SlideShare a Scribd company logo
International Journal of Information Technology, Modeling and Computing (IJITMC) Vol. 2, No. 1, February 2014
DOI : 10.5121/ijitmc.2014.2105 55
A Novel Secure Combination Technique of
Steganography and Cryptography
Pye Pye Aung1
and Tun Min Naing2
1
University of Technology (Yatanarpon Cyber City), Pyin Oo Lwin, Myanmar
2
Computer University (Pathein), Myanmar
ABSTRACT
A new technique proposed with the combination of cryptography and steganography enhanced with new
secure feature for generating a new security system. Cryptography and Steganography are two popular
ways for secure data transmission in which the former distorts a message so it cannot be understood and
another hides a message so it cannot be seen. In cryptography, this system is used advanced encryption
standard (AES) algorithm to encrypt secret message and then these are separated keys; one of which is
used to hide in cover image. In steganography, a part of encrypted message as a key is used to hide in
discrete cosine transform (DCT) of an image which is highly secured. This kind of system is to be
introduced in applications such as transferring secret data that can be authentication of various fields.
KEYWORDS
Cryptography, DCT Coefficient, Hiding Text, Steganography, Stego- image
1. INTRODUCTION
In networking, cryptography can be specified as the security service for data and
telecommunications. Cryptography is an important way to address message transmission security
requirements. Encryption and decryptiong of messages are made for the technique of
cryptography. A mechanism of hiding the original messages from the intruders and by making a
suspect of the existence of the message only to the intended receiver is called steganography.
Here the secret message is sent as image or text through the encryption of the message in which
special keys are arranged for those intended receivers to get the original message. The receiver
only makes actual procedure of the real message sent by the sender. Real message can be letters
or digits which can be encrypted as hidden message in any form as audio or video or image [3].
Steganography must not be confused with cryptography, where the message is transformed so as
to make its meaningless to malicious people who intercept it. The goal of steganography is to
avoid drawing suspicion to the transmission of the secret message between sender and receiver. A
secure data transmission is made using cryptography and steganography. Combination of both
these two techniques results in appearing a highly secured method for data communication.
International Journal of Information Technology, Modeling and Computing (IJITMC) Vol. 2, No. 1, February 2014
56
2. BACKGROUND THEORY
Cryptography can be specified as the security service including authentication, privacy and
confidentially. In this paper we have used AES algorithm in cryptography. The three types of
algorithms are described:
(i) Secret Key Cryptography (SKC): Uses a single key for both encryption and decryption.
(ii)Public Key Cryptography (PKC): Uses one key for encryption and another for
decryption.
(iii)Hash Functions: Uses a mathematical transformation to irreversibly "encrypt" information
[6].
Steganography is a mechanism for hiding and retrieving the high sensitive information in data
transmission. Steganography must not be confused with cryptography, where the message is
converted its meaningless to malicious people who intercept it. The main goal of steganography
techniques is that it is diffilcult to detect the image and so saved from attacks. The steganography
approaches can be distinguished into three types: pure steganography, secret key steganography
and public key steganography.
2.1. AES algorithm for Cryptography
Advanced Encryption Standard (AES) is a standard for the encryption of electronic data. The U.S.
government held in 1997 and now use in worldwide. AES is a symmetric-key algorithm which
means that the same key is used both of sender and receiver. This AES standard specifies the
Rijndael algorithm [1], a symmetric block cipher that can process data blocks of 128 bits, using
key size of 128, 192, and 256 bits. The input, the output and the cipher key are used in Rijndael. It
takes an input and output of certain block size, only 128 bits.
2.1.1. Advantages of using AES algorithm
1. Very Secure.
2. Reasonable Cost.
3. Main Characteristics:
I. Flexibility, II. Simplicity.
2.2. DCT - frequency domain algorithm for Steganography
The hidden message is a stream of “1” and “0” giving a total number of 80 bits to insert the secret
message into the DCT domain of the cover image. The color-based transformation converts the
image (cover image) into 8x8 blocks of pixels. Next, at least 80 larger positive coefficients need
to embed in the cover image in the low-mid frequency range. DCT can divide the image into
high, middle and low frquency components. As the high frequency coefficients are vulnerable and
less robust on the quality of image. The main issue of this work is robustness against with high
quality of image, thus the low and mid frequency coefficients are the most appropriate. The
selected coefficients ci are modified by the corresponding bit in the message stream. This K
quantity represents the persistence factor. As soon as the ith term of message bit s(i) is “1”, the
coefficient of the image is added with a quantity K; otherwise the same quantity is subtracted
form it. Thus the replaced DCT coefficients are
DCT (new) = DCT+1*K for s(i)=1;
Else DCT (new) = DCT-1*K for s(i)=0.
International Journal of Information Technology, Modeling and Computing (IJITMC) Vol. 2, No. 1, February 2014
57
2.2.1. Advantages of using frequency domain Steganography
1. Very secure, hard to detect
2. More flexible, different techniques for calculation of DCT coefficients values
3. PROPOSED COMBINING TECHNIQUE
In cryptography, this system is used AES algorithm with its symmetric key and the cipher text is
converted into two extra keys for high security, then the steganography is implemented to the key
(3) to get stego image. The system is designed with three creation steps to hide the text –
(a) For Cryptography – Crypto Creation Step
(b) For Steganography – Stego Creation Step
(c) For Extra Securtiy – Security Creation Step
3.1. Crypto Creation Step
For Crypto Module, the following steps are applied for encrypting the data (Refer Figure1):
(a) Insert text for encryption.
(b) Apply AES algorithm using 128 bit key.
(c) Convert cipher text into types of format Hexadecimal, based 64 string and ASCII code
respectively.
Figure 1. Crypto Creation Step
3.2. Security Creation Step
This security module works as follows: (Refer Figure2)
(a) Create array and allocate all the position points of digit (1) from the cipher text.
(b) Remove all the positions points of digit (1) from the cipher text and the remaining
characters and digits are going to transform as modified cipher text.
(c) Remove the first ten allocated position of digit (1) among all digit (1) positions array and
generate as a secret key (key 2).
(d) Take first ten allocated position points of digit (1) from all position points of digit (1)
array and these ten digit(1) will be changed into the form of a secret key key(3).
Insert Text AES Method using Key1
Convert Cipher Text into
Hexadecimal, Based64 String
and ASCII code
International Journal of Information Technology, Modeling and Computing (IJITMC) Vol. 2, No. 1, February 2014
58
Figure 2. Security Creation Step
3.3. Stego Creation Step
For Stego Module, the following steps are discussed for hiding the above generated cipher text
(Refer Figure3).
(a) Take the first ten allocated position points of digit (1) from the above discussed Security
Module.
(b) Scramble the first ten allocated position points of digit (1) using a 64 bit key (Key 3).
(c) Take a Color Image.
(d) Find the DCT of the Image using color transformation.
(e) Hide the Cipher by altering DCTs.
(f) Apply Inverse DCT.
(g) Find the Stego Image.
Figure 3. Stego Creation Step
4. PROPOSED SYSTEM IMPLEMENTATION
