SlideShare a Scribd company logo
1 of 16
Download to read offline
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.4, July 2013
DOI : 10.5121/ijcnc.2013.5414 173
AN ADAPTIVE PSEUDORANDOM STEGO-CRYPTO
TECHNIQUE FOR DATA COMMUNICATION
Ajay Kumar Nain1
, Shailender Gupta2
, Bharat Bhushan3
, Rashmi Chawla4
YMCA University of Science and Technology
1
aknain90@gmai.com, 2
shailender81@gmail.com, 3
bhrts@yahoo.com,
4
rashmi.chawla@rediffmail.com
ABSTRACT
To provide security in data communication networks various forms of cryptographic and steganographic
algorithms have been proposed. Though both of these techniques serve the same purpose i.e. to secure data
but have some drawbacks. Using cryptography might raise some suspicion whereas in steganography the
distortion in cover can attract an adversary. The combinations of the two as proposed by various
researchers can be very fruitful in terms of brute force search time and robustness against attacks. A
popular method of combination is using pseudorandom Least Significant Bit (LSB) substitution along with
stream cipher or block cipher. The problem with pseudorandom LSB substitution technique is with the
random pixel selection process. It inserts the cipher text on randomly chosen pixels using random interval
method having certain period. Now if this period of random interval number generations is large, it
increases time complexity. On the other hand if it is too low then the cipher text will not be evenly
distributed in all the colour planes. This paper proposes an adaptive method on the basis of size of secret
data for random pixel selection for data embedding. The results show that using such an approach not only
increases brute force search time but also reduces the time complexity of the overall process.
KEYWORDS
Steganogaraphic noise, adaptive colour image steganography, random pixel selection, histograms of
colour image, Difference in histograms, MSE, PSNR
1. INTRODUCTION
Now-a-days the need for information security has increased with the advance in internet
computing. For this purpose various cryptographic and steganographic techniques have been
proposed in literature. Cryptography [2] is basically used to secure the confidential information
by encrypting the secret message using encryption and decryption. On the other hand
Steganography [1,5] is the art of hiding information within innocuous cover carriers in such a way
that the hidden message is undetectable. Though the purpose of both the techniques is same but
both the techniques have limitations. If we had encryption protection in place, an opponent might
still be able to observe the pattern of the transmitting messages. The opponent could determine
the location and identity of communicating hosts and could observe the frequency and length of
messages being exchanged. This information might be useful in guessing the nature of the
communication that was taking place. Similarly in steganography the changes in statistical
properties [8, 11, 12] of the cover can be used by opponent to detect the presence of secret
message.
To overcome the above problem researchers have proposed combination of the steganography
with cryptography [14, 17]. It provides better security to cipher text. In this case if somehow
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.4, July 2013
174
presence of message is detected by an opponent, it requires an additional effort to decrypt the
message also. A popular method available in literature is combining pure LSB substitution
technique along with stream cipher or block cipher. The LSB substitution steganography inserts
the cipher text in the LSB of pixel value [9, 10]. This technique is popular due to presence of
superfluous information in image which can be easily interpolated [3-4]. To increase the brute
force search time the LSB technique is replaced by pseudo random LSB method. In this method
random pixels [6, 7] are selected on the basis of seed value and LSB at corresponding pixels is
replaced by cipher text. The problem with pseudorandom LSB substitution technique is with the
random pixel selection method. This technique inserts the cipher text on randomly chosen pixels
using random interval method having certain period. Now if this period of random interval
number generations is high, it increases time complexity. On the other hand if the period is too
small then the cipher text will not be evenly distributed in all the colour planes.
This paper proposes an adaptive method taking care of above problems. It combines stream
cipher cryptographic technique with modified pseudorandom LSB substitution technique to
provide evenly distribution of cipher text. In addition to it, the proposed method provides enhance
security in terms of brute force search time. It also reduces time complexity value by avoiding the
number of collisions.
The rest of the paper is organized as follows: Section 2 provides the literature survey and the
problem identification. Section 3 provides the algorithm of the proposed technique. The
simulations set up parameters, performance metrics taken are given in section 4. Section 5 gives
the results and discussion followed by concluding remarks and references.
2. LITERATURE SURVEY
Some researchers who have previously worked in this direction as follows:
Shailender Gupta et.al. [14, 16] proposed a hybrid model that combines LSB technique with
symmetric or asymmetric key cryptography. The results show using a hybrid approach that
combines asymmetric key cryptography with steganography is not viable. On the other hand the
hybrid approach has an advantage of increased brute force search time. The problems with this
approach can be summarized as follows:
• The cipher text is not evenly distributed in all the colour planes.
• The brute force search time of this technique is quite high.
•
Recently Ajay Nain et.al. [17] proposed a technique that combines pseudorandom LSB with RC4
cryptography mechanism. Their approach not only improved the brute force search time of the
overall system but an effort was also made to randomly distribute the cipher text in all the colour
planes. The problem with this approach can be summarized as follows:
• The distribution of cipher text in all the colour planes was not proper
• The time complexity of the overall system increased due to increase in number of
collisions.
This paper has been inspired from the above mentioned literature. To improve the above hybrid
techniques the following aspects were kept in mind:
• To evenly distribute Cipher text in all the colour planes.
• To increase the brute force Search time of overall system.
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.4, July 2013
175
• To reduce the value of time complexity
• To minimize the number of collisions during random pixel selection
The next section gives the proposed technique to achieve the above mentioned objectives.
3. PROPOSED TECHNIQUE
Before discussing the proposed algorithm we would like to give a brief description of the
variables and functions (see Table 1) used in our proposal that will help the readers in better
understanding of the proposal.
Table 1. Terminology used in the paper.
Entity Description
C Original Image
S Stego-Image
P Plain Text
D Encrypted secret data
L(d) Length of encrypted data
M * N Image dimensions
Seed seed used to generate random numbers
Random() Function to generate uniformly distributed random numbers
Rc4_Encrypt() Encrypt data using DES or RC4
Rc4_Decrypt() Decrypt data
PPN Pixel position number
Key Key for cryptography
kn Number of bits used for LSB substitution
a, b, c Parameters to be set experimentally
The main step of the proposed technique is to identify the pixels of the cover image where the
cipher text bits are to be stored. This process is same for both the sender and receiver. For this
purpose a Pixel Position Number (PPN) array is calculated in which each member indicates a
unique pixel in the cover image. We denote this process of generating PPN by function Random()
whose inputs are seed, length of cipher text and parameters a, b and c. The process of its
generation is explained below:
The first step is to calculate the number of LSB (kn) require for substitution depending upon the
length of secret message L(d) and size of cover image(MxNx3).
Where ceil() is the greatest integer function
The next step is to identify the pixels of the steganographic cover (S) where the cipher text bits
are to be embedded. For this purpose first of all random numbers are generated between 1 and
max where max is calculated as
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.4, July 2013
176
Where floor() is the smallest integer function
Parameter b decides the number of round to complete selection of pixels over the red, green and
blue plane of cover image. The setting of parameter b is discussed in section 5. From this array
(B) of random numbers PPN is calculated by adaptively addition of random numbers as given
below:
Algorithm: Function Random ()
n=B(1); //n is a temporary variable
PPN(1)=n;
for i=2 to (L(d)/kn)
if round >2
mp=1;
else mp=0;
end if
n=(n+B(i)+c*mp*B(i)) %(MxNx3)
