Cryptography and Digital Image Steganography Techniques

Exchange of secure information between the sender and receiver draws the attention of several researchers due to its importance in various fields ranging from national security (Tutun et al. in Procedia Comput Sci 114:132–138, 2017 [73]) to social profile (Gupta and Dhami in J Direct Data Digit Mark Pract 17:43–53, 2015 [29]). Cryptography (Coron in IEEE Secur Priv 4:70–73, 2006 [17]) and Steganography (Cheddad and Condell in Sig Process 90:727–752, 2010 [14], Rabah in Inf Technol J 3:245–269, 2004 [59]) are the two major streams dealing with information security. This chapter focuses on different techniques used for cryptography and steganography. The major emphasis is given on image steganography.

[1]  Whitfield Diffie,et al.  Special Feature Exhaustive Cryptanalysis of the NBS Data Encryption Standard , 1977, Computer.

[2]  Yvo Desmedt,et al.  A Chosen Text Attack on the RSA Cryptosystem and Some Discrete Logarithm Schemes , 1986, CRYPTO.

[3]  P. Yip,et al.  Discrete Cosine Transform: Algorithms, Advantages, Applications , 1990 .

[4]  Ronald L. Rivest,et al.  The MD5 Message-Digest Algorithm , 1992, RFC.

[5]  Joan L. Mitchell,et al.  JPEG: Still Image Data Compression Standard , 1992 .

[6]  S. Tavares,et al.  Known plaintext cryptanalysis of tree-structured block ciphers , 1995 .

[7]  Eyal Kushilevitz,et al.  From Differential Cryptanalysis to Ciphertext-Only Attacks , 1998, CRYPTO.

[8]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[9]  Andreas Pfitzmann,et al.  Attacks on Steganographic Systems , 1999, Information Hiding.

[10]  Markus G. Kuhn,et al.  Information hiding-A survey : Identification and protection of multimedia information , 1999 .

[11]  William P. Wardlaw,et al.  The RSA Public Key Cryptosystem , 2000 .

[12]  Ja-Chen Lin,et al.  Image hiding by optimal LSB substitution and genetic algorithm , 2001, Pattern Recognit..

[13]  Ian F. Blake,et al.  On the Security of the Digital Signature Algorithm , 2002, Des. Codes Cryptogr..

[14]  Chin-Chen Chang,et al.  A steganographic method based upon JPEG and quantization table modification , 2002, Inf. Sci..

[15]  William Stallings,et al.  THE ADVANCED ENCRYPTION STANDARD , 2002, Cryptologia.

[16]  Martin Boesgaard,et al.  Rabbit: A New High-Performance Stream Cipher , 2003, FSE.

[17]  Kris Gaj,et al.  Facts and Myths of Enigma: Breaking Stereotypes , 2003, EUROCRYPT.

[18]  David Salomon,et al.  Data Privacy and Security , 2003, Springer New York.

[19]  Huaiqing Wang,et al.  Cyber warfare: steganography vs. steganalysis , 2004, CACM.

[20]  Hideki Noda,et al.  Application of BPCS steganography to wavelet compressed video , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[21]  Gregory D. Abowd,et al.  The ContextCam: Automated Point of Capture Video Annotation , 2004, UbiComp.

[22]  Christophe Giraud,et al.  A Survey on Fault Attacks , 2004, CARDIS.

[23]  S. S. Iyengar,et al.  Computationally efficient algorithms for a one-time pad scheme , 2004, International Journal of Computer & Information Sciences.

[24]  Ajith Abraham,et al.  Significance of steganography on data security , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..

[25]  Kefa Rabah,et al.  Steganography-The Art of Hiding Data , 2004 .

[26]  Lee-Ming Cheng,et al.  Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..

[27]  Xinpeng Zhang,et al.  Steganography using multiple-base notational system and human vision sensitivity , 2005, IEEE Signal Process. Lett..

[28]  Thomas Stützle,et al.  Ant colony optimization: artificial ants as a computational intelligence technique , 2006 .