This system is developed in Visual Studio C# platform, mainly three creation steps involved –
(a) Crypto Creation Step – AES Implementation Step
(b) Security Creation Step – Newly Developed Technique
(c) Stego Creation Step – DCT Techniques Implementation Step
Generate Key2 by removing
the first ten allocation points
from the original positions of
digit (1) array from cipher text
Create array and
allocate all the
positions of digit (1)
from the cipher text
Cipher Text in
Hexadecimal, Based64
String and ASCII code
Take first ten allocation
points of digit (1) and
generate as Key3 to be
hidden
Generate modified cipher text
without being digit ole(1)
First ten allocation
points of digit (1) from
the Security Module
Scramble the text
using a Key3
Hide the first ten
allocation points of
digit (1) by altering
DCT
Stego Image Inverse DCT
Find the DCT
of the image
Take a Color Image
International Journal of Information Technology, Modeling and Computing (IJITMC) Vol. 2, No. 1, February 2014
59
4.1. Algorithm for the proposed system
The steps of the algorithm for hiding text and retrieving text are discussed below (Refer Figure4
& Figure5).
4.1.1. Hiding Text
(a) Encrypt the original message into cipher text by using AES algorithm with symmetric
key of key 1.
(b) Convert the cipher text into Hexadecimal format in the form of alphabets (A to F) and
digits (0 to 9), Based 64 string format in the form of alphabets small letter (a to z),
capital letter (A to Z), digits (0 to 9) and two arithmetic character (+/-) and ASCII code
format of (256) characters respectively.
(c) Create array and allocate all the position points of digit (1) from converted cipher text and
remove the first ten allocated points of all digit (1) positions and then generate the key
(Key 2).
(d) Take the first ten allocated position points of digit (1) from array of cipher text and
generate it as the third key (Key 3); this part will be hidden in the image.
(e) The cipher text without having digit (1) will be remained as modified cipher text.
(f) Hide the first ten allocated position points of digit (1) in the image and get Stego-Image.
Figure 4. Proposed System for Hiding Text
Take first ten allocation points of
digit (1) from the digit (1) array
of cipher text
Create array and
allocate all the
positions of digit (1)
from the cipher text
Generate Cipher text
using AES algorithm
Remaining of all allocation
points of digit (1) array after
removing the first ten points
Remove all the position
points of digit (1) from
the original cipher text
First ten allocation points of digit (1)
Hide first ten allocation points of
digit (1) in image
Stego Image
Key2
Key3
International Journal of Information Technology, Modeling and Computing (IJITMC) Vol. 2, No. 1, February 2014
60
4.1.2. Retrieving Text
Figure 5. Proposed System for Retrieving Text
(a) Retrieve the first ten allocated position points of digit (1) from the image and unscramble
it with Key 3.
(b) Add back the first ten position points of digit (1) into its all position points of digit (1)
using Key 2.
(c) Add back all position points of digit (1) to the modified cipher text in order to get the
original cipher text in Hexadecimal, Based 64 string and ASCII form.
(d) Reconstruct the original text message from the cipher text using AES algorithm and its
key (Key 1).
4.1.3. Security Properties of Proposed System
The proposed system is highly secure because it is a combination of AES algorithm of encryption
technique and DCT of message embedding technique. And also including two extra keys make
the system highly secured. This system contains total 3 keys.
(a) One 128 bits symmetric key for AES algorithm
(b) Two 8 bits (1 byte) generated keys for scrambling the cipher text and retrieving the
original message.
Key2
Stego Image Retrieve first ten allocation
points of digit (1)
Key3
Key1
Club first ten allocation
points of digit (1) and rest
of the digit (1) array
Retrieve the original
text message
Reconstruct the
cipher text
Add all the position points
of digit (1) to the original
cipher text
Key2
and
Key3
International Journal of Information Technology, Modeling and Computing (IJITMC) Vol. 2, No. 1, February 2014
61
5. RESULTS
In this system, it can be compared our proposed system by using three kinds of encoding format
type. They are Hexadecimal, Based-64 and ACSII code. Encryption time will be generated as
different using three encoding format. Among them, ACSII encoding format is most efficient for
large plaintext message to encrypt. But Hexadecimal encoding format will be taken more
encryption time than any other format and so it can be used if the message size is small. As
concerned with Based-64 encoding format is appropriate message size from below results. This
paper shows the comparison of three encoding format in different messages in Figure6 and
Figure7.
Figure 6. Key Separating time in Different Messages (20-100 Kb)
Figure 6. Key Separating time in Different Messages (20-100 Kb)
Figure 7. Key Separating time in Different Messages (100-500 Kb)
Figure 7. Key Separating time in Different Messages (100-500 Kb)
0
100
200
300
400
500
600
20 40 60 80 100
Time(ms)
Message (Kb)
Hexadecimal Format
Based-64 String Format
ASCII Format
0
100
200
300
400
500
600
100 200 300 400 500
Time(ms)
Message (Kb)
Hexadecimal Format
Based-64 String Format
ASCII Format
International Journal of Information Technology, Modeling and Computing (IJITMC) Vol. 2, No. 1, February 2014
62
6. CONCLUSION
In this thesis, a new digital message hiding system is proposed for the combination of
cryptography and steganography using three keys and modified cipher text. The combination of
these two techniques satisfies the requirements such as highly security and robustness between
sender and receiver. The proposed method ensures acceptable image quality with very little
distortion in the image. The main advantage of this system is that the method used for AES
algorithm which is very secure and the DCT transformation technique is very hard to detect in
image steganography. It also produces efficient robustness of stego-image though it had been
attacked by other techniques and additionally saved from attacks. Goal of this paper is to develop
a new security system that messages cannot be retrieved easily from the image by any attackers or
hackers in the communication process.
REFERENCES
[1] Secure Data Transmission using Stegnography and Encryption Technique, Shamim Ahmed Laskar
and Kattamanchi Hemachandran, International Journal on Cryptography and Information Security
(IJCIS),Vol.2, No.3, September 2012.
[2] Novel Security Scheme for Image Steganography using Cryptography Technique, International
Journal of Advanced Research in Computer Science and Software Engineering, Volume 2, Issue 4,
April 2012.
[3] A Novel Information Security Scheme using Cryptic Steganography B. Raja Rao et. al. / Indian
Journal of Computer Science and Engineering Vol. 1 No. 4 327-332.
[4] G. Ulutas, M. Ulutas and V. Nabiyev, “Distortion free geometry based secret image sharing”,
Elsevier Inc, Procedia Computer Science, Vol.3, pp.721–726, 2011.
[5] Proposed System for Data Hiding Using Cryptography And Setganography International Journal of
Computer Applications (0975 – 8887) Volume 8– No.9, October 2010.
[6] B. E. Carvajal-Gámez , F. J. Gallegos-Funes and J. L. López-Bonilla, “Scaling Factor for RGB
Images to Steganography Applications”, Journal of Vectorial Relativity, Vol.4, No.3 pp.55-65, 2009.
[7] Domenico Daniele Bloisi, Luca Iocchi: Image based Steganography and cryptography, Computer
Vision theory and applications volume 1, pp. 127-134.
[8] X. Li and J. Wang, “A steganographic method based upon JPEG and particle swarm optimization
algorithm”, Information Sciences 177 (15) (2007) 3099–31091.
[9] Domenico Daniele Bloisi, Luca Iocchi: Image based Steganography and cryptography, Computer
Vision theory and applications volume 1, pp. 127-134.
[10] William Stallings, ―Cryptography and Network Security: Principles and practices‖, Pearson
education, Third Edit ion, ISBN 81-7808-902-5.

