Survey and analysis of current methods. Signal processing, 90(3), 727-752, 2010.
[7] Hemalatha, S., Acharya, U. D., Renuka, A., & Kamath, P. R., A secure and high capacity image steganography technique. Signal & Image Processing: An International Journal (SIPIJ) Vol, 4, 83-89, 2013.
[8] Kaur, R., & Singh, B., Survey and Analysis of Various Steganography Techniques. International Journal of Computer Science and Advanced Technology, 6(3), 561 – 566, 2012.
[9] Hamid, N., Yahya, A., Ahmad, R. B., & Al-Qershi, O. M., Image steganography techniques: an overview. International Journal of Computer Science and Security (IJCSS), 6(3), 168-187, 2012.
[10] Rouse, M. (2010). Retrieved on December 19, 2013, from: http://whatis.techtarget.com
[11] Tiwari, N., & Shandilya, D. M., Evaluation of Various LSB based Methods of Image Steganography on GIF File Format. International Journal of Computer Applications, 0975–8887, 2010.
[12] Grantham, B., “Bitmap Steganography: An Introduction”, 2007.
[13] Fridrich, J., Goljan, M., & Hogea, D., Steganalysis of JPEG images: Breaking the F5 algorithm. In Information Hiding, Springer Berlin Heidelberg. pp.310-323, 2003, January.
[14] Provos, N., & Honeyman, P., Hide and seek: An introduction to steganography. Security & Privacy, IEEE, 1(3), 32-44, 2003.
[15] Jókay, M., & Morav?ík, T, Image-based JPEG steganography. Tatra Mountains Mathematical Publications, 45(1), 65-74, 2010.
[16] Morkel, T., Eloff, J. H., & Olivier, M.S., An overview of image steganography. In ISSA, pp. 1-11, 2005, June.
[17] Wang, S.J., Steganography of capacity required using modulo operator for embedding secret image. Applied Mathematics and Computation, 164(1), 99-116, 2005.
[18] Hariri, M., Karimi, R., & Nosrati, M., An introduction to steganography methods. World Applied Programming, 1(3),191-195, 2011.
[19] Joshi, R., Gagnani, L., & Pandey, S., Image Steganography With LSB.International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), 2(1), pp-228, 2013.
[20] Sutaone, M. S., & Khandare, M.V., Image based steganography using LSB insertion technique. In Wireless, Mobile and Multimedia Networks, 2008. IET International Conference on, pp. 146-151, 2008 January. IET.
[21] Sravanthi, M. G., Devi, M. B. S., Riyazoddin, S. M., & Reddy, M.J., A Spatial Domain Image Steganography Technique Based on Plane Bit Substitution Method. Global Journal of Computer Science and Technology Graphics & Vision, 12 (15), 2012.
[22] Gupta, M., & Garg, A.K., Analysis of Image Compression Algorithm Using DCT. International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 Vol. 2, 515-521, 2012.