The document proposes using a combination of steganography and quantum cryptography to securely transmit encrypted data. It begins by providing background on steganography, describing how it hides confidential information within cover files like images, and how it differs from encryption and digital watermarking. It then discusses related work improving steganography techniques. The proposed approach uses an advanced steganography algorithm (F5) to hide encrypted data within an image, making the secret information nearly impossible to detect. It also describes using quantum cryptography to securely generate and distribute the encryption key, providing virtually unbreakable security based on principles of quantum mechanics. The combination of steganography and quantum key distribution is argued to provide perfect security for transmitted data.
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUEIJNSA Journal
Embedding a message in media files, also known as steganography, is a common approach to hide secret
information. It has been exploited by some criminals to confidentially exchange messages. As a countermeasure,
tools have been developed in order to detect hidden information form digital media such as text,
image, audio or video files. However the efficiency and performance of previous approaches still have
room for improvement. In this research, we focus on algorithm design for better efficiency of hidden message detection from PNG files. We employ three classic AI approaches including neural network, fuzzy logic, and genetic algorithm and evaluate their efficiency and performance in controlled experiments. Finally we introduce our message detection system for PNG files based on LSB approach and present its
usability in different case scenarios
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUEIJNSA Journal
Embedding a message in media files, also known as steganography, is a common approach to hide secret
information. It has been exploited by some criminals to confidentially exchange messages. As a countermeasure, tools have been developed in order to detect hidden information form digital media such as text, image, audio or video files. However the efficiency and performance of previous approaches still have room for improvement. In this research, we focus on algorithm design for better efficiency of hidden message detection from PNG files. We employ three classic AI approaches including neural network, fuzzy logic, and genetic algorithm and evaluate their efficiency and performance in controlled experiments. Finally we introduce our message detection system for PNG files based on LSB approach and present its usability in different case scenarios.
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...ijtsrd
Increase in the number of attack recorded during electronic exchange of information between the source and intended destination has indeed called for a more robust method for securing data transfer. Cryptography and steganography are well known and widely used techniques that manipulate information in order to cipher or hide their existence. Many different carrier file format scan be used but digital images are the most popular because of their frequency on the internet. The digital images are the most popular because of their frequency on the Web among all different carrier file formats. Image steganography, achieves the secrecy by embedding data into cover image and generating a stego-image. There are many types of steganography techniques each have their advantages and disadvantages. This paper discussed a technique used on the advanced LSB (least significant bit) and RSA algorithm. By matching data to an image, there is less chance of an attacker being able to use steganalysis to recover data. Before hiding the data in an image the application first encrypts it Priya Jain | Somesh Kumar | Raj Kumar Goel"A Survey on Enhancement of Text Security Using Steganography and Cryptographic Techniques" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-5 , August 2018, URL: http://www.ijtsrd.com/papers/ijtsrd15800.pdf http://www.ijtsrd.com/computer-science/computer-security/15800/a-survey-on-enhancement-of-text-security-using--steganography-and-cryptographic-techniques/priya-jain
Steganography using Interpolation and LSB with Cryptography on Video Images -...Editor IJCATR
Steg
nography is the most common term used in
the IT industry, which specifically means, "covered writing" and is derive
d
from the Greek language. Steg
nography is defined as the art and science of invisible communication i.e. it hides the existence of the
communication between the sender and the rece
iver. In distinction to Cryptography, where the opponent is permitted to detect,
interrupt and alter messages without being able to breach definite security grounds guaranteed by the cryptosyst
em, the prime
objective of Steg
nography is to conceal messages
inside other risk
-
free messages in a manner that does not agree to any enemy to even
sense that there is any second message present. Nowadays,
it is an emerging area which is used for secured data transmission over any
public medium such as internet. In th
is research a novel approach of image
steg
nography
based on LSB (Least Significant Bit)
insertion and cryptography method for the lossless jpeg images has been projected. This paper is comprising an application wh
ich
ranks images in a users library on the
basis of their appropriateness as cover objects for some facts. Here, the data is matched to an
image, so there is a less possibility of an invader being able to employ steganalysis to recuperate the data. Furthermore, th
e application
first encrypts the da
ta by means of cryptography and message bits that are to be hidden are embedded into the image using Least
Significant Bits insertion technique. Moreover, interpolation is used to increase the density
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUEIJNSA Journal
Embedding a message in media files, also known as steganography, is a common approach to hide secret
information. It has been exploited by some criminals to confidentially exchange messages. As a countermeasure,
tools have been developed in order to detect hidden information form digital media such as text,
image, audio or video files. However the efficiency and performance of previous approaches still have
room for improvement. In this research, we focus on algorithm design for better efficiency of hidden message detection from PNG files. We employ three classic AI approaches including neural network, fuzzy logic, and genetic algorithm and evaluate their efficiency and performance in controlled experiments. Finally we introduce our message detection system for PNG files based on LSB approach and present its
usability in different case scenarios
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUEIJNSA Journal
Embedding a message in media files, also known as steganography, is a common approach to hide secret
information. It has been exploited by some criminals to confidentially exchange messages. As a countermeasure, tools have been developed in order to detect hidden information form digital media such as text, image, audio or video files. However the efficiency and performance of previous approaches still have room for improvement. In this research, we focus on algorithm design for better efficiency of hidden message detection from PNG files. We employ three classic AI approaches including neural network, fuzzy logic, and genetic algorithm and evaluate their efficiency and performance in controlled experiments. Finally we introduce our message detection system for PNG files based on LSB approach and present its usability in different case scenarios.
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...ijtsrd
Increase in the number of attack recorded during electronic exchange of information between the source and intended destination has indeed called for a more robust method for securing data transfer. Cryptography and steganography are well known and widely used techniques that manipulate information in order to cipher or hide their existence. Many different carrier file format scan be used but digital images are the most popular because of their frequency on the internet. The digital images are the most popular because of their frequency on the Web among all different carrier file formats. Image steganography, achieves the secrecy by embedding data into cover image and generating a stego-image. There are many types of steganography techniques each have their advantages and disadvantages. This paper discussed a technique used on the advanced LSB (least significant bit) and RSA algorithm. By matching data to an image, there is less chance of an attacker being able to use steganalysis to recover data. Before hiding the data in an image the application first encrypts it Priya Jain | Somesh Kumar | Raj Kumar Goel"A Survey on Enhancement of Text Security Using Steganography and Cryptographic Techniques" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-5 , August 2018, URL: http://www.ijtsrd.com/papers/ijtsrd15800.pdf http://www.ijtsrd.com/computer-science/computer-security/15800/a-survey-on-enhancement-of-text-security-using--steganography-and-cryptographic-techniques/priya-jain
Steganography using Interpolation and LSB with Cryptography on Video Images -...Editor IJCATR
Steg
nography is the most common term used in
the IT industry, which specifically means, "covered writing" and is derive
d
from the Greek language. Steg
nography is defined as the art and science of invisible communication i.e. it hides the existence of the
communication between the sender and the rece
iver. In distinction to Cryptography, where the opponent is permitted to detect,
interrupt and alter messages without being able to breach definite security grounds guaranteed by the cryptosyst
em, the prime
objective of Steg
nography is to conceal messages
inside other risk
-
free messages in a manner that does not agree to any enemy to even
sense that there is any second message present. Nowadays,
it is an emerging area which is used for secured data transmission over any
public medium such as internet. In th
is research a novel approach of image
steg
nography
based on LSB (Least Significant Bit)
insertion and cryptography method for the lossless jpeg images has been projected. This paper is comprising an application wh
ich
ranks images in a users library on the
basis of their appropriateness as cover objects for some facts. Here, the data is matched to an
image, so there is a less possibility of an invader being able to employ steganalysis to recuperate the data. Furthermore, th
e application
first encrypts the da
ta by means of cryptography and message bits that are to be hidden are embedded into the image using Least
Significant Bits insertion technique. Moreover, interpolation is used to increase the density
One of the reasons that intruders can be successful is that most of the information they acquire from a system is in a form that they can read and comprehend. Intruders may reveal the information to others, modify it to misrepresent an individual or organization, or use it to launch an attack. One solution to this problem is, through the use of Steganography. Steganography is a technique of hiding information in digital media. In contrast to cryptography, it is not to keep others from knowing the hidden information but it is to keep others from thinking that the information even exists. In this review paper we will understand what Steganography, Cryptography is and what are the advantages of using them? In last we will discuss our goal of this paper that what types of techniques worked on video Steganography?