More Related Content

What's hot

Secure image encryption using aes
Secure image encryption using aesSecure image encryption using aes
Secure image encryption using aes
eSAT Publishing House
 
Ew4301904907
Ew4301904907Ew4301904907
Ew4301904907
IJERA Editor
 
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
IOSR Journals
 
Performance evluvation of chaotic encryption technique
Performance evluvation of chaotic encryption techniquePerformance evluvation of chaotic encryption technique
Performance evluvation of chaotic encryption technique
Ancy Mariam Babu
 
Highly secure scalable compression of encrypted images
Highly secure scalable compression of encrypted imagesHighly secure scalable compression of encrypted images
Highly secure scalable compression of encrypted images
eSAT Journals
 
Image Encryption in java ppt.
Image Encryption in java ppt.Image Encryption in java ppt.
Image Encryption in java ppt.
Pradeep Vishwakarma
 
An Image Encryption using Chaotic Based Cryptosystem
An Image Encryption using Chaotic Based CryptosystemAn Image Encryption using Chaotic Based Cryptosystem
An Image Encryption using Chaotic Based Cryptosystem
xlyle
 
Image Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH TechniqueImage Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH Technique
Editor IJCATR
 
H43064650
H43064650H43064650
H43064650
IJERA Editor
 
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
IJCSIS Research Publications
 
11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature maps11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature maps
Alexander Decker
 
(Sample) image encryption
(Sample) image encryption(Sample) image encryption
(Sample) image encryption
AnsabArshad
 
D018141922
D018141922D018141922
D018141922
IOSR Journals
 
A novel efficient multiple encryption algorithm for real time images
A novel efficient multiple encryption algorithm for real time images A novel efficient multiple encryption algorithm for real time images
A novel efficient multiple encryption algorithm for real time images
IJECEIAES
 
A New Approach of Cryptographic Technique Using Simple ECC & ECF
A New Approach of Cryptographic Technique Using Simple ECC & ECFA New Approach of Cryptographic Technique Using Simple ECC & ECF
A New Approach of Cryptographic Technique Using Simple ECC & ECF
IJAEMSJORNAL
 
RSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT ApproachRSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT Approach
IJERA Editor
 
Audio Cryptography System
Audio Cryptography SystemAudio Cryptography System
Audio Cryptography System
Raju Raj
 
Image encryption and decryption
Image encryption and decryptionImage encryption and decryption
Image encryption and decryption
Aashish R
 
