SlideShare a Scribd company logo
1 of 12
Download to read offline
Jan Zizka (Eds) : CCSIT, SIPP, AISC, PDCTA - 2013
pp. 133–144, 2013. © CS & IT-CSCP 2013 DOI : 10.5121/csit.2013.3614
A HYBRID APPROACH FOR ENSURING
SECURITY IN DATA COMMUNICATION
Shailender Gupta1
, Bharat Bhushan2
, Surbhi Singhania3
and
Jeetesh Gulani4
1,2,3
Department of Electronics Engineering, YMCA University of Science and
Technology, Faridabad, India
1
shailender81@gmail.com, 2
bhrts@gmail.com, 3
surbhidec24@gmail.com
4
Indian Institute of Technology Kharagpur,India
4
jeetesh1993@iitkgp.ac.in
ABSTRACT
For a very long time, various forms of steganographic and cryptographic techniques have been
used to ensure security in data communication. Whereas steganography is the art of hiding the
fact that any communication is taking place, cryptography on the other hand ensures data
security by changing the very form of the data being communicated by using a symmetric or an
asymmetric key. But, both the methods are susceptible to being weakened by a challenger. In
steganography, there is always a possibility of detection of the presence of a message by the
opponent and most of the cryptographic techniques are vulnerable to disclosure of the key. This
paper proposes a hybrid approach where in image steganography and cryptography are
combined to protect the sensitive data thereby ensuring improved security in data
communication. To find the impact of the same, a simulator was designed in MATLAB and
corresponding time complexities were recorded. The simulation results depict that this hybrid
technique although increases the time complexity but ensures an enhanced security in data
communication.
KEYWORDS
Cryptography, Image Steganography, information hiding, time complexity
1. INTRODUCTION
With an increase in data communication in the recent past, the security of data over a
communication channel is of paramount importance. Various Steganographic [1-2] and
Cryptographic [3] algorithms have been proposed to ensure data security in communication.
Steganography is a smart strategy which calls for hiding the sensitive information in other data
which is generally considered to be ordinary by an unaware viewer. This cover data may be in the
form of text, image, audio, video, etc. The security of the data communication depends on the
ingenuity in the alteration of the cover such that the adversary is not able to detect the presence of
a secret message. The receiver uses the reverse approach to extract the data from the modified
cover.
134 Computer Science & Information Technology (CS & IT)
Cryptography refers to a science of transforming the messages into an unreadable form by means
of a set procedure hence making the core data inaccessible to an interfering individual. In this
approach, the original message called the plain text is converted into an encoded message called
the cipher text with the help of an encryption algorithm. This cipher text is then sent over a
communication channel. On the receiver side a decryption algorithm is used to recover the plain
text.
Despite the above mentioned techniques being advanced and sophisticated, none of them provide
a fool proof safety in communication. Steganographic techniques used deteriorate the image
quality [4-5] hence presence of data in images can be easily detected by malicious nodes. On the
other hand cryptographic techniques [3] has the disadvantage that if an intruder is able to figure
out the key then he will be able to decrypt the data. Hence, none of the methods are completely
guaranteed in a stand-alone fashion.
This paper proposes a novel scheme to provide a comparatively high security to the data. In this
scheme, a combination of the above mentioned techniques offers advantages of both
steganography and cryptography. The encryption methods used are: Data encryption standard
(DES) algorithm [3] and Diffie-Hellman algorithm [3], whereas the size of the key implemented
is 32 bit and 64 bit. The encrypted data is embedded in the images of different sizes using three
different algorithms namely: Pseudorandom Substitution, Transform Domain (DCT) and
Distortion. To check the efficacy of the proposal the time complexity of the process at the sender
and receiver side was recorded.
The rest of the paper has been organized as follows: Section 2 provides the current
steganographic techniques used in this paper, Section 3 provides the problem identification,
Section 4 provides the proposed work for problem identified, Section 5 gives the simulation and
results of the proposed model, Section 6 gives the conclusion followed by references.
2. STEGANOGRAPHIC TECHNIQUES USED
2.1. Pseudo Random LSB- Substitution Method
The least significant bit substitution [6-11] method is the oldest method used for steganography.
A simple substitution method involves replacing the least significant bit of a first few pixels of
the image with that of the bits of the data. The change incurred in the pixel value is that of only
+/- 1. Therefore, the chances of these changes being noticed in the embedded image are very
minor.
This method being fairly banal and is susceptible to attacks. Therefore, we have introduced a
modification of the same by introducing pseudorandom substitutions. Here, instead of replacing
the bits of the ordered pixels the sender chooses a series of random pixels and replaces the LSB of
these bits with the data bits. The receiver must also choose the same random pixels to extract the
data from the LSB of these pixels. For this purpose the sender and receiver share a key. This key
is used as a seed to generate the same random numbers for embedding and extracting purpose.
This method can be further made robust by sharing a second seed which will help the sender and
receiver to choose the data-bits randomly from the complete set of data bits to be embedded. Thus
embedding random data bits in random pixel and as a result, improving security. Even if a hacker
is able to get hold of one key the absence of the second will make his effort go vain.
This method is good for transmitting large data as the image can hold the binary data of length up
till the total number of pixels of the image. Hence an RGB image can hold data as much as three
Computer Science & Information Technology (CS & IT) 135
times a gray scale image without any significant distortion. One major assumption of the method
is that the length of the embedded data must be known to both the receiver and the sender for
successful transmission.
2.2. Distortion Technique
This technique [12-15] is similar to the substitution technique except for the fact that it is
important, for the receiver and sender to have the original cover image. A pixel is chosen using
the pseudorandom method explained before. Next, the data bit to be embedded is evaluated. If the
binary bit is ‘0’ then the pixel is left as it is. On the other hand when it is ‘1’ a small value ∆x is
added to the pixel. This stego-image is then sent to the receiver.
The receiver subtracts the pixels of the received image from the original cover image he already
has. This results in an array of ∆x and 0 values. These elements are then accessed in the same
pseudorandom manner. If the value is zero the bit is read as ‘0’ and if it is ∆x it is read as 1. This
is altogether compiled to generate the data.
The distortion technique is faster compared to the substitution technique. It can also hold large
volumes of data in accordance to the image size. But it is also more vulnerable because if a
hacker has the cover image he may be able to access the data provided he knows the other
parameters. And the distortion of the image is more prominent compared to the substitution
methods.
2.3. Transform Domain Technique (DCT)
The distortion and substitution methods are vulnerable to any modifications in the image. The
processes like cropping, compressing, image processing, etc can largely destroy the information
embedded in the image. The transform domain methods [16] hide the data in the significant part
of the images hence; make it more robust against these disturbances. DCT is one of the transform
domain methods. This method is specifically designed to resist any changes in the secret data
caused by jpg image compression and still allow successful compression. Jpeg compression can
be explained with the help of the following block diagram (see Fig 1).
Figure 1. Jpeg Compression
2.3.1. JPEG Compression
The Quantization matrix used at the step of quantization is the most important element of the
process. It is a standard matrix given by:
136 Computer Science & Information Technology (CS & IT)