if value of n already exist in PPN check for collision
n=next value;
end if
PPN(i)=n;
end for
output: PPN
In this method we accelerate the width of random interval after completion of two rounds of pixel
selection over entire range of cover image. The value of parameter c decides the change in
interval. The adjustment of this parameter is discussed in section 5. To overcome the problem of
collisions, we compare the current value of PPN from all the previous value of PPN and if the
value is found prior, it means collision is detected. In that case we discard the current value and
choose next value of n. Otherwise we store the current value in PPN array.
The rest of the process of the proposal is explained separately for sender and receiver.
3.1. Sender Side Procedure
The plain text (P) data to be transferred is read as a set of ASCII characters at the sender side.
This text is encrypted using function Rc4_Encrypt () and key. Encrypted text (D) is represented in
bit-stream form and is denoted by d. Then PPN is generated by calling Random() function as
discussed above. Corresponding to each value of PPN the location of pixel in image is identified
by calculating the height (m), width (n), and plane (p) of pixel respectively. Then kn LSBs of
corresponding pixel is replaced by the encrypted data bits. In this way the encryption process is
completed as explained in algorithm:
Algorithm: Embedding Process (sender
side)
Algorithm: Extracting Process(receiver
side)
Input: C, Key, seed, P Input: S, Key, seed, L(d)
S=C; kn=ceil(a*L(d)/(M*N*3));
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.4, July 2013
177
D=Rc4_Encrypt(Key,P);
d=bit-stream(D);
kn=ceil(a*L(d)/(M*N*3));
PPN=Random(b, c, L(d), seed);
for i=1:L(d)/kn
t1=PPN(i);
p=ceil(t/(M*N));
t2=t1-(p-1)*M*N;
m=ceil(t2/N);
n=t2-(m-1)*M;
S(m,n,p) <= d(i,i+kn);
End for
PPN=Random(b, c, L(d), seed);
for i=1:L(d)/kn
t1=PPN(i);
p=ceil(t/(M*N));
t2=t1-(p-1)*M*N;
m=ceil(t2/N);
n=t2-(m-1)*M;
d(i:i+kn) <= S(m, n, p);
End for
P=Rc4_Decrypt(key, D);
Output: S Output: P
3.2. Receiver Side Procedure
For extraction of plain text receiver must know the seed and length of the message L(d) so that to
identify the embedded pixels in stego- image and Key to decrypt the message can be identified.
First of all PPN is generated in the same way as explained above. The kn LSBs of these pixels are
taken as data and then this data is decrypted using Rc4_Decrypt algorithm to obtain plain text (P).
4. SIMULATION SETUP
4.1. Performance metrics
4.1.1. Mean Square Error (MSE)
It measures the statistical difference between the cover and stego-image. The distortion in the
image can be measured using MSE which can be calculated using Equation 1.
……(1)
Where:
The intensity value of the pixel in the cover image.
: The intensity value of the pixel in the stego image.
M*N: Size of an Image.
4.1.2. Peak Signal to Noise Ratio (PSNR)
It is the measure of quality of the image by comparing the cover image with the stego-image.
High PSNR indicates good perceptual quality of stego-image. It is calculated using Equation 2.
…….(2)
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.4, July 2013
178
4.1.3. Histograms
Histogram is a measure of the number of occurrence of pixels with respect to particular pixel
value [13]. During embedding pixel value changes, hence number of pixels having a particular
pixel value gets changed. These changes can be used to detect steganography.
4.1.4. Steganographic Noise
It shows the pixels in the image on which data is embedded. Evenly distribution of noise all over
the image indicates good quality of steganography technique.
4.1.5 Collisions
During identification of pixel positions if a pixel position number is repeated more than once then
it is referred to as collision. These collisions adversely affect time complexity of the process.
4.1.6 Time Complexity
The total time taken by all the processing on receiver and sender side comprises of time
complexity.
4.2 Setup parameters
The MATLAB Version 7.13.0.564 (R2011b) is used to implement and simulate the proposed
technique. MATLAB is used because of large number of advanced inbuilt functions and image
processing toolbox. The various simulation parameters are given in Table 2.
Table 1. Setup parameters.
Cover image 256*256*3 (colour)
Image type Bmp
Secret text file size (kb) 0.5, 2 ,8,32
Simulation Tool MATLAB 7.13.0.564
Pseudo Random Number Generator ‘Uniform’ with seed=33559
Cryptography RC4 key= ‘ajaynain’
Processor Core-i3 @2.53 Ghz RAM 3GB
5. EXPERIMENTAL STUDY
5.1. Adjustment of parameters
We have used three parameters a, b and c in the proposed method. To accurately measure the
performance of the proposed technique it is important to optimize these parameters. For
optimization purpose we analyzed the time complexity, collisions, distribution of steganographic
data and complexity of hidden message.
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.4, July 2013
179
• The value parameter ‘a’ is inversely linked to embedding capacity. If value of this
parameter is low then embedding capacity and distortion is high and time complexity is
low. To find the value of ‘a’ experiments were performed and the best results were
obtained for value equal to 2.
• The value of ‘b’ decides the number of rounds to allocate the random pixels for
embedding the cipher text evenly throughout the image. If the value of ‘b’ is kept high
then number of rounds would increase resulting in increased number of collisions and
time complexity. On the other hand if value of ‘b’ is taken small then the complexity of
hidden message is reduced because of adjacent bits of message comes more close on the
cover image. Value of ‘b’ as 4 is considered as an optimum one.
• The value of ‘c’ scatters the remaining bits after two rounds of pixel selection over the
full range of image. The value of ‘c’ is set to 6 in case of our experiment since at this
value scattering of cipher text was perfect.
5.2. Results
5.2.1. Perceptual Quality
By inspection of Figure 1 we can say that proposed techniques does not introduce significance
changes in the image quality.
File
size
=.5kb
Figure 1(a)Impact of Proposed
Technique
Figure 1(b) Impact of Previous
Technique
File
size =2
kb
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.4, July 2013
180
Figure 1(c) Impact of Proposed
Technique
Figure 1(d) Impact of Previous
Technique
File
size =8
kb
Figure 1(e) Impact of Proposed
Technique
Figure 1(f) Impact ofPrevious
Technique
File
size
=32 kb
Figure 1(g) Impact of Proposed
Technique
Figure 1(h) Impact of Previous
Technique
Figure 1. Impact on Perceptual Quality
5.2.2. Histogram Representation
The differences in histograms of cover image and the image after applying previous and proposed
technique are shown in Figure 2. The Figure 2(a) shows the histogram of the actual image while
the Figure 2(b) and Figure 2(c) shows the impact on histogram after applying previous and
proposed technique on image. Figure 2(d) to Figure 2(k) show the differences in the number of
pixel values between original image and the image obtained after applying the proposed
mechanism. The following inference can be drawn from the Figure 2:
• As the size of secret file increases the changes in histogram increases.
• In proposed technique the changes in histogram are almost same in the red, green and
blue colour planes while in the previous technique the cipher text is only distributed in
Red plane only.
Red Plane Green Plane Blue Plane
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.4, July 2013
181
Figure 2(a). Histograms of original cover image
Figure 2(b) Histograms of stego-image of previous technique
Figure 2(c) Histograms of stego-image of proposed technique
Figure 2(d) Difference in Histograms for previous technique with file size =0.5 kb
Figure 2(e) Difference in Histograms for proposed technique with file size = 0.5 kb
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.4, July 2013
182
Figure 2(f) Difference in Histograms for previous technique with file size =2 kb
Figure 2(g) Difference in Histograms for proposed technique with file size=2 kb
Figure 2(h) Difference in Histograms for previous technique with file size =8 kb
Figure 2(i) Difference in Histograms for proposed technique with file size =8 kb
Figure (j) Difference in Histograms for previous technique with file size=32kb
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.4, July 2013
183
Figure 2(k) Difference in Histograms for proposed technique with file size =32 kb
Figure 2. Comparison of Difference of Histograms
5.2.3. Impact on MSE and PSNR
These two parameters give an insight to check the variation on image quality mathematically. By
analyzing the two parameters from Figure 3 following inferences can be made:
• As the file size increases the value of PSNR decreases and that of MSE increases. This is
due to the fact that error increases by increasing the number of embedding pixels and
PSNR is inversely proportional to MSE from equation (1) and equation (2).
• By using the proposed adaptive technique the changes in MSE and PSNR are marginal
due to the fact that the length of data to be embedded is same.