Encryption & Decryption of Sound in image format on Matlab
Encryption & Decryption of Sound in image format on MatlabEncryption & Decryption of Sound in image format on Matlab
Encryption & Decryption of Sound in image format on Matlab
Muhammad Saif Ul Islam
 
A Modified Binary Encryption Algorithm based on Diffuse Representation
A Modified Binary Encryption Algorithm based on Diffuse RepresentationA Modified Binary Encryption Algorithm based on Diffuse Representation
A Modified Binary Encryption Algorithm based on Diffuse Representation
IJAEMSJORNAL
 

What's hot (20)

Secure image encryption using aes
Secure image encryption using aesSecure image encryption using aes
Secure image encryption using aes
 
Ew4301904907
Ew4301904907Ew4301904907
Ew4301904907
 
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
 
Performance evluvation of chaotic encryption technique
Performance evluvation of chaotic encryption techniquePerformance evluvation of chaotic encryption technique
Performance evluvation of chaotic encryption technique
 
Highly secure scalable compression of encrypted images
Highly secure scalable compression of encrypted imagesHighly secure scalable compression of encrypted images
Highly secure scalable compression of encrypted images
 
Image Encryption in java ppt.
Image Encryption in java ppt.Image Encryption in java ppt.
Image Encryption in java ppt.
 
An Image Encryption using Chaotic Based Cryptosystem
An Image Encryption using Chaotic Based CryptosystemAn Image Encryption using Chaotic Based Cryptosystem
An Image Encryption using Chaotic Based Cryptosystem
 
Image Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH TechniqueImage Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH Technique
 
H43064650
H43064650H43064650
H43064650
 
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
 
11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature maps11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature maps
 
(Sample) image encryption
(Sample) image encryption(Sample) image encryption
(Sample) image encryption
 
D018141922
D018141922D018141922
D018141922
 
A novel efficient multiple encryption algorithm for real time images
A novel efficient multiple encryption algorithm for real time images A novel efficient multiple encryption algorithm for real time images
A novel efficient multiple encryption algorithm for real time images
 
A New Approach of Cryptographic Technique Using Simple ECC & ECF
A New Approach of Cryptographic Technique Using Simple ECC & ECFA New Approach of Cryptographic Technique Using Simple ECC & ECF
A New Approach of Cryptographic Technique Using Simple ECC & ECF
 
RSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT ApproachRSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT Approach
 
Audio Cryptography System
Audio Cryptography SystemAudio Cryptography System
Audio Cryptography System
 
Image encryption and decryption
Image encryption and decryptionImage encryption and decryption
Image encryption and decryption
 
Encryption & Decryption of Sound in image format on Matlab
Encryption & Decryption of Sound in image format on MatlabEncryption & Decryption of Sound in image format on Matlab
Encryption & Decryption of Sound in image format on Matlab
 
A Modified Binary Encryption Algorithm based on Diffuse Representation
A Modified Binary Encryption Algorithm based on Diffuse RepresentationA Modified Binary Encryption Algorithm based on Diffuse Representation
A Modified Binary Encryption Algorithm based on Diffuse Representation
 

Viewers also liked

Kurier condensed
Kurier condensedKurier condensed
Kurier condensed
Hirwanto Iwan
 
Ministriju iesniegtie jauno politikas iniciatīvu pasākumi 2014., 2015. un 201...
Ministriju iesniegtie jauno politikas iniciatīvu pasākumi 2014., 2015. un 201...Ministriju iesniegtie jauno politikas iniciatīvu pasākumi 2014., 2015. un 201...
Ministriju iesniegtie jauno politikas iniciatīvu pasākumi 2014., 2015. un 201...
Finanšu ministrija
 
Seven keys to success
Seven keys to successSeven keys to success
Seven keys to success
Gus Ferguson
 
Fák
FákFák
Fák
krizma
 
Taufan rizky, sistem informasi semester 1, makalah pendidikan
Taufan rizky, sistem informasi semester 1, makalah pendidikanTaufan rizky, sistem informasi semester 1, makalah pendidikan
Taufan rizky, sistem informasi semester 1, makalah pendidikan
taufanrizky
 
White and Black Beamer
White and Black BeamerWhite and Black Beamer
White and Black Beamer
Hirwanto Iwan
 
Adaptive tracking control of sprott h system
Adaptive tracking control of sprott h systemAdaptive tracking control of sprott h system
Adaptive tracking control of sprott h system
Zac Darcy
 
Etapa 2. comprensi+ôn literal de la lectura
Etapa 2. comprensi+ôn literal de la lecturaEtapa 2. comprensi+ôn literal de la lectura
Etapa 2. comprensi+ôn literal de la lectura
Dulce Corazoncito
 
งานรอแก
งานรอแก งานรอแก
งานรอแก
DiZz Tang Art Zii
 
σεναριο μαρια αθηνα
σεναριο μαρια αθηνασεναριο μαρια αθηνα
σεναριο μαρια αθηναathinaboziki
 
Indie pop slideshow
Indie pop slideshowIndie pop slideshow
Indie pop slideshow
Jordan Booker
 
Par Partnerības līgumu ES fondu 2014.–2020.gada plānošanas periodam
Par Partnerības līgumu ES fondu 2014.–2020.gada plānošanas periodamPar Partnerības līgumu ES fondu 2014.–2020.gada plānošanas periodam
Par Partnerības līgumu ES fondu 2014.–2020.gada plānošanas periodamFinanšu ministrija
 
Vital signs 60 (1)
Vital signs 60 (1)Vital signs 60 (1)
Vital signs 60 (1)gallevy16
 
20 Subconscious Choices That Don't Serve You Well
20 Subconscious Choices That Don't Serve You Well20 Subconscious Choices That Don't Serve You Well
20 Subconscious Choices That Don't Serve You Well
Second Breaks, Inc.
 