Referring to this matrix, the sender and receiver agree on the two indices (j1, k1) and (j2, k2)
(say). These are chosen such that the coefficients at these indices correspond to the cosine
function with middle frequencies. This ensures that the information is stored in the significant
parts of the image. According to the above shown matrix the positions (5, 2) and (4, 3) or (2, 3)
and (4, 1) are favorable for this operation.
The image is divided into an array of 2 dimensional matrices of the magnitude 8x8. The DCT
operation is performed on these matrices to obtain another set of 8x8 matrices (say D).
Starting with the first block and the first data bit, we check if the data bit is ‘1’ or ‘0’. Next,
compare the magnitude of coefficients at the chosen indices. If D (j1, k1)>D (j2, k2) and the bit to
be embedded is ‘1’ then the indices are left as it is. Else to embed ‘0’ the coefficient values are
swapped. Alternately if D (j1, k1) <D (j2, k2) and the bit to be embedded is ‘1’ then the
coefficients are swapped whereas for ‘0’ they are left as it is. Also this algorithm ensures that |D
(j1, k1)- D (j2, k2)|>x, where x>0.
This is done by increasing the value of the larger coefficient and by further decreasing that of the
smaller to maintain a constant difference between the two.
The factor of distortion depends upon the constant x and the location of the coefficient. This
method causes visibly more distortion that the previous two methods and also consumes more
time. Moreover the capacity of a particular sized image is fixed. If we try to embed the data more
than its capacity the secret data is lost due to superimposition. Yet, it is the most robust method
for obtaining compressed images and to perform other manipulations without losing the
embedded secret data. The security can be improved by choosing the blocks and data in the
pseudorandom manner.
3. PROBLEM IDENTIFICATION
Neither steganography nor cryptography is standalone solution to provide security in
communication networks. In steganography the presence of data can be easily detected by
observing distortion in the cover image. On the other hand cryptographic techniques can fail in
scenario of key disclosure by nodes having rogue intentions. In our opinion if the data embedded
in the image is encrypted, the confidentiality of the data would be maintained even if it is
extracted by an intruder node. Thus it would be beneficial if the secret data is encrypted before
applying steganography. Some researchers who have previously worked in this direction as
follows:
Computer Science & Information Technology (CS & IT) 137
Sujay Narayana et. al. [17] proposed a scheme using S-DES algorithm combined with LSB
substitution technique. The image to be hidden was first encrypted using a key and the encrypted
image was embedded in the cover image.
Shailender Gupta et. al. [18] proposed a hybrid model that combines steganography and
cryptography. The Cryptographic technique used was RSA and Diffie Hellman and the
steganographic technique used was LSB substitution.
This paper has been inspired from the above mentioned literature. This paper focuses on
embedding a text file in the image unlike Sujay narayanas et. al. attempt which was centrally
based on the idea of hiding an image in a cover image. Moreover Shailender guptas et. al. used
only 32 bit key for the purpose of encryption and decryption and uses only LSB substitution
steganographic technique. The idea proposed in the current paper is an improvement over this
work.
4. THE PROPOSED SCHEME
4.1. Sender side
The sender side process is depicted in figure 2. The secret message called the plain text is
converted into cipher test using one of the two mentioned algorithms i.e. DES or Diffie-Helman
using a 32 bit or 64 bit. This cipher text is then converted to bits. These bits are embedded into a
cover image using one of the three steganographic techniques namely pseudorandom substitution,
Transform Domain (DCT) or Distortion. The resultant encrypted stego-image is sent over a
channel.
Figure 2. Block diagram of proposed scheme at sender side
4.2. Receiver side
The complete process at the receiver side is depicted in figure 3. The received encrypted stego-
image is subjected to steganographic extraction process and decryption technique corresponding
to the techniques used at transmitter side to recover the plain text.
Image file
Plain text
(secret
message)
Convert cipher
text to bits
Apply
Steganography
Encrypted
Stego
Image
Encryption Key
32 / 64 bit
1. Diffie
Hellman
2. DES
138 Computer Science & Information Technology (CS & IT)
Figure 3. Block diagram of proposed scheme at receiver side
5. SIMULATION AND RESULTS
5.1. Performance metrics
The following parameters were used to record the results:
• Time complexity- Defined as the total time taken by the sender side to encrypt and
embed the secret message in the cover image, combined with the time taken by the
receiver to extract and decrypt the secret message from the transmitted image.
• Qualitative comparison of images- The original cover image and the modified images
(after cryptography and steganography) were placed side by side and subjected to visual
inspection.
5.2. Simulation setup
A simulator was designed in MATLAB 7.12.0 to simulate various combinations of the
cryptographic and steganographic techniques at different key and image sizes. The simulation
setup parameters used are as shown below:
Table 1. Setup parameters.
Component Parameter Value of parameter
Steganography Techniques Substitution, Distortion, DCT
Image Size • 1024x1024
• 1536x1536
• 2048x2048
• 3072x3072
• 4096x4096
• 5120x5120
Plain text size 1 K Byte
Cryptography Technique Diffie Hellman
Key = Gxy mod (P)
Where for
32 Bit
p = 2863311530, g=112557
x=637, y=597
64 Bit
p= 768614336404564650, g=112557
x=637, y=597
Image file
Plain text
(secret
message)
Convert
encrypted data
to bits
Apply
steganography
extraction
1. Substitution
2. DCT
3. Distortion
Encrypted
Stego
Image
Decryption Key
32 / 64 bit
Decryption
1. Diffie
Hellman 2.
RSA
Computer Science & Information Technology (CS & IT) 139
DES
Key(k)=4294967295 (32 bit)
Key(k)=18446744073709551615(64
bit)
Processor Type i5-64 bit
RAM: 2 GB
speed: 2370 MHz
5.3. Simulation results
This section is dedicated to depicting the impact of the combination of the steganographic and
cryptographic techniques on images of various sizes. Before discussing time complexities two
important things should be kept in mind:
• The time shown in all cases is the total time elapsed on the sender and receiver side. It
does not include time elapsed in transfer of information from source to destination.
• The time complexities in case of Diffie- Helman (combined with stego techniques)
include the time of key calculation on the receiver as well as the sender side.
5.3.1. Results of Steganography and 32 bit cryptography
5.3.1.1. Qualitative results
Figure 4 depicts the effect of combination of Steganography and Cryptography (32 bit) on the
quality of the cover image (1024x1024). It can be observed that:
• Pseudorandom Substitution combined with Diffie-Helman produces best qualitative
result followed by pseudorandom substitution with DES.
• DCT combined with DES produces the worst qualitative result.
In the similar manner, the impact of this scheme on images of different size i.e. 1536x1536,
2048x2048, 3072x3072, 4096x4096 pixels was recorded.
Figure 4(a). Original Image Figure 4 (b). Result of applying DCT
140 Computer Science & Information Technology (CS & IT)
Figure 4(c). Result of applying
Distortion
Figure 4 (d). Result of applying
Substitution
Figure 4(e). Result of DES plus DCT Figure 4(f). Result of Diffie-Helman
plus DCT
Figure 4(g). Result of DES plus
Substitution
Figure 4(h). Result of Diffie-Helman
plus Substitution
Figure 4(i). Result of DES plus
Distortion
Figure 4(j). Result of Diffie-Helman
plus Distortion
Figure 4. Impact of proposed technique on images (Image size = 1024X1024 pixels)
Computer Science & Information Technology (CS & IT) 141
5.3.1.2. Qualitative results
Figure 5 depicts the total time taken by a complete process of the combination including the time
on sender and receiver side. It can be observed that:
• Distortion combined with DES has minimum time complexity
• DCT combined with Diffie-Helman has maximum time complexity
• Time complexity for all the combinations increases with an increase in the image size.
Time complexity for image size 1024 x 1024
0
20
40
60
80
100
120
140
160
180
Technique
Timecompexity
Substitutiononly
Substitution+Delfi-Helman
Substitution+DES
Distortiononly
Distortion+Delfi-Helman
Distortion+DES
DCTonly
DCT+Delfi-Helman