Review paper on Data Security using Cryptography and Steganographyvivatechijri
One of the major problems faced by this digital world is Data Security. Data Security plays an important role in the field of information technology. As there are large advancements in internet technology, there has been huge text as well as multimedia data transfer over the internet. The communication channel available for data transfer from the transmitter to receiver is highly insecure. As the security of electronic data is a major issue and to achieve high security and confidentiality, the public and the private sectors use different kinds of techniques and methods to protect the data from unauthorized users. Cryptography and Steganography are the most popular and widely used technologies for security. Cryptography is the art of hiding information by encryption and steganography is a technique to hides data in the cover medium. Cryptography hides the readable and meaningful contents of the data. And the existence of the data is hidden by the Steganography technique.
For increase network security of messages sent on
internet the steganography is mostly preferred. To transmit data
secretly steganography is used in open system environment. In
this paper discussed the reviews of image steganography and the
general framework of image steganography using different
method. Steganography is nothing but art of hide information
behind the other information without leaving remarkable track
on original message.
A Robust Technique to Encrypt and Decrypt Confidential Data within Imageinventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...IOSR Journals
Abstract: Steganography is the art of hiding the fact that communication is taking place, by hiding information
in other information. There are many application of Steganography with different carrier file format. Here we
perform Steganography Technique with sending OTP on receiver mobile, which is one of the best secured
technique in current scenario. This technique is hiding file information into image with OTP password that is
only known by receiver. And can decrypt using that OTP only this is pure Steganography. Pure Steganography
means that there is none prior information shared by two communication parties. We are not sharing OTP
information by two communication parties. So this is more secure than other technique.
Key Words : Steganography, OTP, ICT, Password, IP, UDP, SIHS, LSB.
Steganography is a technology used since years for the communication of messages secretly. These secret messages are put inside honest carriers. Carriers can be digital images, audio files, video files and so on. The limitation in sending concealed longer messages has been overcoming by the inclusion of video files as carriers. Popular internet services such as Skype, BitTorrent, Google Suggest, and
WLANs are targets of information hiding techniques. Nowadays, plotters are not only using the carriers but also the protocols for communication that regulate the path of the carrier through the Internet. This technique is named Network Steganography.
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...IJNSA Journal
In today’s day and age when everything is done with the aid of computing technology, the need for confidential communication has drastically increased. Not only the sensitive data such as top intelligent secrets of our nation but personal information of common people needs to be secure. Several combinations of cryptography and steganography techniques in different ways are used by researchers over the past to protect the data being transmitted. Cryptography uses mathematical algorithms to convert the data into an incomprehensible form and Steganography, on the other hand hides the data in a carrier such as image, data, audio or video. Cryptography provides necessary mechanisms for providing accountability, accuracy and confidentiality in public communication mediums such as the Internet and steganography is used in other fields such as copyright, preventing e-document forging etc. We are of the opinion that this security mechanism can further be increased by incorporating the use of Huffman coding in order to reduce the data length. This paper is an effort in the direction to hide, secure and compress the data. It explains the executed procedure by applying various encryption techniques one by one and our aim is to get the best security out of the existing ones. The proposed technique is implemented in MATLAB2016a and the results shown in this paper that our technique is better approach then the conventional techniques.
Hungarian-Puzzled Text with Dynamic Quadratic Embedding SteganographyIJECEIAES
Least-Significant-Bit (LSB) is one of the popular and frequently used steganography techniques to hide a secret message in a digital medium. Its popularity is due to its simplicity in implementation and ease of use. However, such simplicity comes with vulnerabilities. An embedded secret message using the traditional LSB insertion is easily decodable when the stego image is suspected to be hiding a secret message. In this paper, we propose a novel secure and high quality LSB embedding technique. The security of the embedded payload is employed through introducing a novel quadratic embedding sequence. The embedding technique is also text dependent and has non-bounded inputs, making the possibilities of decoding infinite. Due to the exponential growth of and quadratic embedding, a novel cyclic technique is also introduced for the sequence that goes beyond the limits of the cover medium. The proposed method also aims to reduce the noise arising from embedding the secret message by reducing bits changed. This is done by partitioning the cover medium and the secret message into N partitions and artificially creating an assignment problem based on bit change criteria. The assignment problem will be solved using the Hungarian algorithm that will puzzle the secret message partition for an overall least bit change.
LSB Based Image Steganography for Information Security Systemijtsrd
Information hiding in a cover file is one of the most modernized and effective ways for transferring secret message from sender to receiver over the communication channel. There are many steganographic techniques for hiding secret message in image, text, audio, video and so on. Image Steganography is also one of the common methods used for hiding the information in the cover image. In this research work, the secret message is hidden in a cover image file using image steganography. LSB is very efficient algorithm used to embed the information in a cover file. The LSB based image steganography with various file sizes is analyzed and illustrated their results. Bitmap .bmp image is used as a cover image file to implement the proposed system. The detail Least Significant Bit LSB based image steganography is introduced. In this paper, the new embedding algorithm and extracting algorithm are presented. While embedding the secret message in a cover image file, the starting embedded pixel is chosen according to public shared key between sender and receiver. The original cover image and embedded image with secret message are analyzed with PSNR values and SNR values to achieve security. The resulting embedded image shows the acceptable PSNR and SNR values while comparing with the original cover image. The proposed system can help the information exchanging system over communication media. Aung Myint Aye "LSB Based Image Steganography for Information Security System" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-1 , December 2018, URL: http://www.ijtsrd.com/papers/ijtsrd18995.pdf
http://www.ijtsrd.com/computer-science/computer-security/18995/lsb-based-image-steganography-for-information-security-system/aung-myint-aye
A Study of Various Steganographic Techniques Used for Information Hidingijcses
The art of information hiding has received much attention in the recent years as security of information has
become a big concern in this internet era. As sharing of sensitive information via a common communication
channel has become inevitable, Steganography – the art and science of hiding information has gained
much attention. We are also surrounded by a world of secret communication, where people of all types are
transmitting information as innocent as an encrypted credit card number to an online-store and as
insidious as a terrorist plot to hijackers. Steganography derives from the Greek word steganos, meaning
covered or secret, and graphy (writing or drawing) [1]. Steganography is a technology where modern data
compression, information theory, spread spectrum, and cryptography technologies are brought together to
satisfy the need for privacy on the Internet. This paper is an attempt to analyse the various techniques used
in steganography and to identify areas in which this technique can be applied, so that the human race can
be benefited at large.