Facets of intelligence
Facets of intelligenceFacets of intelligence
Facets of intelligence
B. UPUL N. PEIRIS .
 

Viewers also liked (18)

Kurier condensed
Kurier condensedKurier condensed
Kurier condensed
 
Ministriju iesniegtie jauno politikas iniciatīvu pasākumi 2014., 2015. un 201...
Ministriju iesniegtie jauno politikas iniciatīvu pasākumi 2014., 2015. un 201...Ministriju iesniegtie jauno politikas iniciatīvu pasākumi 2014., 2015. un 201...
Ministriju iesniegtie jauno politikas iniciatīvu pasākumi 2014., 2015. un 201...
 
Seven keys to success
Seven keys to successSeven keys to success
Seven keys to success
 
Fák
FákFák
Fák
 
Taufan rizky, sistem informasi semester 1, makalah pendidikan
Taufan rizky, sistem informasi semester 1, makalah pendidikanTaufan rizky, sistem informasi semester 1, makalah pendidikan
Taufan rizky, sistem informasi semester 1, makalah pendidikan
 
White and Black Beamer
White and Black BeamerWhite and Black Beamer
White and Black Beamer
 
Listrik
ListrikListrik
Listrik
 
Adaptive tracking control of sprott h system
Adaptive tracking control of sprott h systemAdaptive tracking control of sprott h system
Adaptive tracking control of sprott h system
 
Etapa 2. comprensi+ôn literal de la lectura
Etapa 2. comprensi+ôn literal de la lecturaEtapa 2. comprensi+ôn literal de la lectura
Etapa 2. comprensi+ôn literal de la lectura
 
งานรอแก
งานรอแก งานรอแก
งานรอแก
 
σεναριο μαρια αθηνα
σεναριο μαρια αθηνασεναριο μαρια αθηνα
σεναριο μαρια αθηνα
 
Indie pop slideshow
Indie pop slideshowIndie pop slideshow
Indie pop slideshow
 
Kajaiban keajaiban
Kajaiban keajaibanKajaiban keajaiban
Kajaiban keajaiban
 
Par Partnerības līgumu ES fondu 2014.–2020.gada plānošanas periodam
Par Partnerības līgumu ES fondu 2014.–2020.gada plānošanas periodamPar Partnerības līgumu ES fondu 2014.–2020.gada plānošanas periodam
Par Partnerības līgumu ES fondu 2014.–2020.gada plānošanas periodam
 
Vital signs 60 (1)
Vital signs 60 (1)Vital signs 60 (1)
Vital signs 60 (1)
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
20 Subconscious Choices That Don't Serve You Well
20 Subconscious Choices That Don't Serve You Well20 Subconscious Choices That Don't Serve You Well
20 Subconscious Choices That Don't Serve You Well
 
Facets of intelligence
Facets of intelligenceFacets of intelligence
Facets of intelligence
 

Similar to A novel secure combination technique of steganography and cryptography

Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..
Jayanth Dwijesh H P
 
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Bikash Chandra Prusty
 
Ijcnc050208
Ijcnc050208Ijcnc050208
Ijcnc050208
IJCNCJournal
 
Seminar report on symmetric key
Seminar report on symmetric keySeminar report on symmetric key
Seminar report on symmetric key
Rajat Tripathi
 
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
International Journal of Science and Research (IJSR)
 
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUESELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
ijcisjournal
 
IRJET-Triple Layered Security on Android Based SMS Transaction
IRJET-Triple Layered Security on Android Based SMS TransactionIRJET-Triple Layered Security on Android Based SMS Transaction
IRJET-Triple Layered Security on Android Based SMS Transaction
IRJET Journal
 
A Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and SteganographyA Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and Steganography
IJCNCJournal
 
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
IJCNCJournal
 
Data Communication Using Cryptography Encryption
Data Communication Using Cryptography EncryptionData Communication Using Cryptography Encryption
Data Communication Using Cryptography Encryption
BRNSSPublicationHubI
 
Novel Algorithm For Encryption:Hybrid of Transposition and Substitution Method
Novel Algorithm For Encryption:Hybrid of Transposition and Substitution MethodNovel Algorithm For Encryption:Hybrid of Transposition and Substitution Method
Novel Algorithm For Encryption:Hybrid of Transposition and Substitution Method
IDES Editor
 
Image Steganography Based On Hill Cipher with Key Hiding Technique
Image Steganography Based On Hill Cipher with Key Hiding TechniqueImage Steganography Based On Hill Cipher with Key Hiding Technique
Image Steganography Based On Hill Cipher with Key Hiding Technique
IOSR Journals
 
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
IOSR Journals
 
F010243136
F010243136F010243136
F010243136
IOSR Journals
 
A NOVEL STRUCTURE WITH DYNAMIC OPERATION MODE FOR SYMMETRIC-KEY BLOCK CIPHERS
A NOVEL STRUCTURE WITH DYNAMIC OPERATION MODE FOR SYMMETRIC-KEY BLOCK CIPHERSA NOVEL STRUCTURE WITH DYNAMIC OPERATION MODE FOR SYMMETRIC-KEY BLOCK CIPHERS
A NOVEL STRUCTURE WITH DYNAMIC OPERATION MODE FOR SYMMETRIC-KEY BLOCK CIPHERS
IJNSA Journal
 
Improved Image Encryption for Real-Time Application over Wireless Communicati...
Improved Image Encryption for Real-Time Application over Wireless Communicati...Improved Image Encryption for Real-Time Application over Wireless Communicati...
Improved Image Encryption for Real-Time Application over Wireless Communicati...
ijeei-iaes
 
Iaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detectionIaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detection
Iaetsd Iaetsd
 
A novel method for digital data encoding-decoding
A novel method for digital data encoding-decodingA novel method for digital data encoding-decoding
A novel method for digital data encoding-decoding
TELKOMNIKA JOURNAL
 
New Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel EncryptionNew Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel Encryption
IJERA Editor
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
IJERD Editor
 

Similar to A novel secure combination technique of steganography and cryptography (20)

Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..
 
