Implementation and analysis of three steganographic approaches

Due to increasing the technologies security systems are very popular in many areas. The security of information can be achieved by using encryption and steganography. In cryptography, encrypted data is transmitted after transforming the other form instead of the original data. Contrast cryptography, information hiding process can be extended for protecting from the interesting of any attacker. This paper proposes the enhance security system by combining these two techniques. In this system, the encrypted message is embedded in a BMP image file. In proposed system, three LSB steganographic techniques have been implemented and analyzed. This proposed system intends for data confidentiality, data authentication and data integrity. This system not only enhances the security of data but also becomes more powerful mechanism. This system intends to support effective ways for protecting data. The primary goal of our system is to enhance the security of data and then to compare three steganographic techniques. Then we will use the optimized method for embedding. In this paper, we just present three steganographic approaches. In this system, data is encrypted with RC4 encryption algorithm and then embedded the encrypted text in the BMP image file using three steganogrpaphic methods.

[1]  Nabarun Bagchi,et al.  Secure BMP Image Steganography Using Dual Security Model (I.D.E.A, image intensity and Bit Randomization) and Max-Bit Algorithm , 2010 .

[2]  Saudi Arabia,et al.  A Novel Security Model Combining Cryptography and Steganography , 2004 .

[3]  William Stallings,et al.  Cryptography and network security , 1998 .

[4]  Osama S. Farag Allah,et al.  Encryption quality analysis of the RC5 block cipher algorithm for digital images , 2006 .

[5]  Ingrid Verbauwhede,et al.  On the high-throughput implementation of RIPEMD-160 hash algorithm , 2008, 2008 International Conference on Application-Specific Systems, Architectures and Processors.

[6]  Subariah Ibrahim,et al.  Information hiding using steganography , 2003, 4th National Conference of Telecommunication Technology, 2003. NCTT 2003 Proceedings..

[7]  Mamta Juneja,et al.  Designing of Robust Image Steganography Technique Based on LSB Insertion and Encryption , 2009, 2009 International Conference on Advances in Recent Technologies in Communication and Computing.

[8]  C.E. Goutis,et al.  Application of novel technique in RIPEMD-160 aiming at high-throughput , 2008, 2008 IEEE International Symposium on Industrial Electronics.

[9]  V. Thanasoulis,et al.  Application Of Novel Techniques In RIPEMD-160 Hash Function Aiming At High-Throughput , 2008 .

[10]  Neha Sharma AN ENCRYPTO-STEGO TECHNIQUE BASED SECURE DATA TRANSMISSION SYSTEM , 2005 .

[11]  H. B. Kekre,et al.  Increased Capacity of Information Hiding in LSB's Method for Text and Image , 2008 .

[12]  Erik Zenner Stream Cipher Criteria , 2006 .

[13]  Tung-Sang Ng,et al.  A unified architecture of MD5 and RIPEMD-160 hash algorithms , 2004, 2004 IEEE International Symposium on Circuits and Systems (IEEE Cat. No.04CH37512).

[14]  Ahmad Hamad,et al.  Evaluation of the RC4 Algorithm for Data Encryption , 2006, Int. J. Comput. Sci. Appl..