Secure Data Hiding System by using AES Algorithm and Indicator Based LSB Methodijtsrd
Security of data is one of the most challenging problems in todays technological world. In order to secure the transmission of secret data over the public network Internet , numerous data security and hiding algorithms have been developed in the last decade. Steganography combined with cryptography can be one of the best choices for solving this problem. In this paper, the proposed framework is the dual layer of security, in which the first layer is to encrypt the secret text message using advanced encryption standard AES algorithm and in the second layer to embed this message using the indicator based least significant bit LSB method which is used to hide the encrypted text message into the cover image. It differs from the LSB algorithm in that it does not embed the bytes of the cover data sequentially but it embeds into one bit or two bits at once. Actually, it depends on indicators to determine where and how many bits to embed at a time. The Mean Square Error MSE and Peak Signal to Noise Ratio PSNR measure the imperceptibility of the system. Experimental results show that the stego image is usually indistinguishable from the cover image. Myo Ma Ma | Zar Zar Hnin | Yin Min Htwe "Secure Data Hiding System by using AES Algorithm and Indicator-Based LSB Method" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26500.pdfPaper URL: https://www.ijtsrd.com/computer-science/computer-security/26500/secure-data-hiding-system-by-using-aes-algorithm-and-indicator-based-lsb-method/myo-ma-ma
A brief over overview of steganographical security techniques and how it has been applied, is applied and will continue to be applied in maintaining confidentiality between two communication parties
One of the reasons that intruders can be successful is that most of the information they acquire from a system is in a form that they can read and comprehend. Intruders may reveal the information to others, modify it to misrepresent an individual or organization, or use it to launch an attack. One solution to this problem is, through the use of Steganography. Steganography is a technique of hiding information in digital media. In contrast to cryptography, it is not to keep others from knowing the hidden information but it is to keep others from thinking that the information even exists. In this review paper we will understand what Steganography, Cryptography is and what are the advantages of using them? In last we will discuss our goal of this paper that what types of techniques worked on video Steganography?
Review paper on Data Security using Cryptography and Steganographyvivatechijri
One of the major problems faced by this digital world is Data Security. Data Security plays an important role in the field of information technology. As there are large advancements in internet technology, there has been huge text as well as multimedia data transfer over the internet. The communication channel available for data transfer from the transmitter to receiver is highly insecure. As the security of electronic data is a major issue and to achieve high security and confidentiality, the public and the private sectors use different kinds of techniques and methods to protect the data from unauthorized users. Cryptography and Steganography are the most popular and widely used technologies for security. Cryptography is the art of hiding information by encryption and steganography is a technique to hides data in the cover medium. Cryptography hides the readable and meaningful contents of the data. And the existence of the data is hidden by the Steganography technique.
For increase network security of messages sent on
internet the steganography is mostly preferred. To transmit data
secretly steganography is used in open system environment. In
this paper discussed the reviews of image steganography and the
general framework of image steganography using different
method. Steganography is nothing but art of hide information
behind the other information without leaving remarkable track
on original message.
A Robust Technique to Encrypt and Decrypt Confidential Data within Imageinventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...IOSR Journals
Abstract: Steganography is the art of hiding the fact that communication is taking place, by hiding information
in other information. There are many application of Steganography with different carrier file format. Here we
perform Steganography Technique with sending OTP on receiver mobile, which is one of the best secured
technique in current scenario. This technique is hiding file information into image with OTP password that is
only known by receiver. And can decrypt using that OTP only this is pure Steganography. Pure Steganography
means that there is none prior information shared by two communication parties. We are not sharing OTP
information by two communication parties. So this is more secure than other technique.
Key Words : Steganography, OTP, ICT, Password, IP, UDP, SIHS, LSB.
Steganography is a technology used since years for the communication of messages secretly. These secret messages are put inside honest carriers. Carriers can be digital images, audio files, video files and so on. The limitation in sending concealed longer messages has been overcoming by the inclusion of video files as carriers. Popular internet services such as Skype, BitTorrent, Google Suggest, and
WLANs are targets of information hiding techniques. Nowadays, plotters are not only using the carriers but also the protocols for communication that regulate the path of the carrier through the Internet. This technique is named Network Steganography.
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...IJNSA Journal
In today’s day and age when everything is done with the aid of computing technology, the need for confidential communication has drastically increased. Not only the sensitive data such as top intelligent secrets of our nation but personal information of common people needs to be secure. Several combinations of cryptography and steganography techniques in different ways are used by researchers over the past to protect the data being transmitted. Cryptography uses mathematical algorithms to convert the data into an incomprehensible form and Steganography, on the other hand hides the data in a carrier such as image, data, audio or video. Cryptography provides necessary mechanisms for providing accountability, accuracy and confidentiality in public communication mediums such as the Internet and steganography is used in other fields such as copyright, preventing e-document forging etc. We are of the opinion that this security mechanism can further be increased by incorporating the use of Huffman coding in order to reduce the data length. This paper is an effort in the direction to hide, secure and compress the data. It explains the executed procedure by applying various encryption techniques one by one and our aim is to get the best security out of the existing ones. The proposed technique is implemented in MATLAB2016a and the results shown in this paper that our technique is better approach then the conventional techniques.
Hungarian-Puzzled Text with Dynamic Quadratic Embedding SteganographyIJECEIAES
Least-Significant-Bit (LSB) is one of the popular and frequently used steganography techniques to hide a secret message in a digital medium. Its popularity is due to its simplicity in implementation and ease of use. However, such simplicity comes with vulnerabilities. An embedded secret message using the traditional LSB insertion is easily decodable when the stego image is suspected to be hiding a secret message. In this paper, we propose a novel secure and high quality LSB embedding technique. The security of the embedded payload is employed through introducing a novel quadratic embedding sequence. The embedding technique is also text dependent and has non-bounded inputs, making the possibilities of decoding infinite. Due to the exponential growth of and quadratic embedding, a novel cyclic technique is also introduced for the sequence that goes beyond the limits of the cover medium. The proposed method also aims to reduce the noise arising from embedding the secret message by reducing bits changed. This is done by partitioning the cover medium and the secret message into N partitions and artificially creating an assignment problem based on bit change criteria. The assignment problem will be solved using the Hungarian algorithm that will puzzle the secret message partition for an overall least bit change.
LSB Based Image Steganography for Information Security Systemijtsrd
Information hiding in a cover file is one of the most modernized and effective ways for transferring secret message from sender to receiver over the communication channel. There are many steganographic techniques for hiding secret message in image, text, audio, video and so on. Image Steganography is also one of the common methods used for hiding the information in the cover image. In this research work, the secret message is hidden in a cover image file using image steganography. LSB is very efficient algorithm used to embed the information in a cover file. The LSB based image steganography with various file sizes is analyzed and illustrated their results. Bitmap .bmp image is used as a cover image file to implement the proposed system. The detail Least Significant Bit LSB based image steganography is introduced. In this paper, the new embedding algorithm and extracting algorithm are presented. While embedding the secret message in a cover image file, the starting embedded pixel is chosen according to public shared key between sender and receiver. The original cover image and embedded image with secret message are analyzed with PSNR values and SNR values to achieve security. The resulting embedded image shows the acceptable PSNR and SNR values while comparing with the original cover image. The proposed system can help the information exchanging system over communication media. Aung Myint Aye "LSB Based Image Steganography for Information Security System" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-1 , December 2018, URL: http://www.ijtsrd.com/papers/ijtsrd18995.pdf
http://www.ijtsrd.com/computer-science/computer-security/18995/lsb-based-image-steganography-for-information-security-system/aung-myint-aye
A Study of Various Steganographic Techniques Used for Information Hidingijcses
The art of information hiding has received much attention in the recent years as security of information has
become a big concern in this internet era. As sharing of sensitive information via a common communication
channel has become inevitable, Steganography – the art and science of hiding information has gained
much attention. We are also surrounded by a world of secret communication, where people of all types are
transmitting information as innocent as an encrypted credit card number to an online-store and as
insidious as a terrorist plot to hijackers. Steganography derives from the Greek word steganos, meaning
covered or secret, and graphy (writing or drawing) [1]. Steganography is a technology where modern data
compression, information theory, spread spectrum, and cryptography technologies are brought together to
satisfy the need for privacy on the Internet. This paper is an attempt to analyse the various techniques used
in steganography and to identify areas in which this technique can be applied, so that the human race can
be benefited at large.