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
 
Ijcnc050208
Ijcnc050208Ijcnc050208
Ijcnc050208
 
Seminar report on symmetric key
Seminar report on symmetric keySeminar report on symmetric key
Seminar report on symmetric key
 
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
 
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUESELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
 
IRJET-Triple Layered Security on Android Based SMS Transaction
IRJET-Triple Layered Security on Android Based SMS TransactionIRJET-Triple Layered Security on Android Based SMS Transaction
IRJET-Triple Layered Security on Android Based SMS Transaction
 
A Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and SteganographyA Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and Steganography
 
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
 
Data Communication Using Cryptography Encryption
Data Communication Using Cryptography EncryptionData Communication Using Cryptography Encryption
Data Communication Using Cryptography Encryption
 
Novel Algorithm For Encryption:Hybrid of Transposition and Substitution Method
Novel Algorithm For Encryption:Hybrid of Transposition and Substitution MethodNovel Algorithm For Encryption:Hybrid of Transposition and Substitution Method
Novel Algorithm For Encryption:Hybrid of Transposition and Substitution Method
 
Image Steganography Based On Hill Cipher with Key Hiding Technique
Image Steganography Based On Hill Cipher with Key Hiding TechniqueImage Steganography Based On Hill Cipher with Key Hiding Technique
Image Steganography Based On Hill Cipher with Key Hiding Technique
 
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
 
F010243136
F010243136F010243136
F010243136
 
A NOVEL STRUCTURE WITH DYNAMIC OPERATION MODE FOR SYMMETRIC-KEY BLOCK CIPHERS
A NOVEL STRUCTURE WITH DYNAMIC OPERATION MODE FOR SYMMETRIC-KEY BLOCK CIPHERSA NOVEL STRUCTURE WITH DYNAMIC OPERATION MODE FOR SYMMETRIC-KEY BLOCK CIPHERS
A NOVEL STRUCTURE WITH DYNAMIC OPERATION MODE FOR SYMMETRIC-KEY BLOCK CIPHERS
 
Improved Image Encryption for Real-Time Application over Wireless Communicati...
Improved Image Encryption for Real-Time Application over Wireless Communicati...Improved Image Encryption for Real-Time Application over Wireless Communicati...
Improved Image Encryption for Real-Time Application over Wireless Communicati...
 
Iaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detectionIaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detection
 
A novel method for digital data encoding-decoding
A novel method for digital data encoding-decodingA novel method for digital data encoding-decoding
A novel method for digital data encoding-decoding
 
New Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel EncryptionNew Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel Encryption
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
 

Recently uploaded

How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 

Recently uploaded (20)