Figure 3(a) Comparison of PSNR Figure 3(b) Comparison of MSE
Figure 3. Comparison of MSE and PSNR
5.2.4. Impact on time complexity
The time complexity of the proposed technique mainly depends upon the number of collision and
the size of the data to be embedded. The following inferences can be drawn from the results (see
Figure 4):
• Time complexity of proposed technique is less than that of the other technique due to the
reduction in the number of collisions.
• As the file size increases the time complexity increases drastically.
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.4, July 2013
184
Figure 4. Comparison of time complexity
5.2.5. Collisions
The number of collision depends upon the size of cipher text to be embedded in image. From
Figure 5, the following points can be inferred:
• The proposed technique reduces the number of collision in comparison to the previous
strategy as the matter of fact that range of random pixel selection is adaptive in our case.
• The number of collision as expected to increase by increasing the file size.
Figure 5. comparison of number of collisions
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.4, July 2013
185
5.2.6. Distribution of Steganographic Noise
Steganographic Noise shows the distribution of the cipher text over the red, green and blue colour
planes. From Figure 6 the following inferences can be drawn:
• The proposed technique distributes the cipher text evenly in all the planes. On the other
hand the previous technique distributes high concentration in Red plane followed by
Green and Blue plane.
• As the size of cipher text increases the distribution of cipher text crosses Red plane in
case of previous technique.
Red Plane Green Plane Blue Plane
Figure 6(a) Distribution of steganographic noise for previous technique with file size =.5 kb
Figure 6(b) Distribution of steganographic noise for proposed technique with file size .5 kb
Figure 6(c) Distribution of steganographic noise for previous technique with file size=2 kb
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.4, July 2013
186
Figure 6(d) Distribution of steganographic noise for proposed technique with file size=2kb
Figure 6(e) Distribution of steganographic noise for previous technique with file size=8 kb
Figure 6(f) Distribution of steganographic noise for proposed technique with file size =8 kb
Figure 6(g) Distribution of steganographic noise for previous technique with file size =32 kb
Figure 6(h) Distribution of steganographic noise for proposed technique with file size= 32 kb
Figure 6. Comparison of MSE and PSNR
5.2.7. Brute Force Search Time
In the previous technique message can be extracted with two keys: seed and decryption key
whereas in the proposed technique third parameter as length of secret data also a mandatory
requirement to extract the plaint text due to the fact that randomly selection of pixels also depends
on the length of data. Despite having seed for pseudo random number generation an adversary
cannot identify the embedded pixels. This provides additional security to secret data by increasing
the brute force search time.
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.4, July 2013
187
6. CONCLUSIONS AND FUTURE SCOPE
In this paper we propose an adaptive technique to provide enhanced security to plain text data by
applying both cryptography and modified pseudorandom steganography. Following points can be
inferred from the Table 3:
• Proposed technique provides more robustness against attacks by in terms of brute force
search time. Also there is a need of Length requirement of data for an adversary to
decrypt the plain text successfully.
• The number of collision in the proposed technique as compared to previous one is also
very low implying the time complexity of the overall process to be low.
• The proposed adaptive technique evenly distributes the cipher text in all the colour planes
in comparison to the previous one in which the distribution was not even.
• The value of MSE and PSNR of the proposed technique is nearly same in comparison to
the previous one since the length of data to be embedded is nearly same.
• This paper shows how an adaptive technique can enhance the performance of
stenographic process.
Table 3: Overall inferences of proposed scheme
Parameters Previous Technique Proposed technique
Brute Force Search Time Low High
Time Complexity High Low
Intensity of data distribution
on colour planes
Vary at all the planes Approximately same
Collisions High Low
MSE Almost same
PSNR Almost same
REFERENCES
[1] "Steganography in Digital Media: Principles, Algorithms and Applications", Jessica Fridrich.
[2] “Cryptography and Network Security principles and practices”, William Stallings, pearsons
education, first Indian reprint 2003
[3] Kurak, C., and J. McHughes, "ACautionary Note On Image Downgrading," in IEEEComputer
Security Applications Conference 1992, Proceedings, IEEE Press, 1992, pp.153-159.
[4] Bender, W., D. Gruhl, and N. Morimoto, “Techniques for data hiding”, IBM Systems Journal, vol. 35,
no. 34, 1996, pp. 131-336.
[5] M¨oller, S., A. Pitzmann, and I. Stirand, “Computer Based Steganography How It Works and Why
Therefore Any Restrictions on Cryptography Are Nonsense, At Best, in Information Hiding” First
International Workshop, Proceedings, vol. 1174 of Lecture Notes in Computer Science, Springer,
1996, pp. 7-21.
[6] Luby, M., and C. Racko, “How to Construct Pseudorandom Permutations from Pseudorandom
Functions”, SIAM Journal on Computation, vol. 17, no. 2, 1988, pp. 373-386.
[7] Naor, M., and O. Reingold, “On the Construction of Pseudorandom Permutations” Luby-Racko
Revisited, Journal of Cryptology, vol. 12, no. 1, 1999, pp. 29-66
[8] J. Fridrich, M. Goljan, and R. Du, “Detecting LSB Steganography in Colour and Gray-Scale Images”,
Magazine of IEEE Multimedia Special Issue on Security, pp. 22-28, October-November 2001
[9] Provos, N. “Defending Against Statistical Steganalysis”. Proc. 10th USENIX Security Symposium.
Washington, DC, 2001
[10] J.J. Eggers, R. Bauml and B. Girod, “A communications approach to image steganography”,
Proceedings of SPIE, vol.4675, pp.26-37, 2002.
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.4, July 2013
188
[11] J. Fridrich,M. Goljan, “Practical Steganalysis of Digital Images – State of the Art”, Proc. SPIE,
Photonics West, Vol. 4675, Electronic Imaging 2002, Security and Watermarking of Multimedia
Contents, San Jose, California, pp. 1-13, January, 2002.
[12] J. Fridrich, M. Goljan, and T. Holotyak, “New Blind Steganalysis and its Implications”, in Proc. SPIE
Security, Steganography, and Watermarking of Multimedia Contents VIII, vol. 6072, pp. 607201, Jan.
2006
[13] K. Solanki, K. Sullivan, U. Madhow, B. S. Manjunath, and S. Chandrasekaran “Provably secure
steganography: Achieving zero K-L Divergence using statistical restoration” , Published in
proceedings of ICIP 2006, pp. 125-128, IEEE 2006.
[14] Shailender Gupta, Ankur Goyal, Bharat Bhushan,“Information Hiding Using Least Significant Bit
Steganography and Cryptography”,I.J.Modern Education and Computer Science, 2012, 6, 27-34
[15] Rengarajan Amirtharajan, Jiaohua Qin, John Bosco Balaguru Rayapan, “Random Image
Steganography and Steganalysis: Present Status and Future DIarections”, Information Technology
Journal 11(5): 566-576,2012
[16] Shailender Gupta, Bharat Bhushan, Surbhi Singhania and Jeetesh Gulani “A Hybrid approach for
ensuring security in data communication”, Accepted for publication in CCSIT 2013
[17] Shailender Gupta, Bharat Bhushan, Surbhi Singhania, Ajay Nain “A Novel Crypt-Stego Technique
for Information Security in Communication Networks” Accepted for publication in IJSP 2013
Authors
Ajay Kumar Nain received his B. Tech degree from Department of Electronics and
Communication Engineering at GJUS&T, Hisar, India in 2011. He is currently pursuing his
M. Tech at YMCA University of Science and Technology, Faridabad, India. His current
interests focus on image processing and Network security.
Shailender Gupta
Assistant Professor (Electronics Engg.)
YMCA University of Science and Technology,
Faridabad
E-mail: shailender81@gmail.com
Mr. Shailender Gupta is B. Tech (Electronics) and M. Tech and Ph. D (Computer Engg.) from YMCA
University of Science and Technology. His academic interests include network security, automata theory
and fuzzy logic.
Shailender Gupta
Assistant Professor (Electronics Engg.)
YMCA University of Science and Technology,
Faridabad
E-mail: shailender81@gmail.com
Mr. Bharat Bhushan has B. Tech (Electronics) from PEC and M.Tech (Electronics) from YMCA
University of Science and Technology. His academic interests include Mobile Ad-hoc Network, Network
Security.
Bharat Bhushan
Assistant Professor (Electronics Engg.)
YMCA University of Science and Technology,
Faridabad
E-mail: bhrts@yahoomail.com
Ms. Rashmi Chawla has B. Tech (Electronics) and M.Tech (Electronics) from RGPVV, Bhopal. Her
academic interests include Image Processing, Network Security and VLSI Designing.
Rashmi Chawla
Assistant Professor (Electronics Engg.)
YMCA University of Science and Technology,
Faridabad
E-mail: rashmi.chawla@rediffmail.com

