Modified BPCS steganography using Hybrid cryptography for improving data embedding capacity

In today's information age, information sharing and transfer has increased exponentially. The threat of an intruder accessing the secret information has been an ever existing concern for data communication experts. Cryptography and steganography are the most widely used techniques to overcome this threat. This paper is based on hybrid cryptographic techniques based on DES and RSA algorithms to achieve data encryption and compression technique to store large amount of data. A combination of both provides superior security control. The suggested algorithm is modified BPCS (Bit Plane Complexity Segmentation) steganography technique that can replace all the “noise-like” regions in all the bit-planes of the cover image with secret data without deteriorating the image quality. According to the experiments, the messages can be successfully camouflaged in the cover image, and the stego images have satisfactory quality. Moreover, our scheme allows for a large capacity of embedded secret data and can be extracted from stego-image without the assistance of original image.

[1]  Souvik Bhattacharyya,et al.  A Novel Approach to Develop a Secure Image based Steganographic Model using Integer Wavelet Transform , 2010, 2010 International Conference on Recent Trends in Information, Telecommunication and Computing.

[2]  M. S. Sutaone,et al.  Image based steganography using LSB insertion technique , 2008 .

[3]  Hongyang Chao,et al.  (N, 1) secret sharing approach based on steganography with gray digital images , 2010, 2010 IEEE International Conference on Wireless Communications, Networking and Information Security.

[4]  Eiji Kawaguchi,et al.  Principles and applications of BPCS steganography , 1999, Other Conferences.

[5]  Manav Rachna,et al.  High Capacity Filter Based Steganography , 2009 .

[6]  Zhang Hanling,et al.  Image Steganography Using Pixel-Value Differencing , 2009, 2009 Second International Symposium on Electronic Commerce and Security.

[7]  Robert G. Gallager,et al.  Variations on a theme by Huffman , 1978, IEEE Trans. Inf. Theory.

[8]  M. S. Sutaone,et al.  Image based steganography using LSB insertion , 2008 .

[9]  Chin-Chen Chang,et al.  Data Hiding in Images by Hybrid LSB Substitution , 2009, 2009 Third International Conference on Multimedia and Ubiquitous Engineering.

[10]  Wuling Ren,et al.  A Hybrid Encryption Algorithm Based on DES and RSA in Bluetooth Communication , 2010, 2010 Second International Conference on Modeling, Simulation and Visualization Methods.

[11]  A. Touir,et al.  A New Image Steganography Technique , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.

[12]  Ross J. Anderson,et al.  On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..

[13]  Gandharba Swain,et al.  A hybrid approach to steganography embedding at darkest and brightest pixels , 2010, 2010 International Conference on Communication and Computational Intelligence (INCOCCI).

[14]  Behrouz A. Forouzan Cryptography & Network Security , 2007 .

[15]  B. Mehboob,et al.  A stegnography implementation , 2008, 2008 International Symposium on Biometrics and Security Technologies.