Secure Data Hiding System by using AES Algorithm and Indicator Based LSB Methodijtsrd
Security of data is one of the most challenging problems in todays technological world. In order to secure the transmission of secret data over the public network Internet , numerous data security and hiding algorithms have been developed in the last decade. Steganography combined with cryptography can be one of the best choices for solving this problem. In this paper, the proposed framework is the dual layer of security, in which the first layer is to encrypt the secret text message using advanced encryption standard AES algorithm and in the second layer to embed this message using the indicator based least significant bit LSB method which is used to hide the encrypted text message into the cover image. It differs from the LSB algorithm in that it does not embed the bytes of the cover data sequentially but it embeds into one bit or two bits at once. Actually, it depends on indicators to determine where and how many bits to embed at a time. The Mean Square Error MSE and Peak Signal to Noise Ratio PSNR measure the imperceptibility of the system. Experimental results show that the stego image is usually indistinguishable from the cover image. Myo Ma Ma | Zar Zar Hnin | Yin Min Htwe "Secure Data Hiding System by using AES Algorithm and Indicator-Based LSB Method" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26500.pdfPaper URL: https://www.ijtsrd.com/computer-science/computer-security/26500/secure-data-hiding-system-by-using-aes-algorithm-and-indicator-based-lsb-method/myo-ma-ma
A brief over overview of steganographical security techniques and how it has been applied, is applied and will continue to be applied in maintaining confidentiality between two communication parties
Steganography using Interpolation and LSB with Cryptography on Video Images-A...Editor IJCATR
Stegnography is the most common term used in the IT industry, which specifically means, "covered writing" and is derived
from the Greek language. Stegnography is defined as the art and science of invisible communication i.e. it hides the existence of the
communication between the sender and the receiver. In distinction to Cryptography, where the opponent is permitted to detect,
interrupt and alter messages without being able to breach definite security grounds guaranteed by the cryptosystem, the prime
objective of Stegnography is to conceal messages inside other risk-free messages in a manner that does not agree to any enemy to even
sense that there is any second message present. Nowadays, it is an emerging area which is used for secured data transmission over any
public medium such as internet. In this research a novel approach of image stegnography based on LSB (Least Significant Bit)
insertion and cryptography method for the lossless jpeg images has been projected. This paper is comprising an application which
ranks images in a users library on the basis of their appropriateness as cover objects for some facts. Here, the data is matched to an
image, so there is a less possibility of an invader being able to employ steganalysis to recuperate the data. Furthermore, the application
first encrypts the data by means of cryptography and message bits that are to be hidden are embedded into the image using Least
Significant Bits insertion technique. Moreover, interpolation is used to increase the density
Data Security Through Crypto-Stegano Systemsrinzindorjej
Unauthorized access and hacking are major issues for internet users, and numerous articles have been published on various approaches to solving this issue. This study proposes a novel method for encoding a hidden message within the text by combining text steganography and substitution cryptography. While steganography and cryptography can be used to protect data, neither is sufficient to provide better security as they can be broken by steganalysis and cryptoanalysis. Therefore, the terms "cryptography-stegano" should be combined for improved security. In this method, data is first encrypted using a substitution cryptography technique to produce the cypher text, which is then encrypted using text steganography to produce a more secure cypher text sent to the recipient. Contrary to popular belief, using image steganography and cryptographic methods is unnecessary for effective data encryption. The study shows that combining text steganography with cryptographic techniques is an excellent data security method. Additionally, other combinations, such as audio and video steganography, should also be considered for better security
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...ijiert bestjournal
Steganography is the art of covered or hidden text message. The purpose of steganography is covert com munication- to hide the existence of a secret message from a th ird party. This paper is intnded as a high-level te chnical introduction to steganography for those unfamiliar with the field. It is directed at forensic computer examiners who need a practical understanding of steganography wit hout study into the mathematical,although referenc es are provided to many of the ongoing research for the pe rson who needs or wants additional detail covered b y audio- video file. Although in this paper gives a historic al context for steganography,the significance is o n digital applications use anti Forensics technique,focusing on hiding information in online audio and video fi les. Examples for tools of software that employ steganography to hide data inside of audio-video file as well as sof tware to detect such hidden files will also be presented. Suitable algorithm such as LSB is used for image steganograp hy suitable parameter of security and authentication is like PS NR,histogram are obtained at transmitter\sende and receiver side which are exactly identical,hence data security ca n be increased. This paper focus on the idea of com puter anti forensics technique and its use of video steganogra phy in both investigative and security manner.
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMijcisjournal
Steganography is the art of hiding confidential information (secret) within any media file (cover media) to
produce an amalgamated secret-cover media called stego media, so that the secret cannot be recognized or
recovered by unauthorized recipients. Many steganalysis techniques have been developed enabling
recognition of the existence of secrets within stego media and recovering it. Therefore, it is necessary to
develop more secure steganography algorithms. This paper presents a detailed description of a new secure
Block Permutation Image Steganography (BPIS) algorithm. The algorithm converts the secret message to a
binary sequence, divides the binary sequence into blocks, permutes the block using a key-based randomly
generated permutation, concatenates the permuted blocks forming a permuted binary sequence, and then
utilizes the Least-Significant-Bit (LSB) approach to embed the permuted binary sequence into BMP image
file. The algorithm performance is investigated through performing a number of experiments, and for each
experiment the PSNR (Peak Signal-to-Noise Ratio) between the stego and cover images is calculated. The
results show that the algorithm provides high image quality, and invisibility, and most importantly higher
security as secret cannot be recovered without knowing the permutation, which has a complexity of O(N!),
where N is the length of the permutation.
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMijcisjournal
Steganography is the art of hiding confidential information (secret) within any media file (cover media) to
produce an amalgamated secret-cover media called stego media, so that the secret cannot be recognized or
recovered by unauthorized recipients. Many steganalysis techniques have been developed enabling
recognition of the existence of secrets within stego media and recovering it. Therefore, it is necessary to
develop more secure steganography algorithms. This paper presents a detailed description of a new secure
Block Permutation Image Steganography (BPIS) algorithm. The algorithm converts the secret message to a
binary sequence, divides the binary sequence into blocks, permutes the block using a key-based randomly
generated permutation, concatenates the permuted blocks forming a permuted binary sequence, and then
utilizes the Least-Significant-Bit (LSB) approach to embed the permuted binary sequence into BMP image
file. The algorithm performance is investigated through performing a number of experiments, and for each
experiment the PSNR (Peak Signal-to-Noise Ratio) between the stego and cover images is calculated. The
results show that the algorithm provides high image quality, and invisibility, and most importantly higher
security as secret cannot be recovered without knowing the permutation, which has a complexity of O(N!),
where N is the length of the permutation.
Steganography and Its Applications in SecurityIJMER
ABSTRACT: Steganography is the dark cousin of cryptography, the use of codes. While cryptography provides privacy,
steganography is intended to provide secrecy. Steganography is a method of covertly communicating. Steganography is a
process that involves hiding a message in an appropriate carrier for example an image or an audio file. The carrier can then
be sent to a receiver without anyone else knowing that it contains a hidden message. This is a process, which can be used for
example by civil rights organizations in repressive states to communicate their message to the outside world without their
own government being aware of it. In this article we have tried to elucidate the different approaches towards implementation
of Steganography using ‘multimedia’ file (text, static image, audio and video). Steganalysis is a newly emerging branch of
data processing that seeks the identification of steganographic covers, and if possible message extraction. It is similar to
cryptanalysis in cryptography. The technique is ancient emerging monster that have gained immutable notice as it have
newly penetrated the world of digital communication security. Objective is not only to prevent the message being read but
also to hide its existence.