More Related Content

What's hot

Compressive Sensing Based Simultaneous Data Compression and Convergent Encryp...
Compressive Sensing Based Simultaneous Data Compression and Convergent Encryp...Compressive Sensing Based Simultaneous Data Compression and Convergent Encryp...
Compressive Sensing Based Simultaneous Data Compression and Convergent Encryp...IJCSIS Research Publications
 
E031022026
E031022026E031022026
E031022026ijceronline
 
Text Steganography Using Compression and Random Number Generators
Text Steganography Using Compression and Random Number GeneratorsText Steganography Using Compression and Random Number Generators
Text Steganography Using Compression and Random Number GeneratorsEditor IJCATR
 
Modifications in lsb based steganography
Modifications in lsb based steganographyModifications in lsb based steganography
Modifications in lsb based steganographyAslesha Niki
 
A Novel Framework for Short Tandem Repeats (STRs) Using Parallel String Matching
A Novel Framework for Short Tandem Repeats (STRs) Using Parallel String MatchingA Novel Framework for Short Tandem Repeats (STRs) Using Parallel String Matching
A Novel Framework for Short Tandem Repeats (STRs) Using Parallel String MatchingIJERA Editor
 
Hiding text in speech signal using K-means, LSB techniques and chaotic maps
Hiding text in speech signal using K-means, LSB techniques and chaotic maps Hiding text in speech signal using K-means, LSB techniques and chaotic maps
Hiding text in speech signal using K-means, LSB techniques and chaotic maps IJECEIAES
 
Image Steganography Based On Hill Cipher with Key Hiding Technique
Image Steganography Based On Hill Cipher with Key Hiding TechniqueImage Steganography Based On Hill Cipher with Key Hiding Technique
Image Steganography Based On Hill Cipher with Key Hiding TechniqueIOSR Journals
 
Performance Efficient DNA Sequence Detectionalgo
Performance Efficient DNA Sequence DetectionalgoPerformance Efficient DNA Sequence Detectionalgo
Performance Efficient DNA Sequence DetectionalgoRahul Shirude
 
New Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel EncryptionNew Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel EncryptionIJERA Editor
 
A new partial image encryption method for document images using variance base...
A new partial image encryption method for document images using variance base...A new partial image encryption method for document images using variance base...
A new partial image encryption method for document images using variance base...IJECEIAES
 
Elgamal signature for content distribution with network coding
Elgamal signature for content distribution with network codingElgamal signature for content distribution with network coding
Elgamal signature for content distribution with network codingijwmn
 
Message Embedded Cipher Using 2-D Chaotic Map
Message Embedded Cipher Using 2-D Chaotic MapMessage Embedded Cipher Using 2-D Chaotic Map
Message Embedded Cipher Using 2-D Chaotic Mapijccmsjournal
 
Implementation on Data Security Approach in Dynamic Multi Hop Communication
 Implementation on Data Security Approach in Dynamic Multi Hop Communication Implementation on Data Security Approach in Dynamic Multi Hop Communication
Implementation on Data Security Approach in Dynamic Multi Hop CommunicationIJCSIS Research Publications
 
A Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data DecryptionA Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data DecryptionIJERA Editor
 
Ge3611231125
Ge3611231125Ge3611231125
Ge3611231125IJERA Editor
 
Paper id 25201451
Paper id 25201451Paper id 25201451
Paper id 25201451IJRAT
 
Improved LSB Steganograhy Technique for grayscale and RGB images
Improved LSB Steganograhy Technique for grayscale and RGB imagesImproved LSB Steganograhy Technique for grayscale and RGB images
Improved LSB Steganograhy Technique for grayscale and RGB imagesIJERA Editor
 

What's hot (18)

Compressive Sensing Based Simultaneous Data Compression and Convergent Encryp...
Compressive Sensing Based Simultaneous Data Compression and Convergent Encryp...Compressive Sensing Based Simultaneous Data Compression and Convergent Encryp...
Compressive Sensing Based Simultaneous Data Compression and Convergent Encryp...
 
E031022026
E031022026E031022026
E031022026
 
Text Steganography Using Compression and Random Number Generators
Text Steganography Using Compression and Random Number GeneratorsText Steganography Using Compression and Random Number Generators
Text Steganography Using Compression and Random Number Generators
 
Modifications in lsb based steganography
Modifications in lsb based steganographyModifications in lsb based steganography
Modifications in lsb based steganography
 
A Novel Framework for Short Tandem Repeats (STRs) Using Parallel String Matching
A Novel Framework for Short Tandem Repeats (STRs) Using Parallel String MatchingA Novel Framework for Short Tandem Repeats (STRs) Using Parallel String Matching
A Novel Framework for Short Tandem Repeats (STRs) Using Parallel String Matching
 
Hiding text in speech signal using K-means, LSB techniques and chaotic maps
Hiding text in speech signal using K-means, LSB techniques and chaotic maps Hiding text in speech signal using K-means, LSB techniques and chaotic maps
Hiding text in speech signal using K-means, LSB techniques and chaotic maps
 
Image Steganography Based On Hill Cipher with Key Hiding Technique
Image Steganography Based On Hill Cipher with Key Hiding TechniqueImage Steganography Based On Hill Cipher with Key Hiding Technique
Image Steganography Based On Hill Cipher with Key Hiding Technique
 
Performance Efficient DNA Sequence Detectionalgo
Performance Efficient DNA Sequence DetectionalgoPerformance Efficient DNA Sequence Detectionalgo
Performance Efficient DNA Sequence Detectionalgo
 
New Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel EncryptionNew Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel Encryption
 
A new partial image encryption method for document images using variance base...
A new partial image encryption method for document images using variance base...A new partial image encryption method for document images using variance base...
A new partial image encryption method for document images using variance base...
 
Elgamal signature for content distribution with network coding
Elgamal signature for content distribution with network codingElgamal signature for content distribution with network coding
Elgamal signature for content distribution with network coding
 
Message Embedded Cipher Using 2-D Chaotic Map
Message Embedded Cipher Using 2-D Chaotic MapMessage Embedded Cipher Using 2-D Chaotic Map
Message Embedded Cipher Using 2-D Chaotic Map
 
Implementation on Data Security Approach in Dynamic Multi Hop Communication
 Implementation on Data Security Approach in Dynamic Multi Hop Communication Implementation on Data Security Approach in Dynamic Multi Hop Communication
Implementation on Data Security Approach in Dynamic Multi Hop Communication
 
W4301117121
W4301117121W4301117121
W4301117121
 
A Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data DecryptionA Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data Decryption
 
Ge3611231125
Ge3611231125Ge3611231125
Ge3611231125
 
Paper id 25201451
Paper id 25201451Paper id 25201451
Paper id 25201451
 
Improved LSB Steganograhy Technique for grayscale and RGB images
Improved LSB Steganograhy Technique for grayscale and RGB imagesImproved LSB Steganograhy Technique for grayscale and RGB images
Improved LSB Steganograhy Technique for grayscale and RGB images
 

Viewers also liked

The impact of innovation on travel and tourism industries (World Travel Marke...
The impact of innovation on travel and tourism industries (World Travel Marke...The impact of innovation on travel and tourism industries (World Travel Marke...
The impact of innovation on travel and tourism industries (World Travel Marke...Brian Solis
 
Open Source Creativity
Open Source CreativityOpen Source Creativity
Open Source CreativitySara Cannon
 
Reuters: Pictures of the Year 2016 (Part 2)
Reuters: Pictures of the Year 2016 (Part 2)Reuters: Pictures of the Year 2016 (Part 2)
Reuters: Pictures of the Year 2016 (Part 2)maditabalnco
 
What's Next in Growth? 2016
What's Next in Growth? 2016What's Next in Growth? 2016
What's Next in Growth? 2016Andrew Chen
 
The Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post FormatsThe Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post FormatsBarry Feldman
 
The Outcome Economy
The Outcome EconomyThe Outcome Economy
The Outcome EconomyHelge Tennø
 
32 Ways a Digital Marketing Consultant Can Help Grow Your Business
32 Ways a Digital Marketing Consultant Can Help Grow Your Business32 Ways a Digital Marketing Consultant Can Help Grow Your Business
32 Ways a Digital Marketing Consultant Can Help Grow Your BusinessBarry Feldman
 

Viewers also liked (7)

The impact of innovation on travel and tourism industries (World Travel Marke...
The impact of innovation on travel and tourism industries (World Travel Marke...The impact of innovation on travel and tourism industries (World Travel Marke...
The impact of innovation on travel and tourism industries (World Travel Marke...
 
