Encrypted Transfer of Confidential Information Using Steganography and Identity Verification Using Face Data

In last few years, information security has become a significant part of data communication. In order to address this crucial point in data communication to secure the confidential data, steganography and cryptography can be combined to give better results. Steganography is a practice to hide any confidential or sensitive information into another information that plays as the cover for the information, adding a layer of security on top of science of secret writing, known as cryptography. In this paper, we discuss an improved LSB steganography technique to optimize the algorithm hiding the bits in different channels selected dynamically using key. We further propose a platform leveraging cryptographic algorithms and verification using face data in pipeline to help keep data more secure.

[1]  Shiva Saxena,et al.  Image steganography using AES encryption and least significant nibble , 2016, 2016 International Conference on Communication and Signal Processing (ICCSP).

[2]  Umesh Ghanekar,et al.  Image steganography based on Canny edge detection, dilation operator and hybrid coding , 2018, J. Inf. Secur. Appl..

[3]  Naveen Kumar Gondhi,et al.  A comparative analysis on various face recognition techniques , 2017, 2017 International Conference on Intelligent Computing and Control Systems (ICICCS).

[4]  Soumen Bhowmik,et al.  A new approach in color image steganography with high level of perceptibility and security , 2016, 2016 International Conference on Intelligent Control Power and Instrumentation (ICICPI).

[5]  Daisy Jacobs,et al.  Implementation of LSB Steganography and Its Evaluation for Various Bits , 2007, 2006 1st International Conference on Digital Information Management.

[6]  Md. Ismail Hossain,et al.  A new approach for LSB based image steganography using secret key , 2011, 14th International Conference on Computer and Information Technology (ICCIT 2011).

[7]  Sahar A. El-Rahman,et al.  A comparative analysis of image steganography based on DCT algorithm and steganography tool to hide nuclear reactors confidential information , 2016, Comput. Electr. Eng..

[8]  Smita Kasar,et al.  Security Improvisation in Steganography using AES 128/192/256 , 2014 .

[9]  Ainuddin Wahid Abdul Wahab,et al.  Image steganography in spatial domain: A survey , 2018, Signal Process. Image Commun..