Keywords: Carrier, Privacy, Secrecy, Steganalysis, Steganography
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHYcsandit
Digital communication witnesses a noticeable and continuous development in many
applications in the Internet. Hence, a secure communication sessions must be provided. The
security of data transmitted across a global network has turned into a key factor on the network
performance measures. Cryptography and steganography are two important techniques that are
used to provide network security. In this paper, we conduct a comparative study of
steganography and cryptography. We survey a number of methods combining cryptography and
steganography techniques in one system. Moreover, we present a classification of these
methods, and compare them in terms of the algorithm used for encryption, the steganography
technique and the file type used for covering the information.
Secure Message Transmission using Image Steganography on Desktop Basedijtsrd
The rapid increase in our technology has made easier for us to send and receive data over internet at most affordable way. There are many transmission medias like emails, facebook, twitter, etc” ¦ which led way for the intruders to modify and misuse the information what we share over the internet. So in order to overcome these kinds of issues many methods has been implemented such as Cryptography, Steganography and Digital watermarking to safeguard our data transmissions in a most prominent way. In this paper, hiding text inside a digital image using Stegano tool for secure data transmissions has been described. Sidharth Sai S | N. Priya "Secure Message Transmission using Image Steganography on Desktop Based" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-1 , December 2020, URL: https://www.ijtsrd.com/papers/ijtsrd38067.pdf Paper URL : https://www.ijtsrd.com/computer-science/computer-security/38067/secure-message-transmission-using-image-steganography-on-desktop-based/sidharth-sai-s
A Steganography LSB technique for hiding Image within Image Using blowfish En...IJRES Journal
Steganography refers to information or a file that has been hidden inside a digital image, video
or audio file. There are different carrier file formats can be used such as Text Steganography, Image
Steganography, Audio/Video Steganography, but Image Steganography are the most popular because of their
frequency on the Internet. It is the first common methods used for hiding the information in the cover image.
The Least Significant Bit (LSB) steganography is one such technique in which least significant bit of the image
is replaced with data bit. steganographic algorithm for 8bit (gray scale) or 24 bit (colour image) is presented in
this paper. Sometime steganography will not cover the total security of secret massage. So an additional security
need to the secret massage. For this purpose blowfish encryption Algorithm is used in the proposed
Steganographic system This work is concerned with implementing Steganography for images, with an
improvement security and image quality.
The experimental result shows that the stego-image is visually indistinguishable from the original cover-image
It comes under the assumption that if the feature is visible, the point of attack is evident, thus the goal here is
always to cover up the very existence of the embedded data. and that the algorithm has a high capacity and a
good invisibility.
High Capacity and Security Steganography Using Discrete Wavelet TransformCSCJournals
The secure data transmission over internet is achieved using Steganography. In this paper High Capacity and Security Steganography using Discrete wavelet transform (HCSSD) is proposed. The wavelet coefficients of both the cover and payload are fused into single image using embedding strength parameters alpha and beta. The cover and payload are preprocessed to reduce the pixel range to ensure the payload is recovered accurately at the destination. It is observed that the capacity and security is increased with acceptable PSNR in the proposed algorithm compared to the existing algorithms
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Similar to Data security using stegnography and quantum cryptography (20)
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Data security using stegnography and quantum cryptography
1. Network and Complex Systems www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol 2, No.2, 2012
Data Security Using Stegnography and Quantum
Cryptography
Mohit Kumar, Abhishek Gupta, Kinjal Shah, Atul Saurabh, Pravesh Saxena, Vikas Kumar Tiwari
Jaypee University of Information Technology, P.O Dumehar Bani, Waknaghat -173234 (H.P), India
Abstract
Stegnography is the technique of hiding confidential information within any media. In recent years various
stegnography methods have been proposed to make data more secure. At the same time different
steganalysis methods have also evolved. The number of attacks used by the steganalyst has only multiplied
over the years. Various tools for detecting hidden informations are easily available over the internet, so
securing data from steganalyst is still considered a major challenge. While various work have been done to
improve the existing algorithms and also new algorithms have been proposed to make data behind the
image more secure. We have still been using the same public key cryptography like Deffie-Hellman and
RSA for key negotiation which is vulnerable to both technological progress of computing power and
evolution in mathematics, so in this paper we have proposed use of quantum cryptography along with
stegnography. The use of this combination will create key distribution schemes that are uninterceptable thus
providing our data a perfect security.
Keywords: Stegnography, Steganalysis, Steganalyst, Quantum Cryptography.
1. Introduction
Internet users frequently need to store, send and receive private information. The most common way to do
this is to transform the data into different forms. The resulting data can be understood only by those who
know how to return it to its original form. This method of protecting information is known as encryption. A
major drawback to encryption is that the existence of data is not hidden. Data that has been encrypted,
although unreadable, still exists as data. If given enough time, someone could eventually decrypt the data. A
solution to this problem is stegnography. Stegnography is also a form of writing namely concealed writing.
The Greek word staginess means “unseen” or “hidden.” Stegnography is thus a form of communication,
which is designed to be hidden from general view. Stegnography should not be seen as a replacement for
cryptography but rather as a complement to it.. There has been a rapid growth of interest in this subject over
the last two years, and for two main reasons. Firstly, the publishing and broadcasting industries have
become interested in techniques for hiding encrypted copyright marks and serial numbers in digital images,
audio recordings, books and multimedia products; an appreciation of new market opportunities created by
digital distribution is coupled with a fear that digital works could be too easy to copy. Secondly, moves by
various governments to restrict the availability of encryption services have motivated people to study
methods by which private messages can be embedded in seemingly innocuous cover messages. In modern
terms stegnography is usually implemented computationally, where cover Works such as text files, images,
audio files, and video files are tweaked in such a way that a secret message can be embedded within them.
The techniques are very similar to that of digital watermarking; however one big distinction must be
highlighted between the two. In digital watermarking, the focus is on ensuring that nobody can remove or
alter the content of the watermarked data, even though it might be plainly obvious that it exists.
Stegnography on the other hand, focuses on making it extremely difficult to tell that a secret message exists
at all. If an unauthorized third party is able to say with high confidence that a file contains a secret message,
then stegnography has failed. Stegnography also differs from cryptography because the latter does not
attempt to hide the fact that a message exists. Instead, cryptography merely obscures the integrity of the
46
2. Network and Complex Systems www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol 2, No.2, 2012
information so that it does not make sense to anyone but the creator and the recipient. The art of detecting
stegnography is referred to as steganalysis. With rapid advances in the field of stegnography and
cryptography there have also been major advances made in the field of steganalysis and cryptanalysis.
Typically, a steganalysis begins by identifying any artifacts that exists in the suspect file as a result of
embedding a message. Electronically, each of the tool used for stegnography leaves a fingerprint or
signature in the image that can be exploited to find the message in the image. Steganalysis does not
however consider the successful extraction of the message, there is usually a requirement of cryptanalysis.
So, after performing cryptanalysis on the cipher text, the plain text can easily be obtained. Over the years
our focus has been mainly on security of data but the security of keys is as important as the security of data.
Often this aspect is neglected. We have been using the same public key cryptosystem for many years now.
Since, uncertainly looms over the security of these cryptosystems; we have used quantum cryptography for
securing the key distribution. Quantum cryptography is thought to be secure for three main reasons. One,
the quantum no-cloning theorem states that an unknown quantum state cannot be cloned. Theoretically,
messages sent using quantum cryptography would be in an unknown quantum state, so they could not be
copied and sent on. Two, in a quantum system, which can be in one of two states, any attempt to measure
the quantum state will disturb the system. A quantum message that is intercepted and read by an
eavesdropper will become garbled and useless to the intended recipient of the message. Three, the effects
produced by measuring a quantum property are irreversible, which means an eavesdropper cannot “put
back” a quantum message to its original state. These three properties provide the power of quantum
cryptography.