DCT+DES
Figure 5(a). Time Complexity (1024X1024
pixel)
Time complexity for image size 1536 x 1536
0
50
100
150
200
250
300
350
Technique
Timecompexity
Substitutiononly
Substitution+Delfi-Helman
Substitution+DES
Distortiononly
Distortion+Delfi-Helman
Distortion+DES
DCTonly
DCT+Delfi-Helman
DCT+DES
Figure 5(b). Time Complexity (1536X1536
pixel)
Time complexity for image size 2048 x 2048
0
100
200
300
400
500
600
Technique
Timecompexity
Substitutiononly
Substitution+Delfi-Helman
Substitution+DES
Distortiononly
Distortion+Delfi-Helman
Distortion+DES
DCTonly
DCT+Delfi-Helman
DCT+DES
Figure 5(c). Time Complexity (2048X2048
pixel)
Time complexity for image size 3072 x 3072
0
200
400
600
800
1000
1200
1400
Technique
Timecompexity
Substitutiononly
Substitution+Delfi-Helman
Substitution+DES
Distortiononly
Distortion+Delfi-Helman
Distortion+DES
DCTonly
DCT+Delfi-Helman
DCT+DES
Figure 5(d). Time Complexity (3072X3072
pixel)
Time complexity for image size 4096x x4096
0
500
1000
1500
2000
2500
Technique
Timecompexity
Substitutiononly
Substitution+Delfi-Helman
Substitution+DES
Distortiononly
Distortion+Delfi-Helman
Distortion+DES
DCTonly
DCT+Delfi-Helman
DCT+DES
Figure 5(f). Time Complexity (4096X4096 pixel)
Figure 5. Impact on Time complexity of Proposed Technique
5.3.2. Results of Steganography and 64 bit cryptography
5.3.2.1. Qualitative result
Figure 6 depicts the effect of combination of Steganography and Cryptography (64 bit) on the
quality of the cover image (2048x2048). It can be observed that:
142 Computer Science & Information Technology (CS & IT)
• Pseudorandom Substitution combined with Diffie-Helman produces best qualitative
result followed by pseudorandom substitution with DES.
• DCT combined with DES produces the worst qualitative result.
In the similar manner, the impact of this scheme on images of different size i.e. 3072x3072,
4096x4096, 5120x5120 pixels was recorded.
Figure 6(a). Original image Figure 6(b). Result of applying DCT
only
Figure 6(c). Result of applying
Distortion
Figure 6(d). Result of applying
Substitution
Figure 6(e). Result of a DES plus
Substitution
Figure 6(f). Result of Diffie-Helman
plus Substitution
Figure 6. Impact of proposed technique on images (Image size = 3072X3072 pixels)
5.3.2.2. Results of time complexity
Figure 7 depicts the total time taken by a complete process of the combination including the time
on sender and receiver side. It can be observed that:
• Distortion combined with DES has minimum time complexity
• DCT combined with Diffie-Helman has maximum time complexity
• Time complexity for all the combinations increases with an increase in the image size
Computer Science & Information Technology (CS & IT) 143
Time complexity for image size 2048 x 2048
0
100
200
300
400
500
600
700
800
Technique
Timecomplexity
Subtitution
Substitution + DES
Substitution + Deffie Hellman
Distortion only
Distortion + DES
Distortion + Deffie Hellman
DCT
DCT + DES
DCT + Deffie Hellman
Figure 7(a). Time Complexity (2048X2048
pixel)
Time complexity for image size 3072 x 3072
0
200
400
600
800
1000
1200
1400
1600
1800
Technique
Timecomplexity
Subtitution
Substitution + DES
Substitution + Deffie Hellman
Distortion only
Distortion + DES
Distortion + Deffie Hellman
DCT
DCT + DES
DCT + Deffie Hellman
Figure 7(b). Time Complexity (3072x3072
pixel)
Time complexity for image size 4096 x 4096
0
500
1000
1500
2000
2500
3000
3500
Technique
Timecomplexity
Subtitution
Substitution + DES
Substitution + Deffie Hellman
Distortion only
Distortion + DES
Distortion + Deffie Hellman
DCT
DCT + DES
DCT + Deffie Hellman
Figure 7(c). Time Complexity (4096x4096
pixel)
Time complexity for image size 5120 x 5120
0
500
1000
1500
2000
2500
3000
3500
4000
Technique
Timecomplexity
Subtitution
Substitution + DES
Substitution + Deffie Hellman
Distortion only
Distortion + DES
Distortion + Deffie Hellman
DCT
DCT + DES
DCT + Deffie Hellman
Figure 7(d). Time Complexity (5120X5120
pixel)
Figure 7. Impact on Time complexity of Proposed Technique
6. CONCLUSION
In this paper a new scheme of combining steganography and cryptography has been proposed.
Where steganography eliminates any chances of detection of hidden data being present in the
cover image, text, etc., cryptography ensures data confidentiality by changing the very form of
data. Thus the hybrid approach ensures a higher degree of data security compared to either of the
techniques applied alone. After analysing the results of the application of the proposal it can be
concluded:
• The time complexity of this hybrid process is much more than that of pure
steganography.
• As the size of the key used for encryption and decryption increases time complexity
further increases.
• There is no major effect on the process of steganography on adding it to cryptography
because the data being embedded is in the form of bits in either case.
• On increasing the size of the image used as a cover, the time complexity increases even
more.
• DCT Combined with Diffie-Helman has the highest time complexity in comparison to
any other proposed combination.
• The pseudorandom substitution combined with any cryptographic technique provides
least distortion in image quality.
These results can be very useful to researchers who wish to use both steganography and
cryptography to secure data in communication networks.
144 Computer Science & Information Technology (CS & IT)
ACKNOWLEDGEMENTS
The authors would like to thank everyone, just everyone!
REFERENCES
[1] Neil F. Johnson and Sushil Jajodia, "Steganalysis of Image Created Using Current Steganography
Software", Workshop of Information Hiding Proceedings, Portland Oregon, USA,15-17 April,1998.
Lecture Notes in Computer Science, Vol.1525, Springer-Verlag (1998).
[2] Clair, Bryan, “Steganography: How to Send a Secret Message”, 8 Nov. 2001
www.strangehorizons.com/2001/20011008/steganography.shtml.
[3] “Cryptography and Network Security: principles and practices”, William Stallings, pearsons
education, first Indian reprint 2003.
[4] Rhodas, G. B., “Method and Apparatus Responsive to a Code Signal Conveyed Through a Graphic
Image”, U.S. Patent 5,710,834, 1998.
[5] Swanson, M. D., B. Zhu, and A. H. Tewk, “Transparent Robust Image Watermarking", in
Proceedings of the IEEE International Conference on Image Processing, vol. 3, 1996, pp. 211-214.
[6] Bender, W., D. Gruhl, and N. Morimoto, “Techniques for data hiding”, IBM Systems Journal , vol.
35, no. 3/4, 1996, pp. 131-336.
[7] Moller. S.A., Pitzmann, and I. Stirand, “Computer Based Steganography: How It Works and Why
Therefore Any Restrictions on Cryptography Are Nonsense, At Best”, in Information Hiding: First
International Workshop, Proceedings, vol. 1174 of Lecture Notes in Computer Science, Springer,
1996, pp. 7-21.
[8] Gruhl, D., A. Lu, and W. Bender, “Echo Hiding in Information Hiding”, First International
Workshop, Proceedings, vol. 1174 of Lecture Notes in Computer Science, Springer,1996, pp. 295-
316.
[9] Kurak, C., and J. McHughes, “A Cautionary Note On Image Downgrading”, in IEEE Computer
Security Applications Conference 1992, Proceedings, IEEE Press, 1992, pp. 153-159.
[10] Van Schyndel, R. G., A. Tirkel, and C. F. Osborne, “A Digital Watermark”, in Proceedings of the
IEEE International Conference on Image Processing, vol. 2, 1994, pp. 86-90.
[11] Johnson, N. F., and S. Jajodia, “Exploring Steganography: Seeing the Unseen", IEEE Computer, vol.
31, no. 2, 1998, pp. 26-34.
[12] Maxemchuk, N. F., “Electronic Document Distribution”, AT&T Technical Journal,
September/October 1994, pp. 73-80.
[13] Low, S. H., et al., Document Marking and Identifications Using Both Line and Word Shifting," in
Proceedings of Infocom'95, 1995, pp. 853-860.
[14] Low, S. H., N. F. Maxemchuk, and A. M. Lapone, “Document Identification for Copyright Protection
Using Centroid Detection”, IEEE Transactions on Communications, vol. 46, no. 3, 1998, pp. 372-383.
[15] Low, S. H., and N. F. Maxemchuk, “Performance Comparison of Two Text Marking Methods”, IEEE
Journal on Selected Areas in Communications, vol. 16, no. 4, 1998, pp. 561-572.
[16] Rhodas, G. B., “Method and Apparatus Responsive to a Code Signal Conveyed Through a Graphic
Image”, U.S. Patent 5,710,834, 1998.
[17] Sujay Nararayana and Gaurav Prasad, “ Two New Approaches For Secured Image Steganography
Using Cryptographic Technique and Type Conversions” , Signal and Image Processing: An
International Journal (SIPIJ) Vol. 1, No. 2, December 2010.
[18] Shailender Gupta, Ankur Goyal And Bharat Bhushan, “Information Hiding Using Least Significant
Steganography and Cryptography”, I. J Modern Education and Computer Science, vol. 6, pp. no. 27-
34, IJMECS-2012.