[29]  Hideki Noda,et al.  A Model of Digital Contents Access Control System Using Steganographic Information Hiding Scheme , 2006, EJC.

[30]  Xinpeng Zhang,et al.  Efficient Steganographic Embedding by Exploiting Modification Direction , 2006, IEEE Communications Letters.

[31]  Thomas Wollinger,et al.  Fundamentals of Symmetric Cryptography , 2006 .

[32]  J.-S. Coron What Is Cryptography? , 2006, IEEE Secur. Priv..

[33]  Weiming Zhang,et al.  Improving Embedding Efficiency of Covering Codes for Applications in Steganography , 2007, IEEE Communications Letters.

[34]  Christophe Clavier,et al.  Passive and Active Combined Attacks on AES Combining Fault Attacks and Side Channel Analysis , 2007 .

[35]  Guangrong Ji,et al.  A New Method of Steganalysis Based on Image Entropy , 2007, ICIC.

[36]  Jianjun Wang,et al.  A steganographic method based upon JPEG and particle swarm optimization algorithm , 2007, Inf. Sci..

[37]  V Ramaswamy,et al.  Performance Enhancement Of Blowfish Algorithm By Modifying Its function , 2007 .

[38]  Bart Preneel,et al.  Differential-Linear Attacks Against the Stream Cipher Phelix , 2007, FSE.

[39]  Xuejia Lai,et al.  An analysis of international data encryption algorithm(IDEA) security against differential cryptanalysis , 2008, Wuhan University Journal of Natural Sciences.

[40]  Angelos D. Keromytis,et al.  Methods for Linear and Differential Cryptanalysis of Elastic Block Ciphers , 2008, ACISP.

[41]  Yuqing Zhang,et al.  Authenticated Diffie-Hellman key agreement protocol with forward secrecy , 2008, Wuhan University Journal of Natural Sciences.

[42]  Sunita Prasad,et al.  Security Enhancement in Data Encryption Standard , 2009, ICISTM.

[43]  Saroj Kumar Panigrahy,et al.  H-S-X Cryptosystem and Its Application to Image Encryption , 2009, 2009 International Conference on Advances in Computing, Control, and Telecommunication Technologies.

[44]  Christof Paar,et al.  The Advanced Encryption Standard (AES) , 2010 .

[45]  Bart Preneel Cryptographic Hash Functions: Theory and Practice , 2010, INDOCRYPT.

[46]  Kevin Curran,et al.  Digital image steganography: Survey and analysis of current methods , 2010, Signal Process..

[47]  Shen Wang,et al.  A Secure Steganography Method based on Genetic Algorithm , 2010, J. Inf. Hiding Multim. Signal Process..

[48]  Rainer Böhme,et al.  Principles of Modern Steganography and Steganalysis , 2010 .

[49]  William J. Spezeski A Keyless Polyalphabetic Cipher , 2010 .

[50]  Rupali B. Patil,et al.  Image and Text Compression Using Dynamic Huffman and RLE Coding , 2011, SocProS.

[51]  Debnath Bhattacharyya,et al.  Image Data Hiding Technique Using Discrete Fourier Transformation , 2011, UCMA.

[52]  Wasan Shaker Awad,et al.  Information Hiding Using Ant Colony Optimization Algorithm , 2011, Int. J. Technol. Diffusion.

[53]  Z. Azimifar,et al.  Image steganography based on pixel ranking and Particle Swarm Optimization , 2012, The 16th CSI International Symposium on Artificial Intelligence and Signal Processing (AISP 2012).

[54]  Jamshid Shanbehzadeh,et al.  High Capacity Image Steganography Based on Genetic Algorithm and Wavelet Transform , 2012 .

[55]  Arvind Kumar,et al.  Enhanced Block Playfair Cipher , 2013, QSHINE.

[56]  Song Y. Yan,et al.  Quantum Resistant Cryptosystems , 2013 .

[57]  S. Yan Quantum Attacks on Public-Key Cryptosystems , 2013, Springer US.

[58]  J. K. Mandal,et al.  A Genetic Algorithm based Steganography Using Discrete Cosine Transformation (GASDCT) , 2013 .