How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 

A novel secure combination technique of steganography and cryptography

  • 1. International Journal of Information Technology, Modeling and Computing (IJITMC) Vol. 2, No. 1, February 2014 DOI : 10.5121/ijitmc.2014.2105 55 A Novel Secure Combination Technique of Steganography and Cryptography Pye Pye Aung1 and Tun Min Naing2 1 University of Technology (Yatanarpon Cyber City), Pyin Oo Lwin, Myanmar 2 Computer University (Pathein), Myanmar ABSTRACT A new technique proposed with the combination of cryptography and steganography enhanced with new secure feature for generating a new security system. Cryptography and Steganography are two popular ways for secure data transmission in which the former distorts a message so it cannot be understood and another hides a message so it cannot be seen. In cryptography, this system is used advanced encryption standard (AES) algorithm to encrypt secret message and then these are separated keys; one of which is used to hide in cover image. In steganography, a part of encrypted message as a key is used to hide in discrete cosine transform (DCT) of an image which is highly secured. This kind of system is to be introduced in applications such as transferring secret data that can be authentication of various fields. KEYWORDS Cryptography, DCT Coefficient, Hiding Text, Steganography, Stego- image 1. INTRODUCTION In networking, cryptography can be specified as the security service for data and telecommunications. Cryptography is an important way to address message transmission security requirements. Encryption and decryptiong of messages are made for the technique of cryptography. A mechanism of hiding the original messages from the intruders and by making a suspect of the existence of the message only to the intended receiver is called steganography. Here the secret message is sent as image or text through the encryption of the message in which special keys are arranged for those intended receivers to get the original message. The receiver only makes actual procedure of the real message sent by the sender. Real message can be letters or digits which can be encrypted as hidden message in any form as audio or video or image [3]. Steganography must not be confused with cryptography, where the message is transformed so as to make its meaningless to malicious people who intercept it. The goal of steganography is to avoid drawing suspicion to the transmission of the secret message between sender and receiver. A secure data transmission is made using cryptography and steganography. Combination of both these two techniques results in appearing a highly secured method for data communication.
  • 2. International Journal of Information Technology, Modeling and Computing (IJITMC) Vol. 2, No. 1, February 2014 56 2. BACKGROUND THEORY Cryptography can be specified as the security service including authentication, privacy and confidentially. In this paper we have used AES algorithm in cryptography. The three types of algorithms are described: (i) Secret Key Cryptography (SKC): Uses a single key for both encryption and decryption. (ii)Public Key Cryptography (PKC): Uses one key for encryption and another for decryption. (iii)Hash Functions: Uses a mathematical transformation to irreversibly "encrypt" information [6]. Steganography is a mechanism for hiding and retrieving the high sensitive information in data transmission. Steganography must not be confused with cryptography, where the message is converted its meaningless to malicious people who intercept it. The main goal of steganography techniques is that it is diffilcult to detect the image and so saved from attacks. The steganography approaches can be distinguished into three types: pure steganography, secret key steganography and public key steganography. 2.1. AES algorithm for Cryptography Advanced Encryption Standard (AES) is a standard for the encryption of electronic data. The U.S. government held in 1997 and now use in worldwide. AES is a symmetric-key algorithm which means that the same key is used both of sender and receiver. This AES standard specifies the Rijndael algorithm [1], a symmetric block cipher that can process data blocks of 128 bits, using key size of 128, 192, and 256 bits. The input, the output and the cipher key are used in Rijndael. It takes an input and output of certain block size, only 128 bits. 2.1.1. Advantages of using AES algorithm 1. Very Secure. 2. Reasonable Cost. 3. Main Characteristics: I. Flexibility, II. Simplicity. 2.2. DCT - frequency domain algorithm for Steganography The hidden message is a stream of “1” and “0” giving a total number of 80 bits to insert the secret message into the DCT domain of the cover image. The color-based transformation converts the image (cover image) into 8x8 blocks of pixels. Next, at least 80 larger positive coefficients need to embed in the cover image in the low-mid frequency range. DCT can divide the image into high, middle and low frquency components. As the high frequency coefficients are vulnerable and less robust on the quality of image. The main issue of this work is robustness against with high quality of image, thus the low and mid frequency coefficients are the most appropriate. The selected coefficients ci are modified by the corresponding bit in the message stream. This K quantity represents the persistence factor. As soon as the ith term of message bit s(i) is “1”, the coefficient of the image is added with a quantity K; otherwise the same quantity is subtracted form it. Thus the replaced DCT coefficients are DCT (new) = DCT+1*K for s(i)=1; Else DCT (new) = DCT-1*K for s(i)=0.
  • 3. International Journal of Information Technology, Modeling and Computing (IJITMC) Vol. 2, No. 1, February 2014 57 2.2.1. Advantages of using frequency domain Steganography 1. Very secure, hard to detect 2. More flexible, different techniques for calculation of DCT coefficients values 3. PROPOSED COMBINING TECHNIQUE In cryptography, this system is used AES algorithm with its symmetric key and the cipher text is converted into two extra keys for high security, then the steganography is implemented to the key (3) to get stego image. The system is designed with three creation steps to hide the text – (a) For Cryptography – Crypto Creation Step (b) For Steganography – Stego Creation Step (c) For Extra Securtiy – Security Creation Step 3.1. Crypto Creation Step For Crypto Module, the following steps are applied for encrypting the data (Refer Figure1): (a) Insert text for encryption. (b) Apply AES algorithm using 128 bit key. (c) Convert cipher text into types of format Hexadecimal, based 64 string and ASCII code respectively. Figure 1. Crypto Creation Step 3.2. Security Creation Step This security module works as follows: (Refer Figure2) (a) Create array and allocate all the position points of digit (1) from the cipher text. (b) Remove all the positions points of digit (1) from the cipher text and the remaining characters and digits are going to transform as modified cipher text. (c) Remove the first ten allocated position of digit (1) among all digit (1) positions array and generate as a secret key (key 2). (d) Take first ten allocated position points of digit (1) from all position points of digit (1) array and these ten digit(1) will be changed into the form of a secret key key(3). Insert Text AES Method using Key1 Convert Cipher Text into Hexadecimal, Based64 String and ASCII code