More Related Content

What's hot

An ideal steganographic scheme in networks using twisted payload
An ideal steganographic scheme in networks using twisted payloadAn ideal steganographic scheme in networks using twisted payload
An ideal steganographic scheme in networks using twisted payloadeSAT Journals
 
Dft based individual extraction of steganographic compression of images
Dft based individual extraction of steganographic compression of imagesDft based individual extraction of steganographic compression of images
Dft based individual extraction of steganographic compression of imageseSAT Journals
 
Dft based individual extraction of steganographic compression of images
Dft based individual extraction of steganographic compression of imagesDft based individual extraction of steganographic compression of images
Dft based individual extraction of steganographic compression of imageseSAT Publishing House
 
Highly secure scalable compression of encrypted images
Highly secure scalable compression of encrypted imagesHighly secure scalable compression of encrypted images
Highly secure scalable compression of encrypted imageseSAT Journals
 
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel SubstitutionImage Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitutionijsrd.com
 
Hybrid Approach for Improving Data Security and Size Reduction in Image Stega...
Hybrid Approach for Improving Data Security and Size Reduction in Image Stega...Hybrid Approach for Improving Data Security and Size Reduction in Image Stega...
Hybrid Approach for Improving Data Security and Size Reduction in Image Stega...IRJET Journal
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceinventy
 
Cecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in imageCecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in imageijctet
 
Protecting Data by Improving Quality of Stego Image based on Enhanced Reduced...
Protecting Data by Improving Quality of Stego Image based on Enhanced Reduced...Protecting Data by Improving Quality of Stego Image based on Enhanced Reduced...
Protecting Data by Improving Quality of Stego Image based on Enhanced Reduced...IJECEIAES
 
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...IOSR Journals
 
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...IJCSIS Research Publications
 
A robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingA robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingijctet
 
IRJET- Encryption and Authentication of Image by using Data Hiding
IRJET- Encryption and Authentication of Image by using Data HidingIRJET- Encryption and Authentication of Image by using Data Hiding
IRJET- Encryption and Authentication of Image by using Data HidingIRJET Journal
 
Conditional entrench spatial domain steganography
Conditional entrench spatial domain steganographyConditional entrench spatial domain steganography
Conditional entrench spatial domain steganographysipij
 
Two level data security using steganography and 2 d cellular automata
Two level data security using steganography and 2 d cellular automataTwo level data security using steganography and 2 d cellular automata
Two level data security using steganography and 2 d cellular automataeSAT Publishing House
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansionSreeda Perikamana
 
Implementation of image steganography using lab view
Implementation of image steganography using lab viewImplementation of image steganography using lab view
Implementation of image steganography using lab viewIJARIIT
 
A novel efficient multiple encryption algorithm for real time images
A novel efficient multiple encryption algorithm for real time images A novel efficient multiple encryption algorithm for real time images
A novel efficient multiple encryption algorithm for real time images IJECEIAES
 
AN EFFECTIVE SEMANTIC ENCRYPTED RELATIONAL DATA USING K-NN MODEL
AN EFFECTIVE SEMANTIC ENCRYPTED RELATIONAL DATA USING K-NN MODELAN EFFECTIVE SEMANTIC ENCRYPTED RELATIONAL DATA USING K-NN MODEL
AN EFFECTIVE SEMANTIC ENCRYPTED RELATIONAL DATA USING K-NN MODELijsptm
 
Intelligent Handwritten Digit Recognition using Artificial Neural Network
Intelligent Handwritten Digit Recognition using Artificial Neural NetworkIntelligent Handwritten Digit Recognition using Artificial Neural Network
Intelligent Handwritten Digit Recognition using Artificial Neural NetworkIJERA Editor
 

What's hot (20)

An ideal steganographic scheme in networks using twisted payload
An ideal steganographic scheme in networks using twisted payloadAn ideal steganographic scheme in networks using twisted payload
An ideal steganographic scheme in networks using twisted payload
 
Dft based individual extraction of steganographic compression of images
Dft based individual extraction of steganographic compression of imagesDft based individual extraction of steganographic compression of images
Dft based individual extraction of steganographic compression of images
 
Dft based individual extraction of steganographic compression of images
Dft based individual extraction of steganographic compression of imagesDft based individual extraction of steganographic compression of images
Dft based individual extraction of steganographic compression of images
 
Highly secure scalable compression of encrypted images
Highly secure scalable compression of encrypted imagesHighly secure scalable compression of encrypted images
Highly secure scalable compression of encrypted images
 
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel SubstitutionImage Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
 
Hybrid Approach for Improving Data Security and Size Reduction in Image Stega...
Hybrid Approach for Improving Data Security and Size Reduction in Image Stega...Hybrid Approach for Improving Data Security and Size Reduction in Image Stega...
Hybrid Approach for Improving Data Security and Size Reduction in Image Stega...
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
Cecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in imageCecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in image
 
Protecting Data by Improving Quality of Stego Image based on Enhanced Reduced...
Protecting Data by Improving Quality of Stego Image based on Enhanced Reduced...Protecting Data by Improving Quality of Stego Image based on Enhanced Reduced...
Protecting Data by Improving Quality of Stego Image based on Enhanced Reduced...
 
