Implementation of cryptography in steganography for enhanced security

The rapid development in technology has had a great influence on the exchange of information. In this modern era, maintaining security during informationexchanges is essential. There are many algorithms were used to ensure the exchanged data is confidential, with examples being cryptography and steganography. In this paper, we present a combined of bit matching steganography and Advanced Encryption System (AES) cryptography are used to improve the security of the exchanged data. Bit matching steganography has advantages in terms of payload capacity and image quality. The bit matching algorithm presented here is capable of finding the location of matching pixels and creates a key to retrieve the secret message. The AES algorithm is secure standard cryptographythatensures security of the generated key from attack. The proposed method utilizes the entire color channel to find the bit matching and then encrypts the key generated from the bit matching method before sending it to a receiver. Experimental results show that the proposed method has higher speed, an undistorted image, and unlimited payload capacity when compared with other popular steganography algorithms. Moreover, the proposed method also provides security against statistical steganalysis.

[1]  Ilkom Unnes Much Aziz Muslim,et al.  DATA HIDING SECURITY USING BIT MATCHING-BASED STEGANOGRAPHY AND CRYPTOGRAPHY WITHOUT CHANGE THE STEGO IMAGE QUALITY , 2015 .

[2]  A A Abdelmgeid,et al.  New Image Steganography Method using Zero Order Hold Zooming , 2016 .

[3]  Javaid A. Sheikh,et al.  Data hiding in scrambled images: A new double layer security data hiding technique , 2014, Comput. Electr. Eng..

[4]  Nameer N. El-Emam Hiding a Large Amount of Data with High Security Using Steganography Algorithm , 2007 .

[5]  Maher K. Mahmood,et al.  HIGH CAPACITY STEGANOGRAPHY BASED ON CHAOS AND CONTOURLET TRANSFORM FOR HIDING MULTIMEDIA DATA , 2014 .

[6]  Shuliang Sun,et al.  A novel edge based image steganography with 2k correction and Huffman encoding , 2016, Inf. Process. Lett..

[7]  Somjit Arch-int,et al.  A novel secure block data-hiding algorithm using cellular automata to enhance the performance of JPEG steganography , 2014, Multimedia Tools and Applications.

[8]  Chin-Chen Chang,et al.  High payload steganography mechanism using hybrid edge detector , 2010, Expert Syst. Appl..

[9]  Hamidreza Rashidy Kanan,et al.  A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm , 2014, Expert Syst. Appl..

[10]  Ki-Hyun Jung,et al.  Data hiding using edge detector for scalable images , 2012, Multimedia Tools and Applications.

[11]  Shadrokh Samavi,et al.  An adaptive LSB matching steganography based on octonary complexity measure , 2012, Multimedia Tools and Applications.

[12]  Khan Muhammad,et al.  CISSKA-LSB: color image steganography using stego key-directed adaptive LSB substitution method , 2017, Multimedia Tools and Applications.

[13]  Somjit Arch-int,et al.  An adaptive multi bit-plane image steganography using block data-hiding , 2016, Multimedia Tools and Applications.

[14]  Sung Wook Baik,et al.  A novel magic LSB substitution method (M-LSB-SM) using multi-level encryption and achromatic component of an image , 2015, Multimedia Tools and Applications.

[15]  Mohammad Rahmati,et al.  Adaptive image steganography using contourlet transform , 2013, J. Electronic Imaging.

[16]  Ja-Chen Lin,et al.  Image hiding by optimal LSB substitution and genetic algorithm , 2001, Pattern Recognit..

[17]  Ahmed Al-Ani,et al.  A steganography embedding method based on edge identification and XOR coding , 2016, Expert Syst. Appl..

[18]  Marghny H. Mohamed,et al.  High Capacity Image Steganography Technique based on LSB Substitution Method , 2016 .