[59]  Ze-Nian Li,et al.  Lossy Compression Algorithms , 2014 .

[60]  A. Gupta,et al.  Measuring the impact of security, trust and privacy in information sharing: A study on social networking sites , 2015 .

[61]  Virendra Kumar Yadav,et al.  A Novel Approach of Bulk Data Hiding using Text Steganography , 2015 .

[62]  Gabriela Mogos,et al.  Quantum Key Distribution Protocol with Four-State Systems – Software Implementation , 2015 .

[63]  Imran Raza Khan,et al.  Cryptanalysis of Image Encryption Algorithm Based on Fractional-Order Lorenz-Like Chaotic System , 2015 .

[64]  Abraham Thomas,et al.  Steganographic Technique Using Secure Adaptive Pixel Pair Matching for Embedding Multiple Data Types in Images , 2015, 2015 Fifth International Conference on Advances in Computing and Communications (ICACC).

[65]  Aruna Malik,et al.  A Modified Pixel-Value Differencing Image Steganographic Scheme with Least Significant Bit Substitution Method , 2015 .

[66]  Hyoungshick Kim,et al.  Visual Honey Encryption: Application to Steganography , 2015, IH&MMSec.

[67]  Rinita Roy,et al.  Optimization of Stego Image Retaining Secret Information Using Genetic Algorithm with 8-connected PSNR , 2015, KES.

[68]  Ming Li,et al.  Secure spread-spectrum data embedding with PN-sequence masking , 2015, Signal Process. Image Commun..

[69]  D. Jude Hemanth,et al.  Application of Genetic Algorithm and Particle Swarm Optimization techniques for improved image steganography systems , 2016 .

[70]  Shuliang Sun,et al.  A novel edge based image steganography with 2k correction and Huffman encoding , 2016, Inf. Process. Lett..

[71]  Hanung Adi Nugroho,et al.  Multiple layer data hiding scheme based on difference expansion of quad , 2017, Signal Process..

[72]  Mohammad T. Khasawneh,et al.  An Outlier-Based Intention Detection for Discovering Terrorist Strategies , 2017 .

[73]  Kevin Curran,et al.  An overview of steganography techniques applied to the protection of biometric data , 2017, Multimedia Tools and Applications.

[74]  Komal Sharma,et al.  Lossless data compression techniques and their performance , 2017, 2017 International Conference on Computing, Communication and Automation (ICCCA).

[75]  Suvamoy Changder,et al.  Performance analysis of image steganalysis techniques and future research directives , 2018, Int. J. Inf. Comput. Secur..

[76]  Anand Jayant Kulkarni,et al.  JPEG based steganography methods using Cohort Intelligence with Cognitive Computing and modified Multi Random Start Local Search optimization algorithms , 2018, Inf. Sci..

[77]  Anand Jayant Kulkarni,et al.  Improved Cohort Intelligence - A high capacity, swift and secure approach on JPEG image steganography , 2019, J. Inf. Secur. Appl..

[78]  Manoj Kumar,et al.  Information hiding with adaptive steganography based on novel fuzzy edge identification , 2019, Defence Technology.

[79]  Christian Riess,et al.  Image Forensics from Chroma Subsampling of High-Quality JPEG Images , 2019, IH&MMSec.

[80]  Changho Kim,et al.  A novel color image LSB steganography using improved 1D chaotic map , 2019, Multimedia Tools and Applications.

[81]  Matija Črnjević Cryptography and information security , 2019 .

[82]  Ying Zou,et al.  Research on image steganography analysis based on deep learning , 2019, J. Vis. Commun. Image Represent..

[83]  Madini O. Alassafi,et al.  Performance Analysis of Cryptographic Pseudorandom Number Generators , 2019, IEEE Access.

[84]  Behnam Ghavami,et al.  An image encryption method based on chaos system and AES algorithm , 2019, The Journal of Supercomputing.

[85]  Tohari Ahmad,et al.  Information hiding scheme for digital images using difference expansion and modulus function , 2018, J. King Saud Univ. Comput. Inf. Sci..