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
 
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
 
A robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingA robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarking
 
IRJET- Encryption and Authentication of Image by using Data Hiding
IRJET- Encryption and Authentication of Image by using Data HidingIRJET- Encryption and Authentication of Image by using Data Hiding
IRJET- Encryption and Authentication of Image by using Data Hiding
 
Conditional entrench spatial domain steganography
Conditional entrench spatial domain steganographyConditional entrench spatial domain steganography
Conditional entrench spatial domain steganography
 
Two level data security using steganography and 2 d cellular automata
Two level data security using steganography and 2 d cellular automataTwo level data security using steganography and 2 d cellular automata
Two level data security using steganography and 2 d cellular automata
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansion
 
Implementation of image steganography using lab view
Implementation of image steganography using lab viewImplementation of image steganography using lab view
Implementation of image steganography using lab view
 
A novel efficient multiple encryption algorithm for real time images
A novel efficient multiple encryption algorithm for real time images A novel efficient multiple encryption algorithm for real time images
A novel efficient multiple encryption algorithm for real time images
 
AN EFFECTIVE SEMANTIC ENCRYPTED RELATIONAL DATA USING K-NN MODEL
AN EFFECTIVE SEMANTIC ENCRYPTED RELATIONAL DATA USING K-NN MODELAN EFFECTIVE SEMANTIC ENCRYPTED RELATIONAL DATA USING K-NN MODEL
AN EFFECTIVE SEMANTIC ENCRYPTED RELATIONAL DATA USING K-NN MODEL
 
Intelligent Handwritten Digit Recognition using Artificial Neural Network
Intelligent Handwritten Digit Recognition using Artificial Neural NetworkIntelligent Handwritten Digit Recognition using Artificial Neural Network
Intelligent Handwritten Digit Recognition using Artificial Neural Network
 

Similar to A Hybrid Approach for Ensuring Security in Data Communication

MESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHYMESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHYIRJET Journal
 
An Architectural Approach of Data Hiding In Images Using Mobile Communication
An Architectural Approach of Data Hiding In Images Using Mobile CommunicationAn Architectural Approach of Data Hiding In Images Using Mobile Communication
An Architectural Approach of Data Hiding In Images Using Mobile Communicationiosrjce
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
 
Iaetsd implementation of chaotic algorithm for secure image
Iaetsd implementation of chaotic algorithm for secure imageIaetsd implementation of chaotic algorithm for secure image
Iaetsd implementation of chaotic algorithm for secure imageIaetsd Iaetsd
 
A novel steganographic technique based on lsb dct approach by Mohit Goel
A novel steganographic technique based on lsb dct approach  by Mohit GoelA novel steganographic technique based on lsb dct approach  by Mohit Goel
A novel steganographic technique based on lsb dct approach by Mohit GoelMohit Goel
 
Security and imperceptibility improving of image steganography using pixel al...
Security and imperceptibility improving of image steganography using pixel al...Security and imperceptibility improving of image steganography using pixel al...
Security and imperceptibility improving of image steganography using pixel al...IJECEIAES
 
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...Dr. Amarjeet Singh
 
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHMSECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHMJournal For Research
 
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY IJCNCJournal
 
A Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and SteganographyA Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and SteganographyIJCNCJournal
 
Hybrid information security system via combination of compression, cryptogra...
Hybrid information security system via combination of  compression, cryptogra...Hybrid information security system via combination of  compression, cryptogra...
Hybrid information security system via combination of compression, cryptogra...IJECEIAES
 
Image Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH TechniqueImage Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH TechniqueEditor IJCATR
 
Survey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular FormSurvey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular Formijsrd.com
 
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...IRJET Journal
 
Selective image encryption using
Selective image encryption usingSelective image encryption using
Selective image encryption usingcsandit
 
SELECTIVE IMAGE ENCRYPTION USING DCT WITH AES CIPHER
SELECTIVE IMAGE ENCRYPTION USING DCT WITH AES CIPHERSELECTIVE IMAGE ENCRYPTION USING DCT WITH AES CIPHER
SELECTIVE IMAGE ENCRYPTION USING DCT WITH AES CIPHERcscpconf
 
A novel steganographic scheme based on
A novel steganographic scheme based onA novel steganographic scheme based on
A novel steganographic scheme based onacijjournal
 
An improved robust and secured image steganographic scheme
An improved robust and secured image steganographic schemeAn improved robust and secured image steganographic scheme
An improved robust and secured image steganographic schemeiaemedu
 

Similar to A Hybrid Approach for Ensuring Security in Data Communication (20)

MESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHYMESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHY
 
P017329498
P017329498P017329498
P017329498
 
An Architectural Approach of Data Hiding In Images Using Mobile Communication
An Architectural Approach of Data Hiding In Images Using Mobile CommunicationAn Architectural Approach of Data Hiding In Images Using Mobile Communication
An Architectural Approach of Data Hiding In Images Using Mobile Communication
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
 
Iaetsd implementation of chaotic algorithm for secure image
Iaetsd implementation of chaotic algorithm for secure imageIaetsd implementation of chaotic algorithm for secure image
Iaetsd implementation of chaotic algorithm for secure image
 
A novel steganographic technique based on lsb dct approach by Mohit Goel
A novel steganographic technique based on lsb dct approach  by Mohit GoelA novel steganographic technique based on lsb dct approach  by Mohit Goel
A novel steganographic technique based on lsb dct approach by Mohit Goel
 
Security and imperceptibility improving of image steganography using pixel al...
Security and imperceptibility improving of image steganography using pixel al...Security and imperceptibility improving of image steganography using pixel al...
Security and imperceptibility improving of image steganography using pixel al...
 
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
 
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHMSECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHM
 
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
 
A Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and SteganographyA Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and Steganography
 
Hybrid information security system via combination of compression, cryptogra...
Hybrid information security system via combination of  compression, cryptogra...Hybrid information security system via combination of  compression, cryptogra...
Hybrid information security system via combination of compression, cryptogra...
 
Image Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH TechniqueImage Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH Technique
 
Survey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular FormSurvey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular Form
 
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
 
Selective image encryption using
Selective image encryption usingSelective image encryption using
Selective image encryption using
 
SELECTIVE IMAGE ENCRYPTION USING DCT WITH AES CIPHER
SELECTIVE IMAGE ENCRYPTION USING DCT WITH AES CIPHERSELECTIVE IMAGE ENCRYPTION USING DCT WITH AES CIPHER
SELECTIVE IMAGE ENCRYPTION USING DCT WITH AES CIPHER
 
Ijariie1132
Ijariie1132Ijariie1132
Ijariie1132
 
A novel steganographic scheme based on
A novel steganographic scheme based onA novel steganographic scheme based on
A novel steganographic scheme based on
 
An improved robust and secured image steganographic scheme
An improved robust and secured image steganographic schemeAn improved robust and secured image steganographic scheme
An improved robust and secured image steganographic scheme
 

More from cscpconf

ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR cscpconf
 
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATIONcscpconf
 
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...cscpconf
 
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIESPROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIEScscpconf
 
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGICA SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGICcscpconf
 
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS cscpconf
 
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS cscpconf
 
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTICTWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTICcscpconf
 
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAINDETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAINcscpconf
 
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...cscpconf
 
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEMIMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEMcscpconf
 
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...cscpconf
 
AUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEWAUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEWcscpconf
 
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORKCLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORKcscpconf
 
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...cscpconf
 
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATAPROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATAcscpconf
 
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCHCHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCHcscpconf
 
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...cscpconf
 
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGESOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGEcscpconf
 
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXTGENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXTcscpconf
 

More from cscpconf (20)

ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
 
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
 
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
 
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIESPROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
 
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGICA SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
 
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
 
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
 
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTICTWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
 
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAINDETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
 
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
 
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEMIMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
 
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
 
AUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEWAUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEW
 
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORKCLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
 
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
 
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATAPROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
 
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCHCHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
 
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
 
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGESOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
 
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXTGENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
 

Recently uploaded

ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 

Recently uploaded (20)

ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 

A Hybrid Approach for Ensuring Security in Data Communication

  • 1. Jan Zizka (Eds) : CCSIT, SIPP, AISC, PDCTA - 2013 pp. 133–144, 2013. © CS & IT-CSCP 2013 DOI : 10.5121/csit.2013.3614 A HYBRID APPROACH FOR ENSURING SECURITY IN DATA COMMUNICATION Shailender Gupta1 , Bharat Bhushan2 , Surbhi Singhania3 and Jeetesh Gulani4 1,2,3 Department of Electronics Engineering, YMCA University of Science and Technology, Faridabad, India 1 shailender81@gmail.com, 2 bhrts@gmail.com, 3 surbhidec24@gmail.com 4 Indian Institute of Technology Kharagpur,India 4 jeetesh1993@iitkgp.ac.in ABSTRACT For a very long time, various forms of steganographic and cryptographic techniques have been used to ensure security in data communication. Whereas steganography is the art of hiding the fact that any communication is taking place, cryptography on the other hand ensures data security by changing the very form of the data being communicated by using a symmetric or an asymmetric key. But, both the methods are susceptible to being weakened by a challenger. In steganography, there is always a possibility of detection of the presence of a message by the opponent and most of the cryptographic techniques are vulnerable to disclosure of the key. This paper proposes a hybrid approach where in image steganography and cryptography are combined to protect the sensitive data thereby ensuring improved security in data communication. To find the impact of the same, a simulator was designed in MATLAB and corresponding time complexities were recorded. The simulation results depict that this hybrid technique although increases the time complexity but ensures an enhanced security in data communication. KEYWORDS Cryptography, Image Steganography, information hiding, time complexity 1. INTRODUCTION With an increase in data communication in the recent past, the security of data over a communication channel is of paramount importance. Various Steganographic [1-2] and Cryptographic [3] algorithms have been proposed to ensure data security in communication. Steganography is a smart strategy which calls for hiding the sensitive information in other data which is generally considered to be ordinary by an unaware viewer. This cover data may be in the form of text, image, audio, video, etc. The security of the data communication depends on the ingenuity in the alteration of the cover such that the adversary is not able to detect the presence of a secret message. The receiver uses the reverse approach to extract the data from the modified cover.
  • 2. 134 Computer Science & Information Technology (CS & IT) Cryptography refers to a science of transforming the messages into an unreadable form by means of a set procedure hence making the core data inaccessible to an interfering individual. In this approach, the original message called the plain text is converted into an encoded message called the cipher text with the help of an encryption algorithm. This cipher text is then sent over a communication channel. On the receiver side a decryption algorithm is used to recover the plain text. Despite the above mentioned techniques being advanced and sophisticated, none of them provide a fool proof safety in communication. Steganographic techniques used deteriorate the image quality [4-5] hence presence of data in images can be easily detected by malicious nodes. On the other hand cryptographic techniques [3] has the disadvantage that if an intruder is able to figure out the key then he will be able to decrypt the data. Hence, none of the methods are completely guaranteed in a stand-alone fashion. This paper proposes a novel scheme to provide a comparatively high security to the data. In this scheme, a combination of the above mentioned techniques offers advantages of both steganography and cryptography. The encryption methods used are: Data encryption standard (DES) algorithm [3] and Diffie-Hellman algorithm [3], whereas the size of the key implemented is 32 bit and 64 bit. The encrypted data is embedded in the images of different sizes using three different algorithms namely: Pseudorandom Substitution, Transform Domain (DCT) and Distortion. To check the efficacy of the proposal the time complexity of the process at the sender and receiver side was recorded. The rest of the paper has been organized as follows: Section 2 provides the current steganographic techniques used in this paper, Section 3 provides the problem identification, Section 4 provides the proposed work for problem identified, Section 5 gives the simulation and results of the proposed model, Section 6 gives the conclusion followed by references. 2. STEGANOGRAPHIC TECHNIQUES USED 2.1. Pseudo Random LSB- Substitution Method The least significant bit substitution [6-11] method is the oldest method used for steganography. A simple substitution method involves replacing the least significant bit of a first few pixels of the image with that of the bits of the data. The change incurred in the pixel value is that of only +/- 1. Therefore, the chances of these changes being noticed in the embedded image are very minor. This method being fairly banal and is susceptible to attacks. Therefore, we have introduced a modification of the same by introducing pseudorandom substitutions. Here, instead of replacing the bits of the ordered pixels the sender chooses a series of random pixels and replaces the LSB of these bits with the data bits. The receiver must also choose the same random pixels to extract the data from the LSB of these pixels. For this purpose the sender and receiver share a key. This key is used as a seed to generate the same random numbers for embedding and extracting purpose. This method can be further made robust by sharing a second seed which will help the sender and receiver to choose the data-bits randomly from the complete set of data bits to be embedded. Thus embedding random data bits in random pixel and as a result, improving security. Even if a hacker is able to get hold of one key the absence of the second will make his effort go vain. This method is good for transmitting large data as the image can hold the binary data of length up till the total number of pixels of the image. Hence an RGB image can hold data as much as three
  • 3. Computer Science & Information Technology (CS & IT) 135 times a gray scale image without any significant distortion. One major assumption of the method is that the length of the embedded data must be known to both the receiver and the sender for successful transmission. 2.2. Distortion Technique This technique [12-15] is similar to the substitution technique except for the fact that it is important, for the receiver and sender to have the original cover image. A pixel is chosen using the pseudorandom method explained before. Next, the data bit to be embedded is evaluated. If the binary bit is ‘0’ then the pixel is left as it is. On the other hand when it is ‘1’ a small value ∆x is added to the pixel. This stego-image is then sent to the receiver. The receiver subtracts the pixels of the received image from the original cover image he already has. This results in an array of ∆x and 0 values. These elements are then accessed in the same pseudorandom manner. If the value is zero the bit is read as ‘0’ and if it is ∆x it is read as 1. This is altogether compiled to generate the data. The distortion technique is faster compared to the substitution technique. It can also hold large volumes of data in accordance to the image size. But it is also more vulnerable because if a hacker has the cover image he may be able to access the data provided he knows the other parameters. And the distortion of the image is more prominent compared to the substitution methods. 2.3. Transform Domain Technique (DCT) The distortion and substitution methods are vulnerable to any modifications in the image. The processes like cropping, compressing, image processing, etc can largely destroy the information embedded in the image. The transform domain methods [16] hide the data in the significant part of the images hence; make it more robust against these disturbances. DCT is one of the transform domain methods. This method is specifically designed to resist any changes in the secret data caused by jpg image compression and still allow successful compression. Jpeg compression can be explained with the help of the following block diagram (see Fig 1). Figure 1. Jpeg Compression 2.3.1. JPEG Compression The Quantization matrix used at the step of quantization is the most important element of the process. It is a standard matrix given by:
