An enhanced Hill cipher approach for image encryption in steganography

In this paper, a new approach is adopted to embed an image within an image using a modified Hill cipher method. The secret image is taken and rearranged to form N 2 × 2 matrices. A key matrix of length 2 × 2 is multiplied with all the N matrices and modulo-256 operation is performed. Then the new N matrices are rearranged to form a one-dimensional matrix. Each element of this matrix is converted to its binary value. A cover image is taken and in each of its pixels, the two least significant bits LSB are replaced with two bits from the binary matrix successively. While retrieving, the last 2 bits from each cover pixel are taken out, arranged to form a binary matrix and are converted into their respective 8-bit values. This one dimensional array is converted into N 2 × 2 matrices. These matrices are multiplied with the inverse of the key matrix to get the original values. These values are then rearranged appropriately to get the secret image which was transmitted.

[1]  Aman Jantan,et al.  A New Steganography Approach for Image Encryption Exchange by Using the Least Significant Bit Insertion , 2008 .

[2]  O. Roeva,et al.  Information Hiding: Techniques for Steganography and Digital Watermarking , 2000 .

[3]  Lee-Ming Cheng,et al.  Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..

[4]  Upendra Kumar Agrawal,et al.  Combined Implementation of Robust Cryptosystem for Non-invertible Matrices based on Hill Cipher and Steganography , 2011 .

[5]  Rengarajan Amirtharajan,et al.  Smart bit manipulation for K bit encoded hiding in K-1 pixel bits , 2011, 3rd International Conference on Trendz in Information Sciences & Computing (TISC2011).

[6]  T. N. Shankar,et al.  Steganographic manipulations with elliptic curve cryptography , 2012, Int. J. Electron. Secur. Digit. Forensics.

[7]  Gandharba Swain,et al.  A hybrid approach to steganography embedding at darkest and brightest pixels , 2010, 2010 International Conference on Communication and Computational Intelligence (INCOCCI).

[8]  B. Karthikeyan,et al.  LSB Replacement Stegnography in an Image using Pseudorandomised Key Generation , 2012 .

[9]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[10]  K. Thenmozhi,et al.  Pixel bit manipulation for encoded hiding — An inherent stego , 2012, 2012 International Conference on Computer Communication and Informatics.

[11]  Hassan Aghaeinia,et al.  A More Secure Steganography Method in Spatial Domain , 2011, 2011 Second International Conference on Intelligent Systems, Modelling and Simulation.

[12]  Rajesh Kumar Tiwari High capacity and secured methodologies for steganography , 2012, Int. J. Electron. Secur. Digit. Forensics.