Open Source Creativity
Open Source CreativityOpen Source Creativity
Open Source Creativity
 
Reuters: Pictures of the Year 2016 (Part 2)
Reuters: Pictures of the Year 2016 (Part 2)Reuters: Pictures of the Year 2016 (Part 2)
Reuters: Pictures of the Year 2016 (Part 2)
 
What's Next in Growth? 2016
What's Next in Growth? 2016What's Next in Growth? 2016
What's Next in Growth? 2016
 
The Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post FormatsThe Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post Formats
 
The Outcome Economy
The Outcome EconomyThe Outcome Economy
The Outcome Economy
 
32 Ways a Digital Marketing Consultant Can Help Grow Your Business
32 Ways a Digital Marketing Consultant Can Help Grow Your Business32 Ways a Digital Marketing Consultant Can Help Grow Your Business
32 Ways a Digital Marketing Consultant Can Help Grow Your Business
 

Similar to AN ADAPTIVE PSEUDORANDOM STEGO-CRYPTO TECHNIQUE FOR DATA COMMUNICATION

Developing Algorithms for Image Steganography and Increasing the Capacity Dep...
Developing Algorithms for Image Steganography and Increasing the Capacity Dep...Developing Algorithms for Image Steganography and Increasing the Capacity Dep...
Developing Algorithms for Image Steganography and Increasing the Capacity Dep...IJCNCJournal
 
DEVELOPING ALGORITHMS FOR IMAGE STEGANOGRAPHY AND INCREASING THE CAPACITY DEP...
DEVELOPING ALGORITHMS FOR IMAGE STEGANOGRAPHY AND INCREASING THE CAPACITY DEP...DEVELOPING ALGORITHMS FOR IMAGE STEGANOGRAPHY AND INCREASING THE CAPACITY DEP...
DEVELOPING ALGORITHMS FOR IMAGE STEGANOGRAPHY AND INCREASING THE CAPACITY DEP...IJCNCJournal
 
A novel secure image steganography method based on chaos theory in spatial do...
A novel secure image steganography method based on chaos theory in spatial do...A novel secure image steganography method based on chaos theory in spatial do...
A novel secure image steganography method based on chaos theory in spatial do...ijsptm
 
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...IJNSA Journal
 
37de29c2ae88c046317fcfbebd7a66784874
37de29c2ae88c046317fcfbebd7a6678487437de29c2ae88c046317fcfbebd7a66784874
37de29c2ae88c046317fcfbebd7a66784874hemant gupta
 
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSBON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSBijcsit
 
Comparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography TechniquesComparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography TechniquesEswar Publications
 
Av4102350358
Av4102350358Av4102350358
Av4102350358IJERA Editor
 
A Hybrid Approach for Ensuring Security in Data Communication
A Hybrid Approach for Ensuring Security in Data Communication A Hybrid Approach for Ensuring Security in Data Communication
A Hybrid Approach for Ensuring Security in Data Communication cscpconf
 
Cecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in imageCecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in imageijctet
 
A Review of Comparison Techniques of Image Steganography
A Review of Comparison Techniques of Image SteganographyA Review of Comparison Techniques of Image Steganography
A Review of Comparison Techniques of Image SteganographyIOSR Journals
 
Text in Image Hiding using Developed LSB and Random Method
Text in Image Hiding using Developed LSB and  Random Method Text in Image Hiding using Developed LSB and  Random Method
Text in Image Hiding using Developed LSB and Random Method IJECEIAES
 
Reference-free differential histogram-correlative detection of steganography:...
Reference-free differential histogram-correlative detection of steganography:...Reference-free differential histogram-correlative detection of steganography:...
Reference-free differential histogram-correlative detection of steganography:...nooriasukmaningtyas
 
Hk3312911294
Hk3312911294Hk3312911294
Hk3312911294IJERA Editor
 
A COMPARISON BETWEEN PARALLEL AND SEGMENTATION METHODS USED FOR IMAGE ENCRYPT...
A COMPARISON BETWEEN PARALLEL AND SEGMENTATION METHODS USED FOR IMAGE ENCRYPT...A COMPARISON BETWEEN PARALLEL AND SEGMENTATION METHODS USED FOR IMAGE ENCRYPT...
A COMPARISON BETWEEN PARALLEL AND SEGMENTATION METHODS USED FOR IMAGE ENCRYPT...ijcsit
 
A Study of Various Steganographic Techniques Used for Information Hiding
A Study of Various Steganographic Techniques Used for Information HidingA Study of Various Steganographic Techniques Used for Information Hiding
A Study of Various Steganographic Techniques Used for Information Hidingijcses
 
A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...ijsptm
 
A Spatial Domain Image Steganography Technique Based on Matrix Embedding and ...
A Spatial Domain Image Steganography Technique Based on Matrix Embedding and ...A Spatial Domain Image Steganography Technique Based on Matrix Embedding and ...
A Spatial Domain Image Steganography Technique Based on Matrix Embedding and ...CSCJournals
 
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...Design and Implementation of Data Hiding Technique by Using MPEG Video with C...
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...Editor IJMTER
 

Similar to AN ADAPTIVE PSEUDORANDOM STEGO-CRYPTO TECHNIQUE FOR DATA COMMUNICATION (20)

Developing Algorithms for Image Steganography and Increasing the Capacity Dep...
Developing Algorithms for Image Steganography and Increasing the Capacity Dep...Developing Algorithms for Image Steganography and Increasing the Capacity Dep...
Developing Algorithms for Image Steganography and Increasing the Capacity Dep...
 
DEVELOPING ALGORITHMS FOR IMAGE STEGANOGRAPHY AND INCREASING THE CAPACITY DEP...
DEVELOPING ALGORITHMS FOR IMAGE STEGANOGRAPHY AND INCREASING THE CAPACITY DEP...DEVELOPING ALGORITHMS FOR IMAGE STEGANOGRAPHY AND INCREASING THE CAPACITY DEP...
DEVELOPING ALGORITHMS FOR IMAGE STEGANOGRAPHY AND INCREASING THE CAPACITY DEP...
 
A novel secure image steganography method based on chaos theory in spatial do...
A novel secure image steganography method based on chaos theory in spatial do...A novel secure image steganography method based on chaos theory in spatial do...
A novel secure image steganography method based on chaos theory in spatial do...
 
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
 
37de29c2ae88c046317fcfbebd7a66784874
37de29c2ae88c046317fcfbebd7a6678487437de29c2ae88c046317fcfbebd7a66784874
37de29c2ae88c046317fcfbebd7a66784874
 
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSBON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
 
Comparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography TechniquesComparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography Techniques
 
Av4102350358
Av4102350358Av4102350358
Av4102350358
 
A Hybrid Approach for Ensuring Security in Data Communication
A Hybrid Approach for Ensuring Security in Data Communication A Hybrid Approach for Ensuring Security in Data Communication
A Hybrid Approach for Ensuring Security in Data Communication
 
Cecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in imageCecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in image
 
A Review of Comparison Techniques of Image Steganography
A Review of Comparison Techniques of Image SteganographyA Review of Comparison Techniques of Image Steganography
A Review of Comparison Techniques of Image Steganography
 
Ijetcas14 527
Ijetcas14 527Ijetcas14 527
Ijetcas14 527
 
Text in Image Hiding using Developed LSB and Random Method
Text in Image Hiding using Developed LSB and  Random Method Text in Image Hiding using Developed LSB and  Random Method
Text in Image Hiding using Developed LSB and Random Method
 
Reference-free differential histogram-correlative detection of steganography:...
Reference-free differential histogram-correlative detection of steganography:...Reference-free differential histogram-correlative detection of steganography:...
Reference-free differential histogram-correlative detection of steganography:...
 
Hk3312911294
Hk3312911294Hk3312911294
Hk3312911294
 
A COMPARISON BETWEEN PARALLEL AND SEGMENTATION METHODS USED FOR IMAGE ENCRYPT...
A COMPARISON BETWEEN PARALLEL AND SEGMENTATION METHODS USED FOR IMAGE ENCRYPT...A COMPARISON BETWEEN PARALLEL AND SEGMENTATION METHODS USED FOR IMAGE ENCRYPT...
A COMPARISON BETWEEN PARALLEL AND SEGMENTATION METHODS USED FOR IMAGE ENCRYPT...
 
A Study of Various Steganographic Techniques Used for Information Hiding
A Study of Various Steganographic Techniques Used for Information HidingA Study of Various Steganographic Techniques Used for Information Hiding
A Study of Various Steganographic Techniques Used for Information Hiding
 
A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...
 