  • 4. 136 Computer Science & Information Technology (CS & IT) Referring to this matrix, the sender and receiver agree on the two indices (j1, k1) and (j2, k2) (say). These are chosen such that the coefficients at these indices correspond to the cosine function with middle frequencies. This ensures that the information is stored in the significant parts of the image. According to the above shown matrix the positions (5, 2) and (4, 3) or (2, 3) and (4, 1) are favorable for this operation. The image is divided into an array of 2 dimensional matrices of the magnitude 8x8. The DCT operation is performed on these matrices to obtain another set of 8x8 matrices (say D). Starting with the first block and the first data bit, we check if the data bit is ‘1’ or ‘0’. Next, compare the magnitude of coefficients at the chosen indices. If D (j1, k1)>D (j2, k2) and the bit to be embedded is ‘1’ then the indices are left as it is. Else to embed ‘0’ the coefficient values are swapped. Alternately if D (j1, k1) <D (j2, k2) and the bit to be embedded is ‘1’ then the coefficients are swapped whereas for ‘0’ they are left as it is. Also this algorithm ensures that |D (j1, k1)- D (j2, k2)|>x, where x>0. This is done by increasing the value of the larger coefficient and by further decreasing that of the smaller to maintain a constant difference between the two. The factor of distortion depends upon the constant x and the location of the coefficient. This method causes visibly more distortion that the previous two methods and also consumes more time. Moreover the capacity of a particular sized image is fixed. If we try to embed the data more than its capacity the secret data is lost due to superimposition. Yet, it is the most robust method for obtaining compressed images and to perform other manipulations without losing the embedded secret data. The security can be improved by choosing the blocks and data in the pseudorandom manner. 3. PROBLEM IDENTIFICATION Neither steganography nor cryptography is standalone solution to provide security in communication networks. In steganography the presence of data can be easily detected by observing distortion in the cover image. On the other hand cryptographic techniques can fail in scenario of key disclosure by nodes having rogue intentions. In our opinion if the data embedded in the image is encrypted, the confidentiality of the data would be maintained even if it is extracted by an intruder node. Thus it would be beneficial if the secret data is encrypted before applying steganography. Some researchers who have previously worked in this direction as follows:
  • 5. Computer Science & Information Technology (CS & IT) 137 Sujay Narayana et. al. [17] proposed a scheme using S-DES algorithm combined with LSB substitution technique. The image to be hidden was first encrypted using a key and the encrypted image was embedded in the cover image. Shailender Gupta et. al. [18] proposed a hybrid model that combines steganography and cryptography. The Cryptographic technique used was RSA and Diffie Hellman and the steganographic technique used was LSB substitution. This paper has been inspired from the above mentioned literature. This paper focuses on embedding a text file in the image unlike Sujay narayanas et. al. attempt which was centrally based on the idea of hiding an image in a cover image. Moreover Shailender guptas et. al. used only 32 bit key for the purpose of encryption and decryption and uses only LSB substitution steganographic technique. The idea proposed in the current paper is an improvement over this work. 4. THE PROPOSED SCHEME 4.1. Sender side The sender side process is depicted in figure 2. The secret message called the plain text is converted into cipher test using one of the two mentioned algorithms i.e. DES or Diffie-Helman using a 32 bit or 64 bit. This cipher text is then converted to bits. These bits are embedded into a cover image using one of the three steganographic techniques namely pseudorandom substitution, Transform Domain (DCT) or Distortion. The resultant encrypted stego-image is sent over a channel. Figure 2. Block diagram of proposed scheme at sender side 4.2. Receiver side The complete process at the receiver side is depicted in figure 3. The received encrypted stego- image is subjected to steganographic extraction process and decryption technique corresponding to the techniques used at transmitter side to recover the plain text. Image file Plain text (secret message) Convert cipher text to bits Apply Steganography Encrypted Stego Image Encryption Key 32 / 64 bit 1. Diffie Hellman 2. DES
  • 6. 138 Computer Science & Information Technology (CS & IT) Figure 3. Block diagram of proposed scheme at receiver side 5. SIMULATION AND RESULTS 5.1. Performance metrics The following parameters were used to record the results: • Time complexity- Defined as the total time taken by the sender side to encrypt and embed the secret message in the cover image, combined with the time taken by the receiver to extract and decrypt the secret message from the transmitted image. • Qualitative comparison of images- The original cover image and the modified images (after cryptography and steganography) were placed side by side and subjected to visual inspection. 5.2. Simulation setup A simulator was designed in MATLAB 7.12.0 to simulate various combinations of the cryptographic and steganographic techniques at different key and image sizes. The simulation setup parameters used are as shown below: Table 1. Setup parameters. Component Parameter Value of parameter Steganography Techniques Substitution, Distortion, DCT Image Size • 1024x1024 • 1536x1536 • 2048x2048 • 3072x3072 • 4096x4096 • 5120x5120 Plain text size 1 K Byte Cryptography Technique Diffie Hellman Key = Gxy mod (P) Where for 32 Bit p = 2863311530, g=112557 x=637, y=597 64 Bit p= 768614336404564650, g=112557 x=637, y=597 Image file Plain text (secret message) Convert encrypted data to bits Apply steganography extraction 1. Substitution 2. DCT 3. Distortion Encrypted Stego Image Decryption Key 32 / 64 bit Decryption 1. Diffie Hellman 2. RSA
  • 7. Computer Science & Information Technology (CS & IT) 139 DES Key(k)=4294967295 (32 bit) Key(k)=18446744073709551615(64 bit) Processor Type i5-64 bit RAM: 2 GB speed: 2370 MHz 5.3. Simulation results This section is dedicated to depicting the impact of the combination of the steganographic and cryptographic techniques on images of various sizes. Before discussing time complexities two important things should be kept in mind: • The time shown in all cases is the total time elapsed on the sender and receiver side. It does not include time elapsed in transfer of information from source to destination. • The time complexities in case of Diffie- Helman (combined with stego techniques) include the time of key calculation on the receiver as well as the sender side. 5.3.1. Results of Steganography and 32 bit cryptography 5.3.1.1. Qualitative results Figure 4 depicts the effect of combination of Steganography and Cryptography (32 bit) on the quality of the cover image (1024x1024). It can be observed that: • Pseudorandom Substitution combined with Diffie-Helman produces best qualitative result followed by pseudorandom substitution with DES. • DCT combined with DES produces the worst qualitative result. In the similar manner, the impact of this scheme on images of different size i.e. 1536x1536, 2048x2048, 3072x3072, 4096x4096 pixels was recorded. Figure 4(a). Original Image Figure 4 (b). Result of applying DCT
  • 8. 140 Computer Science & Information Technology (CS & IT) Figure 4(c). Result of applying Distortion Figure 4 (d). Result of applying Substitution Figure 4(e). Result of DES plus DCT Figure 4(f). Result of Diffie-Helman plus DCT Figure 4(g). Result of DES plus Substitution Figure 4(h). Result of Diffie-Helman plus Substitution Figure 4(i). Result of DES plus Distortion Figure 4(j). Result of Diffie-Helman plus Distortion Figure 4. Impact of proposed technique on images (Image size = 1024X1024 pixels)