2. Related Work
S. K. Moon et al proposed an algorithm to hide data of any format in an image and audio file ( S.K Moon et
al 2007).For stegnography he used the least significant bit ( 4 LSB ) substitution method. The 4LSB method
was implemented for color bitmap images and wave files as the carrier media. A new method of
stegnography in MMS was proposed by Mohammad Shirali et al .This paper presented a new method of
stegnography using both image and text stegnography methods. This project was written in J2ME (Java 2
Micro Edition ) .In this method, data is broken into two parts with proper sizes and the parts were hidden in
the image and text part of MMS message (Mohammad Shirali et al 2007).In order to further enhance the
secrecy of stegnography Piyush Marwaha and Pravesh Marwaha (Piyush Marwaha et al 2010 ) proposed
an advanced system of encrypting data that combines the features of cryptography, stegnography along with
multi-media data hiding. This paper proposed the concept of multiple cryptography where the data will be
encrypted in a cipher and the cipher will be hidden into a multimedia image file in encrypted format. This
system was more secure than any other these techniques alone and also as compared to stegnography and
cryptography combined systems .Muhammad Asad et al proposed an enhanced least significant bit for
audio stegnography ( Muhammad Asad et al 2011 ).This paper proposes two ways to improve the
conventional LSB modification technique. The first way is to randomize bit number of host message used
for embedding secret message while the second way is to randomize sample number containing next secret
message bit. The improvised proposed technique works against steganalysis and decreases the probability
of secret message being extracted by an intruder. Mohammad Hamdaqa used VoIP (Voice over IP) for real
time network stegnography, which utilizes VoIP protocols and traffic as a covert channel to conceal secret
messages. This paper modifies the (k, n) threshold secret sharing scheme, which is based on Lagrange’s
Interpolation, and then applies a two phase approach on the LACK stegnography mechanism to provide
reliability and fault tolerance and to increase steganalysis complexity (Muhammad Hamdaqa et al 2011 ).A
new perfect hashing based approach was given by Imran Sarwar Bajwa et al.It uses hashing based approach
for stegnography in grey scale images. The proposed approach is more efficient and effective that provides
a more secure way of data transmission at higher speed. The presented approach is implemented into a
prototype tool coded in VB.NET (Imran Sarwar Bajwa et al 2011 ).
47
3. Network and Complex Systems www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol 2, No.2, 2012
3. Proposed Work
The proposed work consists of the given discussed phases.
3.1 Stegnography
Steganography literally means covered writing. Its goal is to hide the fact that communication is taking
place. Steganography is mainly applied to media such as images, text, video clips, music and sounds. Image
steganography is generally more preferred media because of its harmlessness and attraction. The three basic
techniques used for steganography are classified as follows:
(A)-Injection-Hiding data in sections of file that are ignored by the processing applications. Therefore avoid
modifying those file bits that are relevant to an end user leaving the cover file perfectly usable.
(B)-Substitution-Replacement of least significant bits of information that determine the meaningful content
of the original file with new data in a way that causes least amount of distortion.
(C)-Generation-Unlike injection and substitution, this does not require an existing cover file but generates a
cover file for the sole purpose of hiding the message. There are many algorithms that can be used for
stegnography. The algorithm which we have used here for stegnography is F5 which is much more secure
than all the other algorithms. The F5 algorithm provides high stenographic capacity and can prevent visual
attacks and it is also resistant to statistical attacks. Even if the attacker is able to break this algorithm, he
will get back only the cipher text and will have to perform cryptanalysis on it to get back the original text.
Fig 1 shows the graphical representation of stegnography.
Start Application
Encryption Stego Image
Image Message File Image Message File
Stego Image Decryption
Figure 1. Graphical Representation of Stegnography
48
4. Network and Complex Systems www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol 2, No.2, 2012
3.2 Result
Figure 2. Results of Cover Image and Stego Image (after Hiding the Data behind the Cover Image)
3.3 Stegnalysis
Stegnography basically exploits human perception, as human senses are not trained to look for files that
have information inside them. The art of detecting stegnography is referred to as steganalysis.
Stegnography have made rapid advances over the years and so have steganalysis. Stegnography (and
Steganalysis) is neither inherently good nor evil; it is the manner in which it is used which will determine
whether it is benefit or detriment to our society. The number of attacks used by the steganalyst for detecting
hidden informations has been only multiplied over the years. The types of attacks used by the steganalysts
are following.
1. Stego only attack
2. Chosen stego attack
3. Known cover attack
4. Known stego attack
Various tools for detecting stegnography are easily available over the internet. Various tools like Stegdetect
and Xsteg are freely available over the internet for detecting stegnography. By performing Steganalysis on
the image the attacker will only get the cipher text and he will have to perform Cryptanalysis to get back
the original text.
3.4 Quantum Cryptography
Public key cryptosystems such as RSA and DEFFIE-HELMAN are still considered to be secure for key
distribution. They have undergone over lots of public scrutiny over the years. The power of these
algorithms are based on the fact that there is no known mathematical operation for quickly factoring very
large numbers given today’s computer processing power. The public cryptosystem has been working very
well over the years but in the recent years it has been exposed to a handful of risks. Firstly a computer
scientist at the Indian Institute of Technology, Manindra Agarwal solved a problem, how to tell if a number
is prime, without performing any factoring, solving this problem may open the door for mathematician to
figure out how to factor large numbers. Secondly, the advancements in computer processing will be able to
defeat these cryptosystems in timely fashion thus making the public key cryptosystems obsolescent
instantly. So here we have used quantum cryptography for exchanging the keys efficiently. At this time,
transmission speed and hardware expenses have generally limited the use of quantum devices to distribute
49
5. Network and Complex Systems www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol 2, No.2, 2012
the keys rather than the entire message. Classical methods of information security using encryption
decryption or otherwise are known to be secure but not 100 percent. Increasing computation powers helps
hackers to crack down the security cover. Quantum level is one which behaves somewhat differently than
classical ones. Classical methods can never give 100% security for example even strong encryption like
DES, AES are prone to be broken as much effective work has been done to break these. Dealing things at
quantum level will definitely give perfect security because of the behavior of microscopic particles.
Assuming laws of Quantum mechanics is true, which follow Heisenberg’s uncertainty principle and photon
polarization we can provide 100% security.
3.4.1 Why Quantum Cryptography?
Rather than depending on the complexity of factoring large numbers, quantum cryptography is based on the
fundamental and unchanging principles of quantum mechanics. In fact, quantum cryptography rests on two
pillars of 20th century quantum mechanics –the Heisenberg Uncertainty principle and the principle of
photon polarization. Heisenberg’s uncertainty principle says that if you measure one thing, you can not
measure another thing accurately. For example, if you measure the position of an electron flying around an
atom, you can not accurately measure its velocity. It can be represented using this equation.
where
(1)
According the Heisenberg Uncertainty principle, it is not possible to measure the quantum state of any
system without disturbing that system. Thus, the polarization of a photon or light particle can only be
known at the point when it is measured. This principle plays a critical role in thwarting the attempts of
eavesdroppers in a cryptosystem based on quantum cryptography. Secondly, the photon polarization
principle describes how light photons can be oriented or polarized in specific directions. Moreover, a
polarized photon can only be detected by a photon filter with the correct polarization or else the photon
may be destroyed. It is Heisenberg’s uncertainty principle that makes quantum cryptography an attractive
option for ensuring the privacy of data and defeating eavesdroppers.
3.5 Key Generation
Quantum property of light is used to generate key. Individual photons are completely polarized. Their
polarization state can be linear or circular, or it can be elliptical, which is anywhere in between of linear and
circular polarization. These can be described through following equations (analogous to classical
electromagnetic waves).