A Spatial Domain Image Steganography Technique Based on Matrix Embedding and ...
A Spatial Domain Image Steganography Technique Based on Matrix Embedding and ...A Spatial Domain Image Steganography Technique Based on Matrix Embedding and ...
A Spatial Domain Image Steganography Technique Based on Matrix Embedding and ...
 
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...Design and Implementation of Data Hiding Technique by Using MPEG Video with C...
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...
 

More from IJCNCJournal

Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
 
April 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsApril 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
 
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficIJCNCJournal
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficIJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
 
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...IJCNCJournal
 
March 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsMarch 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
 
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...IJCNCJournal
 
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...IJCNCJournal
 
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemSensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemIJCNCJournal
 

More from IJCNCJournal (20)

Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
 
April 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsApril 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & Communications
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
 
March 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsMarch 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & Communications
 
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
 
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
 
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemSensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
 

Recently uploaded

"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 

Recently uploaded (20)

"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 

AN ADAPTIVE PSEUDORANDOM STEGO-CRYPTO TECHNIQUE FOR DATA COMMUNICATION

  • 1. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.4, July 2013 DOI : 10.5121/ijcnc.2013.5414 173 AN ADAPTIVE PSEUDORANDOM STEGO-CRYPTO TECHNIQUE FOR DATA COMMUNICATION Ajay Kumar Nain1 , Shailender Gupta2 , Bharat Bhushan3 , Rashmi Chawla4 YMCA University of Science and Technology 1 aknain90@gmai.com, 2 shailender81@gmail.com, 3 bhrts@yahoo.com, 4 rashmi.chawla@rediffmail.com ABSTRACT To provide security in data communication networks various forms of cryptographic and steganographic algorithms have been proposed. Though both of these techniques serve the same purpose i.e. to secure data but have some drawbacks. Using cryptography might raise some suspicion whereas in steganography the distortion in cover can attract an adversary. The combinations of the two as proposed by various researchers can be very fruitful in terms of brute force search time and robustness against attacks. A popular method of combination is using pseudorandom Least Significant Bit (LSB) substitution along with stream cipher or block cipher. The problem with pseudorandom LSB substitution technique is with the random pixel selection process. It inserts the cipher text on randomly chosen pixels using random interval method having certain period. Now if this period of random interval number generations is large, it increases time complexity. On the other hand if it is too low then the cipher text will not be evenly distributed in all the colour planes. This paper proposes an adaptive method on the basis of size of secret data for random pixel selection for data embedding. The results show that using such an approach not only increases brute force search time but also reduces the time complexity of the overall process. KEYWORDS Steganogaraphic noise, adaptive colour image steganography, random pixel selection, histograms of colour image, Difference in histograms, MSE, PSNR 1. INTRODUCTION Now-a-days the need for information security has increased with the advance in internet computing. For this purpose various cryptographic and steganographic techniques have been proposed in literature. Cryptography [2] is basically used to secure the confidential information by encrypting the secret message using encryption and decryption. On the other hand Steganography [1,5] is the art of hiding information within innocuous cover carriers in such a way that the hidden message is undetectable. Though the purpose of both the techniques is same but both the techniques have limitations. If we had encryption protection in place, an opponent might still be able to observe the pattern of the transmitting messages. The opponent could determine the location and identity of communicating hosts and could observe the frequency and length of messages being exchanged. This information might be useful in guessing the nature of the communication that was taking place. Similarly in steganography the changes in statistical properties [8, 11, 12] of the cover can be used by opponent to detect the presence of secret message. To overcome the above problem researchers have proposed combination of the steganography with cryptography [14, 17]. It provides better security to cipher text. In this case if somehow
  • 2. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.4, July 2013 174 presence of message is detected by an opponent, it requires an additional effort to decrypt the message also. A popular method available in literature is combining pure LSB substitution technique along with stream cipher or block cipher. The LSB substitution steganography inserts the cipher text in the LSB of pixel value [9, 10]. This technique is popular due to presence of superfluous information in image which can be easily interpolated [3-4]. To increase the brute force search time the LSB technique is replaced by pseudo random LSB method. In this method random pixels [6, 7] are selected on the basis of seed value and LSB at corresponding pixels is replaced by cipher text. The problem with pseudorandom LSB substitution technique is with the random pixel selection method. This technique inserts the cipher text on randomly chosen pixels using random interval method having certain period. Now if this period of random interval number generations is high, it increases time complexity. On the other hand if the period is too small then the cipher text will not be evenly distributed in all the colour planes. This paper proposes an adaptive method taking care of above problems. It combines stream cipher cryptographic technique with modified pseudorandom LSB substitution technique to provide evenly distribution of cipher text. In addition to it, the proposed method provides enhance security in terms of brute force search time. It also reduces time complexity value by avoiding the number of collisions. The rest of the paper is organized as follows: Section 2 provides the literature survey and the problem identification. Section 3 provides the algorithm of the proposed technique. The simulations set up parameters, performance metrics taken are given in section 4. Section 5 gives the results and discussion followed by concluding remarks and references. 2. LITERATURE SURVEY Some researchers who have previously worked in this direction as follows: Shailender Gupta et.al. [14, 16] proposed a hybrid model that combines LSB technique with symmetric or asymmetric key cryptography. The results show using a hybrid approach that combines asymmetric key cryptography with steganography is not viable. On the other hand the hybrid approach has an advantage of increased brute force search time. The problems with this approach can be summarized as follows: • The cipher text is not evenly distributed in all the colour planes. • The brute force search time of this technique is quite high. • Recently Ajay Nain et.al. [17] proposed a technique that combines pseudorandom LSB with RC4 cryptography mechanism. Their approach not only improved the brute force search time of the overall system but an effort was also made to randomly distribute the cipher text in all the colour planes. The problem with this approach can be summarized as follows: • The distribution of cipher text in all the colour planes was not proper • The time complexity of the overall system increased due to increase in number of collisions. This paper has been inspired from the above mentioned literature. To improve the above hybrid techniques the following aspects were kept in mind: • To evenly distribute Cipher text in all the colour planes. • To increase the brute force Search time of overall system.
  • 3. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.4, July 2013 175 • To reduce the value of time complexity • To minimize the number of collisions during random pixel selection The next section gives the proposed technique to achieve the above mentioned objectives. 3. PROPOSED TECHNIQUE Before discussing the proposed algorithm we would like to give a brief description of the variables and functions (see Table 1) used in our proposal that will help the readers in better understanding of the proposal. Table 1. Terminology used in the paper. Entity Description C Original Image S Stego-Image P Plain Text D Encrypted secret data L(d) Length of encrypted data M * N Image dimensions Seed seed used to generate random numbers Random() Function to generate uniformly distributed random numbers Rc4_Encrypt() Encrypt data using DES or RC4 Rc4_Decrypt() Decrypt data PPN Pixel position number Key Key for cryptography kn Number of bits used for LSB substitution a, b, c Parameters to be set experimentally The main step of the proposed technique is to identify the pixels of the cover image where the cipher text bits are to be stored. This process is same for both the sender and receiver. For this purpose a Pixel Position Number (PPN) array is calculated in which each member indicates a unique pixel in the cover image. We denote this process of generating PPN by function Random() whose inputs are seed, length of cipher text and parameters a, b and c. The process of its generation is explained below: The first step is to calculate the number of LSB (kn) require for substitution depending upon the length of secret message L(d) and size of cover image(MxNx3). Where ceil() is the greatest integer function The next step is to identify the pixels of the steganographic cover (S) where the cipher text bits are to be embedded. For this purpose first of all random numbers are generated between 1 and max where max is calculated as