  • 9. Computer Science & Information Technology (CS & IT) 141 5.3.1.2. Qualitative results Figure 5 depicts the total time taken by a complete process of the combination including the time on sender and receiver side. It can be observed that: • Distortion combined with DES has minimum time complexity • DCT combined with Diffie-Helman has maximum time complexity • Time complexity for all the combinations increases with an increase in the image size. Time complexity for image size 1024 x 1024 0 20 40 60 80 100 120 140 160 180 Technique Timecompexity Substitutiononly Substitution+Delfi-Helman Substitution+DES Distortiononly Distortion+Delfi-Helman Distortion+DES DCTonly DCT+Delfi-Helman DCT+DES Figure 5(a). Time Complexity (1024X1024 pixel) Time complexity for image size 1536 x 1536 0 50 100 150 200 250 300 350 Technique Timecompexity Substitutiononly Substitution+Delfi-Helman Substitution+DES Distortiononly Distortion+Delfi-Helman Distortion+DES DCTonly DCT+Delfi-Helman DCT+DES Figure 5(b). Time Complexity (1536X1536 pixel) Time complexity for image size 2048 x 2048 0 100 200 300 400 500 600 Technique Timecompexity Substitutiononly Substitution+Delfi-Helman Substitution+DES Distortiononly Distortion+Delfi-Helman Distortion+DES DCTonly DCT+Delfi-Helman DCT+DES Figure 5(c). Time Complexity (2048X2048 pixel) Time complexity for image size 3072 x 3072 0 200 400 600 800 1000 1200 1400 Technique Timecompexity Substitutiononly Substitution+Delfi-Helman Substitution+DES Distortiononly Distortion+Delfi-Helman Distortion+DES DCTonly DCT+Delfi-Helman DCT+DES Figure 5(d). Time Complexity (3072X3072 pixel) Time complexity for image size 4096x x4096 0 500 1000 1500 2000 2500 Technique Timecompexity Substitutiononly Substitution+Delfi-Helman Substitution+DES Distortiononly Distortion+Delfi-Helman Distortion+DES DCTonly DCT+Delfi-Helman DCT+DES Figure 5(f). Time Complexity (4096X4096 pixel) Figure 5. Impact on Time complexity of Proposed Technique 5.3.2. Results of Steganography and 64 bit cryptography 5.3.2.1. Qualitative result Figure 6 depicts the effect of combination of Steganography and Cryptography (64 bit) on the quality of the cover image (2048x2048). It can be observed that:
  • 10. 142 Computer Science & Information Technology (CS & IT) • Pseudorandom Substitution combined with Diffie-Helman produces best qualitative result followed by pseudorandom substitution with DES. • DCT combined with DES produces the worst qualitative result. In the similar manner, the impact of this scheme on images of different size i.e. 3072x3072, 4096x4096, 5120x5120 pixels was recorded. Figure 6(a). Original image Figure 6(b). Result of applying DCT only Figure 6(c). Result of applying Distortion Figure 6(d). Result of applying Substitution Figure 6(e). Result of a DES plus Substitution Figure 6(f). Result of Diffie-Helman plus Substitution Figure 6. Impact of proposed technique on images (Image size = 3072X3072 pixels) 5.3.2.2. Results of time complexity Figure 7 depicts the total time taken by a complete process of the combination including the time on sender and receiver side. It can be observed that: • Distortion combined with DES has minimum time complexity • DCT combined with Diffie-Helman has maximum time complexity • Time complexity for all the combinations increases with an increase in the image size
  • 11. Computer Science & Information Technology (CS & IT) 143 Time complexity for image size 2048 x 2048 0 100 200 300 400 500 600 700 800 Technique Timecomplexity Subtitution Substitution + DES Substitution + Deffie Hellman Distortion only Distortion + DES Distortion + Deffie Hellman DCT DCT + DES DCT + Deffie Hellman Figure 7(a). Time Complexity (2048X2048 pixel) Time complexity for image size 3072 x 3072 0 200 400 600 800 1000 1200 1400 1600 1800 Technique Timecomplexity Subtitution Substitution + DES Substitution + Deffie Hellman Distortion only Distortion + DES Distortion + Deffie Hellman DCT DCT + DES DCT + Deffie Hellman Figure 7(b). Time Complexity (3072x3072 pixel) Time complexity for image size 4096 x 4096 0 500 1000 1500 2000 2500 3000 3500 Technique Timecomplexity Subtitution Substitution + DES Substitution + Deffie Hellman Distortion only Distortion + DES Distortion + Deffie Hellman DCT DCT + DES DCT + Deffie Hellman Figure 7(c). Time Complexity (4096x4096 pixel) Time complexity for image size 5120 x 5120 0 500 1000 1500 2000 2500 3000 3500 4000 Technique Timecomplexity Subtitution Substitution + DES Substitution + Deffie Hellman Distortion only Distortion + DES Distortion + Deffie Hellman DCT DCT + DES DCT + Deffie Hellman Figure 7(d). Time Complexity (5120X5120 pixel) Figure 7. Impact on Time complexity of Proposed Technique 6. CONCLUSION In this paper a new scheme of combining steganography and cryptography has been proposed. Where steganography eliminates any chances of detection of hidden data being present in the cover image, text, etc., cryptography ensures data confidentiality by changing the very form of data. Thus the hybrid approach ensures a higher degree of data security compared to either of the techniques applied alone. After analysing the results of the application of the proposal it can be concluded: • The time complexity of this hybrid process is much more than that of pure steganography. • As the size of the key used for encryption and decryption increases time complexity further increases. • There is no major effect on the process of steganography on adding it to cryptography because the data being embedded is in the form of bits in either case. • On increasing the size of the image used as a cover, the time complexity increases even more. • DCT Combined with Diffie-Helman has the highest time complexity in comparison to any other proposed combination. • The pseudorandom substitution combined with any cryptographic technique provides least distortion in image quality. These results can be very useful to researchers who wish to use both steganography and cryptography to secure data in communication networks.
  • 12. 144 Computer Science & Information Technology (CS & IT) ACKNOWLEDGEMENTS The authors would like to thank everyone, just everyone! REFERENCES [1] Neil F. Johnson and Sushil Jajodia, "Steganalysis of Image Created Using Current Steganography Software", Workshop of Information Hiding Proceedings, Portland Oregon, USA,15-17 April,1998. Lecture Notes in Computer Science, Vol.1525, Springer-Verlag (1998). [2] Clair, Bryan, “Steganography: How to Send a Secret Message”, 8 Nov. 2001 www.strangehorizons.com/2001/20011008/steganography.shtml. [3] “Cryptography and Network Security: principles and practices”, William Stallings, pearsons education, first Indian reprint 2003. [4] Rhodas, G. B., “Method and Apparatus Responsive to a Code Signal Conveyed Through a Graphic Image”, U.S. Patent 5,710,834, 1998. [5] Swanson, M. D., B. Zhu, and A. H. Tewk, “Transparent Robust Image Watermarking", in Proceedings of the IEEE International Conference on Image Processing, vol. 3, 1996, pp. 211-214. [6] Bender, W., D. Gruhl, and N. Morimoto, “Techniques for data hiding”, IBM Systems Journal , vol. 35, no. 3/4, 1996, pp. 131-336. [7] Moller. S.A., Pitzmann, and I. Stirand, “Computer Based Steganography: How It Works and Why Therefore Any Restrictions on Cryptography Are Nonsense, At Best”, in Information Hiding: First International Workshop, Proceedings, vol. 1174 of Lecture Notes in Computer Science, Springer, 1996, pp. 7-21. [8] Gruhl, D., A. Lu, and W. Bender, “Echo Hiding in Information Hiding”, First International Workshop, Proceedings, vol. 1174 of Lecture Notes in Computer Science, Springer,1996, pp. 295- 316. [9] Kurak, C., and J. McHughes, “A Cautionary Note On Image Downgrading”, in IEEE Computer Security Applications Conference 1992, Proceedings, IEEE Press, 1992, pp. 153-159. [10] Van Schyndel, R. G., A. Tirkel, and C. F. Osborne, “A Digital Watermark”, in Proceedings of the IEEE International Conference on Image Processing, vol. 2, 1994, pp. 86-90. [11] Johnson, N. F., and S. Jajodia, “Exploring Steganography: Seeing the Unseen", IEEE Computer, vol. 31, no. 2, 1998, pp. 26-34. [12] Maxemchuk, N. F., “Electronic Document Distribution”, AT&T Technical Journal, September/October 1994, pp. 73-80. [13] Low, S. H., et al., Document Marking and Identifications Using Both Line and Word Shifting," in Proceedings of Infocom'95, 1995, pp. 853-860. [14] Low, S. H., N. F. Maxemchuk, and A. M. Lapone, “Document Identification for Copyright Protection Using Centroid Detection”, IEEE Transactions on Communications, vol. 46, no. 3, 1998, pp. 372-383. [15] Low, S. H., and N. F. Maxemchuk, “Performance Comparison of Two Text Marking Methods”, IEEE Journal on Selected Areas in Communications, vol. 16, no. 4, 1998, pp. 561-572. [16] Rhodas, G. B., “Method and Apparatus Responsive to a Code Signal Conveyed Through a Graphic Image”, U.S. Patent 5,710,834, 1998. [17] Sujay Nararayana and Gaurav Prasad, “ Two New Approaches For Secured Image Steganography Using Cryptographic Technique and Type Conversions” , Signal and Image Processing: An International Journal (SIPIJ) Vol. 1, No. 2, December 2010. [18] Shailender Gupta, Ankur Goyal And Bharat Bhushan, “Information Hiding Using Least Significant Steganography and Cryptography”, I. J Modern Education and Computer Science, vol. 6, pp. no. 27- 34, IJMECS-2012.