Security improvisation in image steganography using DES

The incredible evolution of Internet technologies & its applications require high level the security of data over the communication channel. Image steganography is a digital technique for concealing information into a cover image. Least Significant-Bit (LSB) based approach is most popular steganographic technique in spatial domain due to its simplicity and hiding capacity. All of existing methods of steganography focus on the embedding strategy with less consideration to the pre-processing, such as encryption of secrete image. The conventional algorithm does not provide the preprocessing required in image based steganography for better security, as they do not offer flexibility, robustness and high level of security. The proposed work presents a unique technique for Image steganography based on the Data Encryption Standard (DES) using the strength of S- Box mapping & Secrete key. The preprocessing of secrete image is carried by embedding function of the steganography algorithm using two unique S-boxes. The preprocessing provide high level of security as extraction is not possible without the knowledge of mapping rules and secrete key of the function. Additionally the proposed scheme is capable of not just scrambling data but it also changes the intensity of the pixels which contributes to the safety of the encryption.

[1]  A. Nag,et al.  An image steganography technique using X-box mapping , 2012, IEEE-International Conference On Advances In Engineering, Science And Management (ICAESM -2012).

[2]  Themrichon Tuithung,et al.  A novel steganography method for image based on Huffman Encoding , 2012, 2012 3rd National Conference on Emerging Trends and Applications in Computer Science.

[3]  D. Artz,et al.  Digital steganography: hiding data within data , 2001 .

[4]  Wei Liu,et al.  Digital image encryption algorithm based on chaos and improved DES , 2009, 2009 IEEE International Conference on Systems, Man and Cybernetics.

[5]  Niels Provos,et al.  Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..

[6]  J. Krenn,et al.  Steganography and Steganalysis , 2006 .

[7]  Faudziah Ahmad,et al.  A Competitive Study of Cryptography Techniques over Block Cipher , 2011, 2011 UkSim 13th International Conference on Computer Modelling and Simulation.

[8]  Publisher Kunderi Mahaboob,et al.  Computer Technology and Application , 2014 .

[9]  Edward F. Schaefer A Simplified Data Encryption Standard Algorithm , 1996, Cryptologia.

[10]  Merrill Warkentin,et al.  Steganography and Steganalysis , 2006 .

[11]  Saeed Reza Khosravirad,et al.  Higher-order statistical steganalysis of random LSB steganography , 2009, 2009 IEEE/ACS International Conference on Computer Systems and Applications.

[12]  Jasmin Cosic,et al.  Steganography and steganalysis - does local web sites contain “Stego” contents? , 2010, Proceedings ELMAR-2010.

[13]  Huayong Ge,et al.  Steganography and steganalysis based on digital image , 2011, 2011 4th International Congress on Image and Signal Processing.

[14]  Yambem Jina Chanu,et al.  A short survey on image steganography and steganalysis techniques , 2012, 2012 3rd National Conference on Emerging Trends and Applications in Computer Science.

[15]  Akhil Kaushik,et al.  Block Encryption Standard for Transfer of data , 2010, 2010 International Conference on Networking and Information Technology.

[16]  Alice E. Marwick,et al.  Social Privacy in Networked Publics: Teens’ Attitudes, Practices, and Strategies , 2011 .

[17]  J. Thomas Leontin Philjon,et al.  Metamorphic cryptography — A paradox between cryptography and steganography using dynamic encryption , 2011, 2011 International Conference on Recent Trends in Information Technology (ICRTIT).

[18]  Abhishek Gupta,et al.  Data hiding in color image using cryptography with help of ASK algorithm , 2011, 2011 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC).

[19]  K. L. Shunmuganathan,et al.  Steganography using edge adaptive image , 2012, 2012 International Conference on Computing, Electronics and Electrical Technologies (ICCEET).

[20]  Rosziati Ibrahim,et al.  Steganography Algorithm to Hide Secret Message inside an Image , 2011, ArXiv.

[21]  V. Meena,et al.  Seeable visual but not sure of it , 2012, IEEE-International Conference On Advances In Engineering, Science And Management (ICAESM -2012).

[22]  J. Mielikainen LSB matching revisited , 2006, IEEE Signal Processing Letters.

[23]  Mengmeng Wang,et al.  Digital image encryption algorithm based on pixels , 2010, 2010 IEEE International Conference on Intelligent Computing and Intelligent Systems.

[24]  Guy-Armand Yandji,et al.  Research on a Normal File Encryption and Decryption , 2011, 2011 International Conference on Computer and Management (CAMAN).

[25]  N. Xuan,et al.  Digital image encryption algorithm based on chaos and improved DES , 2009, 2009 IEEE International Conference on Systems, Man and Cybernetics.

[26]  S. Kannan,et al.  Secured secret color image sharing with steganography , 2012, 2012 International Conference on Recent Trends in Information Technology.

[27]  Jiwu Huang,et al.  Edge Adaptive Image Steganography Based on LSB Matching Revisited , 2010, IEEE Transactions on Information Forensics and Security.

[28]  K.R. Venugopal,et al.  Authentication of secret information in image Steganography , 2008, TENCON 2008 - 2008 IEEE Region 10 Conference.