COMBINING JPEG STEGANOGRAPHY AND SUBSTITUTION ENCRYPTION FOR SECURE DATA C OMMUNICATION

The Internet is a method of communication to distribute information to the masses. Digital image are excellent carriers for hidden information. Steganography and cryptography are technologies that are used for secret and secured communications. In both the methods, secret message is exchanged between two groups, sender and receiver. The main purpose in cryptography is to make massage concept unintelligible, while steganography aims to hide secret message. We propose a method of combining steganography, cryptography for secret data communication. In this paper, we propose a high-performance JPEG steganography along with a substitution encryption methodology. This approach uses the discrete cosine transform (DCT) technique which used in the frequency domain for hiding data within image. It is very difficult to detect hidden message in frequency domain and for this reason we use steganography based on DCT. From the experimental results, we obtain that the proposed method has a larger message capacity. Experimental results show that the correlation and entropy values of the image with encrypted data before the insertion are similar to the values of correlation and entropy after the insertion thus reduces the chance of the confidential message being detected and enables secret communication. The image that contains the hidden data will be used by the receiver to reconstruct the same secret message after extracting it. The effectiveness of the proposed method has been estimated by computing Mean square error (MSE) and Peak Signal to Noise Ratio (PSNR). Experimental results show the method provides high security and the information is safe from various attacks.

[1]  Jie Zhang,et al.  A Novel Secure Communication Protocol Combining Steganography and Cryptography , 2011 .

[2]  Gustavus J. Simmons,et al.  Subliminal channels; past and present , 2010, Eur. Trans. Telecommun..

[3]  Jose L. Lopez-Bonilla Scaling Factor for RGB Images to Steganography Applications , 2009 .

[4]  Denis Pinkas,et al.  SESAME: The solution to security for open distributed systems , 1994, Comput. Commun..

[5]  A. J. Raphael,et al.  Cryptography and Steganography – A Survey , 2022 .

[6]  Chiang-Lung Liu,et al.  High-performance JPEG steganography using complementary embedding strategy , 2008, Pattern Recognit..

[7]  A. A. Zaidan,et al.  On the Differences between Hiding Information and Cryptography Techniques: An Overview , 2010 .

[8]  Ekta Walia,et al.  An Analysis of LSB & DCT based Steganography , 2010 .

[9]  Vasif V. Nabiyev,et al.  Distortion free geometry based secret image sharing , 2011, WCIT.

[10]  Nasir D. Memon,et al.  Performance study of common image steganography and steganalysis techniques , 2006, J. Electronic Imaging.

[11]  G. Athithan,et al.  An Automated Approach to Solve Simple Substitution Ciphers , 1993, Cryptologia.

[12]  Mandep Kaur,et al.  A Dynamic RGB Intensity Based Steganography Scheme , 2010 .

[13]  Kevin Knight,et al.  Attacking Letter Substitution Ciphers with Integer Programming , 2009, Cryptologia.

[14]  Andrew B. Watson,et al.  Perceptual optimization of DCT color quantization matrices , 1994, Proceedings of 1st International Conference on Image Processing.

[15]  William Stallings,et al.  Cryptography and network security , 1998 .

[16]  Sushil Jajodia,et al.  Exploring steganography: Seeing the unseen , 1998, Computer.

[17]  Maura Conway,et al.  Code wars: Steganography, signals intelligence, and terrorism , 2003 .

[18]  Ross J. Anderson,et al.  On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..

[19]  Andrew B. Watson,et al.  Image Compression Using the Discrete Cosine Transform , 1994 .

[20]  Abbas Cheddad,et al.  Digital Image Steganography , 2009 .

[21]  Mohammed Abbas Fadhil A Novel Steganography-Cryptography System , 2010 .

[22]  Bin Li,et al.  A Survey on Image Steganography and Steganalysis , 2011, J. Inf. Hiding Multim. Signal Process..

[23]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[24]  Bradley James Erickson,et al.  Irreversible Compression of Medical Images , 2002, Journal of Digital Imaging.

[25]  Niels Provos,et al.  Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..

[26]  Roland Anderson Cryptanalytig Properties of Short Substitution Ciphers , 1989, Cryptologia.

[27]  Atul Kahate Cryptography and Network Security , 2009 .

[28]  George W. Hart To decode short cryptograms , 1994, CACM.

[29]  J. Todd Book Review: Digital image processing (second edition). By R. C. Gonzalez and P. Wintz, Addison-Wesley, 1987. 503 pp. Price: £29.95. (ISBN 0-201-11026-1) , 1988 .

[30]  Chet Hosmer,et al.  Discovering Hidden Evidence , 2006, J. Digit. Forensic Pract..

[31]  Jianjun Wang,et al.  A steganographic method based upon JPEG and particle swarm optimization algorithm , 2007, Inf. Sci..