  • 4. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.4, July 2013 176 Where floor() is the smallest integer function Parameter b decides the number of round to complete selection of pixels over the red, green and blue plane of cover image. The setting of parameter b is discussed in section 5. From this array (B) of random numbers PPN is calculated by adaptively addition of random numbers as given below: Algorithm: Function Random () n=B(1); //n is a temporary variable PPN(1)=n; for i=2 to (L(d)/kn) if round >2 mp=1; else mp=0; end if n=(n+B(i)+c*mp*B(i)) %(MxNx3) if value of n already exist in PPN check for collision n=next value; end if PPN(i)=n; end for output: PPN In this method we accelerate the width of random interval after completion of two rounds of pixel selection over entire range of cover image. The value of parameter c decides the change in interval. The adjustment of this parameter is discussed in section 5. To overcome the problem of collisions, we compare the current value of PPN from all the previous value of PPN and if the value is found prior, it means collision is detected. In that case we discard the current value and choose next value of n. Otherwise we store the current value in PPN array. The rest of the process of the proposal is explained separately for sender and receiver. 3.1. Sender Side Procedure The plain text (P) data to be transferred is read as a set of ASCII characters at the sender side. This text is encrypted using function Rc4_Encrypt () and key. Encrypted text (D) is represented in bit-stream form and is denoted by d. Then PPN is generated by calling Random() function as discussed above. Corresponding to each value of PPN the location of pixel in image is identified by calculating the height (m), width (n), and plane (p) of pixel respectively. Then kn LSBs of corresponding pixel is replaced by the encrypted data bits. In this way the encryption process is completed as explained in algorithm: Algorithm: Embedding Process (sender side) Algorithm: Extracting Process(receiver side) Input: C, Key, seed, P Input: S, Key, seed, L(d) S=C; kn=ceil(a*L(d)/(M*N*3));
  • 5. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.4, July 2013 177 D=Rc4_Encrypt(Key,P); d=bit-stream(D); kn=ceil(a*L(d)/(M*N*3)); PPN=Random(b, c, L(d), seed); for i=1:L(d)/kn t1=PPN(i); p=ceil(t/(M*N)); t2=t1-(p-1)*M*N; m=ceil(t2/N); n=t2-(m-1)*M; S(m,n,p) <= d(i,i+kn); End for PPN=Random(b, c, L(d), seed); for i=1:L(d)/kn t1=PPN(i); p=ceil(t/(M*N)); t2=t1-(p-1)*M*N; m=ceil(t2/N); n=t2-(m-1)*M; d(i:i+kn) <= S(m, n, p); End for P=Rc4_Decrypt(key, D); Output: S Output: P 3.2. Receiver Side Procedure For extraction of plain text receiver must know the seed and length of the message L(d) so that to identify the embedded pixels in stego- image and Key to decrypt the message can be identified. First of all PPN is generated in the same way as explained above. The kn LSBs of these pixels are taken as data and then this data is decrypted using Rc4_Decrypt algorithm to obtain plain text (P). 4. SIMULATION SETUP 4.1. Performance metrics 4.1.1. Mean Square Error (MSE) It measures the statistical difference between the cover and stego-image. The distortion in the image can be measured using MSE which can be calculated using Equation 1. ……(1) Where: The intensity value of the pixel in the cover image. : The intensity value of the pixel in the stego image. M*N: Size of an Image. 4.1.2. Peak Signal to Noise Ratio (PSNR) It is the measure of quality of the image by comparing the cover image with the stego-image. High PSNR indicates good perceptual quality of stego-image. It is calculated using Equation 2. …….(2)
  • 6. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.4, July 2013 178 4.1.3. Histograms Histogram is a measure of the number of occurrence of pixels with respect to particular pixel value [13]. During embedding pixel value changes, hence number of pixels having a particular pixel value gets changed. These changes can be used to detect steganography. 4.1.4. Steganographic Noise It shows the pixels in the image on which data is embedded. Evenly distribution of noise all over the image indicates good quality of steganography technique. 4.1.5 Collisions During identification of pixel positions if a pixel position number is repeated more than once then it is referred to as collision. These collisions adversely affect time complexity of the process. 4.1.6 Time Complexity The total time taken by all the processing on receiver and sender side comprises of time complexity. 4.2 Setup parameters The MATLAB Version 7.13.0.564 (R2011b) is used to implement and simulate the proposed technique. MATLAB is used because of large number of advanced inbuilt functions and image processing toolbox. The various simulation parameters are given in Table 2. Table 1. Setup parameters. Cover image 256*256*3 (colour) Image type Bmp Secret text file size (kb) 0.5, 2 ,8,32 Simulation Tool MATLAB 7.13.0.564 Pseudo Random Number Generator ‘Uniform’ with seed=33559 Cryptography RC4 key= ‘ajaynain’ Processor Core-i3 @2.53 Ghz RAM 3GB 5. EXPERIMENTAL STUDY 5.1. Adjustment of parameters We have used three parameters a, b and c in the proposed method. To accurately measure the performance of the proposed technique it is important to optimize these parameters. For optimization purpose we analyzed the time complexity, collisions, distribution of steganographic data and complexity of hidden message.
  • 7. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.4, July 2013 179 • The value parameter ‘a’ is inversely linked to embedding capacity. If value of this parameter is low then embedding capacity and distortion is high and time complexity is low. To find the value of ‘a’ experiments were performed and the best results were obtained for value equal to 2. • The value of ‘b’ decides the number of rounds to allocate the random pixels for embedding the cipher text evenly throughout the image. If the value of ‘b’ is kept high then number of rounds would increase resulting in increased number of collisions and time complexity. On the other hand if value of ‘b’ is taken small then the complexity of hidden message is reduced because of adjacent bits of message comes more close on the cover image. Value of ‘b’ as 4 is considered as an optimum one. • The value of ‘c’ scatters the remaining bits after two rounds of pixel selection over the full range of image. The value of ‘c’ is set to 6 in case of our experiment since at this value scattering of cipher text was perfect. 5.2. Results 5.2.1. Perceptual Quality By inspection of Figure 1 we can say that proposed techniques does not introduce significance changes in the image quality. File size =.5kb Figure 1(a)Impact of Proposed Technique Figure 1(b) Impact of Previous Technique File size =2 kb
  • 8. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.4, July 2013 180 Figure 1(c) Impact of Proposed Technique Figure 1(d) Impact of Previous Technique File size =8 kb Figure 1(e) Impact of Proposed Technique Figure 1(f) Impact ofPrevious Technique File size =32 kb Figure 1(g) Impact of Proposed Technique Figure 1(h) Impact of Previous Technique Figure 1. Impact on Perceptual Quality 5.2.2. Histogram Representation The differences in histograms of cover image and the image after applying previous and proposed technique are shown in Figure 2. The Figure 2(a) shows the histogram of the actual image while the Figure 2(b) and Figure 2(c) shows the impact on histogram after applying previous and proposed technique on image. Figure 2(d) to Figure 2(k) show the differences in the number of pixel values between original image and the image obtained after applying the proposed mechanism. The following inference can be drawn from the Figure 2: • As the size of secret file increases the changes in histogram increases. • In proposed technique the changes in histogram are almost same in the red, green and blue colour planes while in the previous technique the cipher text is only distributed in Red plane only. Red Plane Green Plane Blue Plane
  • 9. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.4, July 2013 181 Figure 2(a). Histograms of original cover image Figure 2(b) Histograms of stego-image of previous technique Figure 2(c) Histograms of stego-image of proposed technique Figure 2(d) Difference in Histograms for previous technique with file size =0.5 kb Figure 2(e) Difference in Histograms for proposed technique with file size = 0.5 kb
  • 10. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.4, July 2013 182 Figure 2(f) Difference in Histograms for previous technique with file size =2 kb Figure 2(g) Difference in Histograms for proposed technique with file size=2 kb Figure 2(h) Difference in Histograms for previous technique with file size =8 kb Figure 2(i) Difference in Histograms for proposed technique with file size =8 kb Figure (j) Difference in Histograms for previous technique with file size=32kb