Linear Polarization
The wave is linearly polarized (or plane polarized) when the phase angles αx and αy are equal.
(2)
This represents a wave with phase α polarized at an angle θ with respect to x axis. In that case the Jones
Vector can be written as follows.
(3)
The state vectors for linear polarization in x or y are special cases of this state vector.
If unit vectors are defined such that,
and
(4)
then, the linearly polarized polarization state can written in the "x-y basis" as follows.
(5)
50
6. Network and Complex Systems www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol 2, No.2, 2012
Circular polarization
If the phase angles αx and αy differs exactly by π/2 and x amplitude equals the y amplitude the wave is
circularly polarized. The Jones vector then becomes
(6)
Where, the plus sign indicates right circular polarization and the minus sign indicates left circular
polarization. In the case of circular polarization, the electric field vector of constant magnitude rotates in
the x-y plane.
If unit vectors are defined such that
and
(7)
then an arbitrary polarization state can written in the "R-L basis" as
where
(8)
and
We can see that
(9)
Elliptical polarization
The general case in which the electric field rotates in the x-y plane and has variable magnitude is called
elliptical polarization .The state vector is given by
(10)
We can generate our key using photon polarization. Each photon can be polarized in different manner.
A calcite crystal can be used as a quantum filter. If the crystal is held in a vertical position, photons that are
vertically or horizontally polarized ( | or — ) will pass through the filter unchanged. If a photon that is
diagonally polarized (/ or ) passes through the vertical filter, however, the polarization will be changed to
vertical or .horizontal.
3.6 Securing Key Distribution
It is the one –way-ness of photons along with the Heisenberg uncertainty principle that makes quantum
cryptography an attractive option for ensuring the privacy of data and defeating eavesdropper. The
representation of bits through polarized photons is the foundation of quantum cryptography that serves as
the underlying principle of quantum key distribution. Thus, while the strength of modern digital
cryptography is dependent on the computational difficulty of factoring large numbers, quantum
cryptography is completely dependent on the rules of physics and is also independent of the processing
power of current computing systems. Since the principle of physics will always hold true, quantum
cryptography provides an answer to the uncertainty problem that current cryptography suffers from; it is no
longer necessary to make assumptions about the computing power of malicious attackers or the
development of a theorem to quickly solve the large integer factorization problem.
Keys can be distributed using quantum cryptography in the following manner. The sender will send the
message to the receiver using a photon gun. The stream of photons will be in one of the four polarization
that corresponds to vertical, horizontal or diagonal in opposite directions (0,45,90.135 degree).At the
receiver’s end the receiver will randomly choose a filter and count and measure the correct photon
polarization. Now, receiver will communicate with sender (out-of-band) about their correct measurement
(without sending actual measurement values. The photons that were incorrectly measured will be discarded
and the correctly measured photons will be translated into bits based on their polarization. Now, sender and
51
7. Network and Complex Systems www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol 2, No.2, 2012
receiver will generate one time pad combining their results. This one-time pad will be used in one time
information exchange between them. None of them can know the actual key in advance because the key is
the product of both their random choices.
Now, if an attacker tries to eavesdrop, he must select the correct filter otherwise the photon will get
destroyed. Even if attacker is able to successfully eavesdrop, the information which he will get will be of
little use unless he has the knowledge of correct polarization of each particular photon. As a result attacker
will not correctly interpret meaningful keys and thus be thwarted in his endeavors.
3.7 Security
The data which has to be secured here is wrapped around number of security layers. If the attacker gets
access to the stego image file in which the message is embedded. At first he will have to perform
steganalysis to find out that this message contains a message or not. Even if after performing steganalysis
he finds out that image contains some data, he will have to apply the same algorithm to retrieve the
embedded file. Unfortunately, if he finds out the algorithm by which the texts have been embedded into the
medium, he could get back only the cipher text file. The encryption algorithm which we have used here is
AES, which is one of the most secure encryption algorithm used today. This provides an extra layer of
security. Now the hacker is left with only one choice to extract the embedded file and that is to compromise
the encryption key used somehow. Since modern cryptography is vulnerable to both technological progress
of computing power and evolution in mathematics, there is uncertainty that Deffie-Helman and RSA will be
secure for key distribution in future or not. Here we would like to propose a new model. This model could
be easily applied on the web for making data more secure.
Stegnography (Stego Image)
Cryptography (Cipher Text)
Plain Text
Figure 3. Existing Model of Stegnography
Key Distribution using Quantum Cryptography
Stegnography (Stego Image)
Cryptography (Cipher Text)
Plain Text
Figure 4. The proposed model of Stegnography with Key Distribution using Quantum Cryptography
Main idea behind this model is to use quantum cryptography for securing key distribution thus providing
our data another layer of security. This way we can provide perfect security to data over the internet.
4. Future Work
At present quantum cryptography is used in very small area, the use of quantum cryptography should be
52
8. Network and Complex Systems www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol 2, No.2, 2012
encouraged and it should be used in wide area of applications beside that, maximum guaranteed
transmission distance between remote parties is very less at present. As, optical fibers are not perfectly
transparent, a photon will at times get absorbed and therefore not reach the end of the fiber. Although,
quantum cryptography is secure but information retrieved is very less (due to loss).
It should be improved. Another problem that needs to be addressed in future is if an attacker tries to tamper
with the message whole message gets destroyed. It is a nice feature of quantum cryptography that no one
can tamper with the message but at the same time due to this the receiver is also suffering because correct
message was not delivered to the recipient, and now the sender will have to resend the message either from
the same path or he will have to choose a different path.
5. Conclusion
Securing the key distribution is as important as securing the data itself. In this paper we have made use of
quantum cryptography thus improving the security of the keys and providing our data a perfect security.
The use of quantum cryptography has added another layer of defense to our data. Even if we use most
secure encryption algorithm and best stego technique to hide our data, if the keys gets compromised these
security will be of no use. Quantum cryptography addresses current as well as emerging threats and it
definitely has “competitive advantage” over other public key cryptosystems. We have used quantum
cryptography only for key distribution rather than for entire messages because of limitations of
transmission speeds and hardware expenses. The representation of bits through polarized photon is the
foundation of quantum cryptography that serves as the underlying principle of quantum key distribution.
This paper concentrates on theory of quantum cryptography and the use of quantum cryptography for key
distribution and how the use of quantum cryptography contributes to the field of stegnography. In this paper
we have shown that using quantum mechanics and photon polarization we can provide perfect security.
References
Manindra Agrawal, Neeraj Kayal, and Nitin Saxena (2004). Primes is in P. Annals of Mathematics,
160,781-793.doi: 10.4007/annals.2004.160.781
Imran Sarwar Bajwa and Rubata Raisat (2011). A New Perfect Hashing based Approach for Secure
Stegnograph. Digital Information Management (ICDIM),174-178. doi: 10.1109/ICDIM.2011.6093325
Muhammad Asad, Junaid Gilani and Adnan Khalid (2011). An Enhanced Least Significant Bit
Modification Technique for Audio Steganography Computer Networks and Information Technology
(ICCNIT), 143-147. doi: 10.1109/ICCNIT.2011.6020921
Mohammad Hamdaqa and Ladan Tahvildari (2011). ReLACK: A Reliable VoIP Steganography Approach.