  • 4. International Journal of Information Technology, Modeling and Computing (IJITMC) Vol. 2, No. 1, February 2014 58 Figure 2. Security Creation Step 3.3. Stego Creation Step For Stego Module, the following steps are discussed for hiding the above generated cipher text (Refer Figure3). (a) Take the first ten allocated position points of digit (1) from the above discussed Security Module. (b) Scramble the first ten allocated position points of digit (1) using a 64 bit key (Key 3). (c) Take a Color Image. (d) Find the DCT of the Image using color transformation. (e) Hide the Cipher by altering DCTs. (f) Apply Inverse DCT. (g) Find the Stego Image. Figure 3. Stego Creation Step 4. PROPOSED SYSTEM IMPLEMENTATION This system is developed in Visual Studio C# platform, mainly three creation steps involved – (a) Crypto Creation Step – AES Implementation Step (b) Security Creation Step – Newly Developed Technique (c) Stego Creation Step – DCT Techniques Implementation Step Generate Key2 by removing the first ten allocation points from the original positions of digit (1) array from cipher text Create array and allocate all the positions of digit (1) from the cipher text Cipher Text in Hexadecimal, Based64 String and ASCII code Take first ten allocation points of digit (1) and generate as Key3 to be hidden Generate modified cipher text without being digit ole(1) First ten allocation points of digit (1) from the Security Module Scramble the text using a Key3 Hide the first ten allocation points of digit (1) by altering DCT Stego Image Inverse DCT Find the DCT of the image Take a Color Image
  • 5. International Journal of Information Technology, Modeling and Computing (IJITMC) Vol. 2, No. 1, February 2014 59 4.1. Algorithm for the proposed system The steps of the algorithm for hiding text and retrieving text are discussed below (Refer Figure4 & Figure5). 4.1.1. Hiding Text (a) Encrypt the original message into cipher text by using AES algorithm with symmetric key of key 1. (b) Convert the cipher text into Hexadecimal format in the form of alphabets (A to F) and digits (0 to 9), Based 64 string format in the form of alphabets small letter (a to z), capital letter (A to Z), digits (0 to 9) and two arithmetic character (+/-) and ASCII code format of (256) characters respectively. (c) Create array and allocate all the position points of digit (1) from converted cipher text and remove the first ten allocated points of all digit (1) positions and then generate the key (Key 2). (d) Take the first ten allocated position points of digit (1) from array of cipher text and generate it as the third key (Key 3); this part will be hidden in the image. (e) The cipher text without having digit (1) will be remained as modified cipher text. (f) Hide the first ten allocated position points of digit (1) in the image and get Stego-Image. Figure 4. Proposed System for Hiding Text Take first ten allocation points of digit (1) from the digit (1) array of cipher text Create array and allocate all the positions of digit (1) from the cipher text Generate Cipher text using AES algorithm Remaining of all allocation points of digit (1) array after removing the first ten points Remove all the position points of digit (1) from the original cipher text First ten allocation points of digit (1) Hide first ten allocation points of digit (1) in image Stego Image Key2 Key3
  • 6. International Journal of Information Technology, Modeling and Computing (IJITMC) Vol. 2, No. 1, February 2014 60 4.1.2. Retrieving Text Figure 5. Proposed System for Retrieving Text (a) Retrieve the first ten allocated position points of digit (1) from the image and unscramble it with Key 3. (b) Add back the first ten position points of digit (1) into its all position points of digit (1) using Key 2. (c) Add back all position points of digit (1) to the modified cipher text in order to get the original cipher text in Hexadecimal, Based 64 string and ASCII form. (d) Reconstruct the original text message from the cipher text using AES algorithm and its key (Key 1). 4.1.3. Security Properties of Proposed System The proposed system is highly secure because it is a combination of AES algorithm of encryption technique and DCT of message embedding technique. And also including two extra keys make the system highly secured. This system contains total 3 keys. (a) One 128 bits symmetric key for AES algorithm (b) Two 8 bits (1 byte) generated keys for scrambling the cipher text and retrieving the original message. Key2 Stego Image Retrieve first ten allocation points of digit (1) Key3 Key1 Club first ten allocation points of digit (1) and rest of the digit (1) array Retrieve the original text message Reconstruct the cipher text Add all the position points of digit (1) to the original cipher text Key2 and Key3
  • 7. International Journal of Information Technology, Modeling and Computing (IJITMC) Vol. 2, No. 1, February 2014 61 5. RESULTS In this system, it can be compared our proposed system by using three kinds of encoding format type. They are Hexadecimal, Based-64 and ACSII code. Encryption time will be generated as different using three encoding format. Among them, ACSII encoding format is most efficient for large plaintext message to encrypt. But Hexadecimal encoding format will be taken more encryption time than any other format and so it can be used if the message size is small. As concerned with Based-64 encoding format is appropriate message size from below results. This paper shows the comparison of three encoding format in different messages in Figure6 and Figure7. Figure 6. Key Separating time in Different Messages (20-100 Kb) Figure 6. Key Separating time in Different Messages (20-100 Kb) Figure 7. Key Separating time in Different Messages (100-500 Kb) Figure 7. Key Separating time in Different Messages (100-500 Kb) 0 100 200 300 400 500 600 20 40 60 80 100 Time(ms) Message (Kb) Hexadecimal Format Based-64 String Format ASCII Format 0 100 200 300 400 500 600 100 200 300 400 500 Time(ms) Message (Kb) Hexadecimal Format Based-64 String Format ASCII Format
  • 8. International Journal of Information Technology, Modeling and Computing (IJITMC) Vol. 2, No. 1, February 2014 62 6. CONCLUSION In this thesis, a new digital message hiding system is proposed for the combination of cryptography and steganography using three keys and modified cipher text. The combination of these two techniques satisfies the requirements such as highly security and robustness between sender and receiver. The proposed method ensures acceptable image quality with very little distortion in the image. The main advantage of this system is that the method used for AES algorithm which is very secure and the DCT transformation technique is very hard to detect in image steganography. It also produces efficient robustness of stego-image though it had been attacked by other techniques and additionally saved from attacks. Goal of this paper is to develop a new security system that messages cannot be retrieved easily from the image by any attackers or hackers in the communication process. REFERENCES [1] Secure Data Transmission using Stegnography and Encryption Technique, Shamim Ahmed Laskar and Kattamanchi Hemachandran, International Journal on Cryptography and Information Security (IJCIS),Vol.2, No.3, September 2012. [2] Novel Security Scheme for Image Steganography using Cryptography Technique, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 2, Issue 4, April 2012. [3] A Novel Information Security Scheme using Cryptic Steganography B. Raja Rao et. al. / Indian Journal of Computer Science and Engineering Vol. 1 No. 4 327-332. [4] G. Ulutas, M. Ulutas and V. Nabiyev, “Distortion free geometry based secret image sharing”, Elsevier Inc, Procedia Computer Science, Vol.3, pp.721–726, 2011. [5] Proposed System for Data Hiding Using Cryptography And Setganography International Journal of Computer Applications (0975 – 8887) Volume 8– No.9, October 2010. [6] B. E. Carvajal-Gámez , F. J. Gallegos-Funes and J. L. López-Bonilla, “Scaling Factor for RGB Images to Steganography Applications”, Journal of Vectorial Relativity, Vol.4, No.3 pp.55-65, 2009. [7] Domenico Daniele Bloisi, Luca Iocchi: Image based Steganography and cryptography, Computer Vision theory and applications volume 1, pp. 127-134. [8] X. Li and J. Wang, “A steganographic method based upon JPEG and particle swarm optimization algorithm”, Information Sciences 177 (15) (2007) 3099–31091. [9] Domenico Daniele Bloisi, Luca Iocchi: Image based Steganography and cryptography, Computer Vision theory and applications volume 1, pp. 127-134. [10] William Stallings, ―Cryptography and Network Security: Principles and practices‖, Pearson education, Third Edit ion, ISBN 81-7808-902-5.