  • 11. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.4, July 2013 183 Figure 2(k) Difference in Histograms for proposed technique with file size =32 kb Figure 2. Comparison of Difference of Histograms 5.2.3. Impact on MSE and PSNR These two parameters give an insight to check the variation on image quality mathematically. By analyzing the two parameters from Figure 3 following inferences can be made: • As the file size increases the value of PSNR decreases and that of MSE increases. This is due to the fact that error increases by increasing the number of embedding pixels and PSNR is inversely proportional to MSE from equation (1) and equation (2). • By using the proposed adaptive technique the changes in MSE and PSNR are marginal due to the fact that the length of data to be embedded is same. Figure 3(a) Comparison of PSNR Figure 3(b) Comparison of MSE Figure 3. Comparison of MSE and PSNR 5.2.4. Impact on time complexity The time complexity of the proposed technique mainly depends upon the number of collision and the size of the data to be embedded. The following inferences can be drawn from the results (see Figure 4): • Time complexity of proposed technique is less than that of the other technique due to the reduction in the number of collisions. • As the file size increases the time complexity increases drastically.
  • 12. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.4, July 2013 184 Figure 4. Comparison of time complexity 5.2.5. Collisions The number of collision depends upon the size of cipher text to be embedded in image. From Figure 5, the following points can be inferred: • The proposed technique reduces the number of collision in comparison to the previous strategy as the matter of fact that range of random pixel selection is adaptive in our case. • The number of collision as expected to increase by increasing the file size. Figure 5. comparison of number of collisions
  • 13. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.4, July 2013 185 5.2.6. Distribution of Steganographic Noise Steganographic Noise shows the distribution of the cipher text over the red, green and blue colour planes. From Figure 6 the following inferences can be drawn: • The proposed technique distributes the cipher text evenly in all the planes. On the other hand the previous technique distributes high concentration in Red plane followed by Green and Blue plane. • As the size of cipher text increases the distribution of cipher text crosses Red plane in case of previous technique. Red Plane Green Plane Blue Plane Figure 6(a) Distribution of steganographic noise for previous technique with file size =.5 kb Figure 6(b) Distribution of steganographic noise for proposed technique with file size .5 kb Figure 6(c) Distribution of steganographic noise for previous technique with file size=2 kb
  • 14. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.4, July 2013 186 Figure 6(d) Distribution of steganographic noise for proposed technique with file size=2kb Figure 6(e) Distribution of steganographic noise for previous technique with file size=8 kb Figure 6(f) Distribution of steganographic noise for proposed technique with file size =8 kb Figure 6(g) Distribution of steganographic noise for previous technique with file size =32 kb Figure 6(h) Distribution of steganographic noise for proposed technique with file size= 32 kb Figure 6. Comparison of MSE and PSNR 5.2.7. Brute Force Search Time In the previous technique message can be extracted with two keys: seed and decryption key whereas in the proposed technique third parameter as length of secret data also a mandatory requirement to extract the plaint text due to the fact that randomly selection of pixels also depends on the length of data. Despite having seed for pseudo random number generation an adversary cannot identify the embedded pixels. This provides additional security to secret data by increasing the brute force search time.
  • 15. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.4, July 2013 187 6. CONCLUSIONS AND FUTURE SCOPE In this paper we propose an adaptive technique to provide enhanced security to plain text data by applying both cryptography and modified pseudorandom steganography. Following points can be inferred from the Table 3: • Proposed technique provides more robustness against attacks by in terms of brute force search time. Also there is a need of Length requirement of data for an adversary to decrypt the plain text successfully. • The number of collision in the proposed technique as compared to previous one is also very low implying the time complexity of the overall process to be low. • The proposed adaptive technique evenly distributes the cipher text in all the colour planes in comparison to the previous one in which the distribution was not even. • The value of MSE and PSNR of the proposed technique is nearly same in comparison to the previous one since the length of data to be embedded is nearly same. • This paper shows how an adaptive technique can enhance the performance of stenographic process. Table 3: Overall inferences of proposed scheme Parameters Previous Technique Proposed technique Brute Force Search Time Low High Time Complexity High Low Intensity of data distribution on colour planes Vary at all the planes Approximately same Collisions High Low MSE Almost same PSNR Almost same REFERENCES [1] "Steganography in Digital Media: Principles, Algorithms and Applications", Jessica Fridrich. [2] “Cryptography and Network Security principles and practices”, William Stallings, pearsons education, first Indian reprint 2003 [3] Kurak, C., and J. McHughes, "ACautionary Note On Image Downgrading," in IEEEComputer Security Applications Conference 1992, Proceedings, IEEE Press, 1992, pp.153-159. [4] Bender, W., D. Gruhl, and N. Morimoto, “Techniques for data hiding”, IBM Systems Journal, vol. 35, no. 34, 1996, pp. 131-336. [5] M¨oller, S., A. Pitzmann, and I. Stirand, “Computer Based Steganography How It Works and Why Therefore Any Restrictions on Cryptography Are Nonsense, At Best, in Information Hiding” First International Workshop, Proceedings, vol. 1174 of Lecture Notes in Computer Science, Springer, 1996, pp. 7-21. [6] Luby, M., and C. Racko, “How to Construct Pseudorandom Permutations from Pseudorandom Functions”, SIAM Journal on Computation, vol. 17, no. 2, 1988, pp. 373-386. [7] Naor, M., and O. Reingold, “On the Construction of Pseudorandom Permutations” Luby-Racko Revisited, Journal of Cryptology, vol. 12, no. 1, 1999, pp. 29-66 [8] J. Fridrich, M. Goljan, and R. Du, “Detecting LSB Steganography in Colour and Gray-Scale Images”, Magazine of IEEE Multimedia Special Issue on Security, pp. 22-28, October-November 2001 [9] Provos, N. “Defending Against Statistical Steganalysis”. Proc. 10th USENIX Security Symposium. Washington, DC, 2001 [10] J.J. Eggers, R. Bauml and B. Girod, “A communications approach to image steganography”, Proceedings of SPIE, vol.4675, pp.26-37, 2002.
  • 16. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.4, July 2013 188 [11] J. Fridrich,M. Goljan, “Practical Steganalysis of Digital Images – State of the Art”, Proc. SPIE, Photonics West, Vol. 4675, Electronic Imaging 2002, Security and Watermarking of Multimedia Contents, San Jose, California, pp. 1-13, January, 2002. [12] J. Fridrich, M. Goljan, and T. Holotyak, “New Blind Steganalysis and its Implications”, in Proc. SPIE Security, Steganography, and Watermarking of Multimedia Contents VIII, vol. 6072, pp. 607201, Jan. 2006 [13] K. Solanki, K. Sullivan, U. Madhow, B. S. Manjunath, and S. Chandrasekaran “Provably secure steganography: Achieving zero K-L Divergence using statistical restoration” , Published in proceedings of ICIP 2006, pp. 125-128, IEEE 2006. [14] Shailender Gupta, Ankur Goyal, Bharat Bhushan,“Information Hiding Using Least Significant Bit Steganography and Cryptography”,I.J.Modern Education and Computer Science, 2012, 6, 27-34 [15] Rengarajan Amirtharajan, Jiaohua Qin, John Bosco Balaguru Rayapan, “Random Image Steganography and Steganalysis: Present Status and Future DIarections”, Information Technology Journal 11(5): 566-576,2012 [16] Shailender Gupta, Bharat Bhushan, Surbhi Singhania and Jeetesh Gulani “A Hybrid approach for ensuring security in data communication”, Accepted for publication in CCSIT 2013 [17] Shailender Gupta, Bharat Bhushan, Surbhi Singhania, Ajay Nain “A Novel Crypt-Stego Technique for Information Security in Communication Networks” Accepted for publication in IJSP 2013 Authors Ajay Kumar Nain received his B. Tech degree from Department of Electronics and Communication Engineering at GJUS&T, Hisar, India in 2011. He is currently pursuing his M. Tech at YMCA University of Science and Technology, Faridabad, India. His current interests focus on image processing and Network security. Shailender Gupta Assistant Professor (Electronics Engg.) YMCA University of Science and Technology, Faridabad E-mail: shailender81@gmail.com Mr. Shailender Gupta is B. Tech (Electronics) and M. Tech and Ph. D (Computer Engg.) from YMCA University of Science and Technology. His academic interests include network security, automata theory and fuzzy logic. Shailender Gupta Assistant Professor (Electronics Engg.) YMCA University of Science and Technology, Faridabad E-mail: shailender81@gmail.com Mr. Bharat Bhushan has B. Tech (Electronics) from PEC and M.Tech (Electronics) from YMCA University of Science and Technology. His academic interests include Mobile Ad-hoc Network, Network Security. Bharat Bhushan Assistant Professor (Electronics Engg.) YMCA University of Science and Technology, Faridabad E-mail: bhrts@yahoomail.com Ms. Rashmi Chawla has B. Tech (Electronics) and M.Tech (Electronics) from RGPVV, Bhopal. Her academic interests include Image Processing, Network Security and VLSI Designing. Rashmi Chawla Assistant Professor (Electronics Engg.) YMCA University of Science and Technology, Faridabad E-mail: rashmi.chawla@rediffmail.com