Fifth International Conference on Secure Software Integration and Reliability Improvement ,189-197.doi:
10.1109/SSIRI.2011.24
S. Changder, N.C. Debnath and D.Ghosh (2011). A Greedy Approach to Text Steganography using
Properties of Sentences. Eighth International Conference on Information Technology: New Generations,
30-35. doi: 10.1109/ITNG.2011.13
Piyush Marwaha and Paresh Marwaha (2010). VISUAL CRYPTOGRAPHIC STEGANOGRAPHY IN
IMAGES. Second International conference on Computing, Communication and Networking Technologies,
1-6. doi: 10.1109/ICCCNT.2010.5591730
Jinsuk Baek, Cheonshik Kim, Paul S. Fisher and Hongyang Chao (2010). (N. 1) Secret Sharing Approach
Based on Steganography with Gray Digital Images. IEEE Conference on Wireless Communications,
Networking and Information Security (WCNIS) ,325-329.doi: 10.1109/WCINS.2010.5541793
Ferruccio Pisanello, Luigi Martiradonna, Piernicola Spinicelli, Angela Fiore and Jean-Pierre Hermier
(2009). Polarized Single Photon Emission for Quantum Cryptography Based on Colloidal Nanocrystals.
11th international conference on Transparent Optical Networks,1-4. doi: 10.1109/ICTON.2009.5185131
Vladimir L. Kurochkin and Igor G.Neizvestny (2009). Quantum Cryptography. 10th INTERNATIONAL
CONFERENCE AND SEMINAR EDM'2009, 166-170. doi: 10.1109/EDM.2009.5173960
Mehrdad S. Sharbaf (2009). Quantum Cryptography: A New Generation of Information Technology
Security System. Sixth International Conference on Information Technology: New Generations, 1644-1648.
53
9. Network and Complex Systems www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol 2, No.2, 2012
doi: 10.1109/ITNG.2009.173
Mohammad Shirali-Shahreza (2007). Steganography in MMS. IEEE International Multitopic Conference,
INMIC 2007, 1-4. doi: 10.1109/INMIC.2007.4557698
Rajni Goel, Moses Garuba and Anteneh Girma (2007). Research Directions in Quantum Cryptography.
International Conference on Information Technology (ITNG'07), 779-784. doi: 10.1109/ITNG.2007.166
Donovan Artz (2001). Digital Stegnography: Hiding Data within the Data. IEEE Internet Computing , 5,
75-80. http://computer.org/internet/
S.K.Moon & R.S.Kawitkar (2007).Data Security using Data Hiding. International Conference on
Computational Intelligence and Multimedia Applications, 4,247-251. Doi: 10.1109/ICCIMA.2007.163
Beenish Mehboob & Rashid Aziz Faruqui (2008). A Stegnography Implementation. International
Symposium on Biometrics and Security Technology,1-5. doi:10.1109/ISBAST.2008.4547669
Tom Klitsner (2001). Quantum Cryptography: Is Your Data Safe Even When Somebody Looks? SANS
Institute InfoSec Reading Room,1-15.
Bruce R Auburn (2003). Quantum Encryption – A Means to Perfect Security? SANS Institute InfoSec
Reading Room, 1-16.
Bob Gourley (2001). Quantum Encryption vs Quantum Computing: Will the Defense or Offense
Dominate? SANS Security Essentials GSEC Practical Assignment Version 1.2e,1-10.
Bradford C Bartlett (2004). Securing Key Distribution with Quantum Cryptography. SANS Institute InfoSec
Reading Room, 1-13.
Joshua Silman (2001). Stegnography and Steganalysis: An Overview. SANS Institute InfoSec Reading
Room,1-10.
Abhishek Tiwari (2009).Stegnography White Paper: The Science of secret communication. Abhitek
Fostering Innovation, 1-20
Mohit Kumar was born in 13th February 1985, Patna, (Bihar), India. He received his B.E degree in
Computer Engineering from D.Y.Patil College of Engineering,Pune(MAHARASHTRA),India,affiliated to
PUNE UNIVERSITY . He is currently pursuing MTECH degree in Computer Science Engineering and
Information Technology at Jaypee University of Information Technology, Waknaghat, Distt.
Solan,(H.P),India. His research interest includes Cryptography and Network Security,Operating System and
Computer Networks.
Abhishek Gupta was born in 12th February 1987, Saharanpur, (U.P.), India. He received his BTech degree
in Computer Engineering from Shobit Institute of Engineering & Technology,Saharanpur (U.P.), India,
affiliated to U.P.T.U, Lucknow (U.P.),India. He is currently pursuing MTECH degree in Computer Science
Engineering and Information Technology at Jaypee University of Information Technology, Waknaghat,
Distt. Solan,(H.P),India. His research interest includes Cryptography and Network Security and Computer
Networks.
Kinjal Shah was born in 10th November 1987, Vadodara, (Gujarat), India. He received his B.E degree in
Computer Engineering from A. D. Patel Institute of Technology, New Vallabh Vidyanagar, Distt Anand,
(Gujarat), India, affiliated to Sardar Patel University, Vallabh Vidyanagar, (Gujarat),India. He is currently
pursuing MTECH degree in Computer Science Engineering and Information Technology at Jaypee
University of Information Technology, Waknaghat, Distt. Solan,(H.P),India. His research interest includes
Cloud Computing, Cryptography and Network Security and Computer Networks.
Atul Saurabh was born in 19th June 1984, Darbhanga, (Bihar), India. He received his B. Tech degree in
Information Technology from Bengal Institute of Technology and Management, Santiniketan, (West
Bengal), India affiliated to West Bengal University of Technology, Kolkata, (West Bengal),India. He is
54
10. Network and Complex Systems www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol 2, No.2, 2012
currently pursuing MTECH degree in Computer Science Engineering and Information Technology at
Jaypee University of Information Technology, Waknaghat, Distt. Solan,(H.P),India. His research interest
includes Business Automation and Modelling, Data Structure and Algorithm, Cryptography and J2EE.
Vikas Kumar Tiwari was born in 20th December 1987, ChandiaUmaria, (M.P.), India. He received his
B.E degree in Computer Science & Engineering from JNCT Bhopal, (M.P.), India, affiliated to R.G.T.U.
Bhopal (M.P.),India. He is currently pursuing MTECH degree in Computer Science Engineering and
Information Technology at Jaypee University of Information Technology, Waknaghat, Distt.
Solan,(H.P),India. His research interest includes Cloud Computing, MapReduce, Cryptography and
Network Security and Computer Networks.
Pravesh Saxena was born in 24th July 1988, Sarangarh, (Chhattisgarh), India. He received his B.E degree
in Computer Engineering from Kirodimal Institute Of Technology, Raigarh,(Chhattisgarh)India, affiliated
to Chhattisgarh Swami Vivekanand Technical University (CSVTU),India. He is currently pursuing
MTECH degree in Computer Science Engineering and Information Technology at Jaypee University of
Information Technology, Waknaghat, Distt. Solan,(H.P),India. His research interest includes Cryptography
and Network Security and Computer Networks.
55
11. This academic article was published by The International Institute for Science,
Technology and Education (IISTE). The IISTE is a pioneer in the Open Access
Publishing service based in the U.S. and Europe. The aim of the institute is
Accelerating Global Knowledge Sharing.
More information about the publisher can be found in the IISTE’s homepage:
http://www.iiste.org
The IISTE is currently hosting more than 30 peer-reviewed academic journals and
collaborating with academic institutions around the world. Prospective authors of
IISTE journals can find the submission instruction on the following page:
http://www.iiste.org/Journals/
The IISTE editorial team promises to the review and publish all the qualified
submissions in a fast manner. All the journals articles are available online to the
readers all over the world without financial, legal, or technical barriers other than
those inseparable from gaining access to the internet itself. Printed version of the
journals is also available upon request of readers and authors.
IISTE Knowledge Sharing Partners
EBSCO, Index Copernicus, Ulrich's Periodicals Directory, JournalTOCS, PKP Open
Archives Harvester, Bielefeld Academic Search Engine, Elektronische
Zeitschriftenbibliothek EZB, Open J-Gate, OCLC WorldCat, Universe Digtial
Library , NewJour, Google Scholar