New Data Hiding Technique in Encrypted Image: DKL Algorithm (Differing Key Length)

Abstract This paper introduces a new technique to increase the information security over the network using steganography in such a way that the secret message being sent is unidentifiable. There is a comparison made to give a clear view of how the algorithm proposed is better than LSB algorithm which is used since a long time for sending concealed messages. To avoid the chances of an attacker using steganalysis to retrieve the data, the data encryption is done. S-tool is used to show the reliability of this algorithm. We will be comparing both LSB and DKL algorithms on the basis of Mean Square Error, Peak Signal Noise Ratio, Relative Payload and Rate of Embedding. Here by its shown that DKL algorithm is more efficient than LSB algorithm.

[1]  D. Artz,et al.  Digital steganography: hiding data within data , 2001 .

[2]  Nasir D. Memon,et al.  Performance study of common image steganography and steganalysis techniques , 2006, J. Electronic Imaging.

[3]  Mark Chapman,et al.  Hiding the Hidden: A software system for concealing ciphertext as innocuous text , 1997, ICICS.

[4]  Eric Cole,et al.  Hiding in Plain Sight: Steganography and the Art of Covert Communication , 2003 .

[5]  Andreas Westfeld,et al.  F5-A Steganographic Algorithm , 2001, Information Hiding.

[6]  Daisy Jacobs,et al.  Implementation of LSB Steganography and Its Evaluation for Various Bits , 2007, 2006 1st International Conference on Digital Information Management.

[7]  Moazzam Hossain,et al.  Variable rate Steganography in gray scale digital images using neighborhood pixel information , 2009, 2009 12th International Conference on Computers and Information Technology.

[8]  Dipti Kapoor Sarmah,et al.  Proposed System for data hiding using Cryptography and Steganography Proposed System for data hiding using Cryptography and Steganography , 2010, ArXiv.

[9]  Jan H. P. Eloff,et al.  An overview of image steganography , 2005, ISSA.

[10]  Manuel Blum,et al.  Toward a theory of steganography , 2004 .

[11]  Sos S. Agaian,et al.  Key Dependent Covert Communication System Using Fibonacci P-Codes , 2007, 2007 IEEE International Conference on System of Systems Engineering.

[12]  R. Sridevi,et al.  EFFICIENT METHOD OF AUDIO STEGANOGRAPHY BY MODIFIED LSB ALGORITHM AND STRONG ENCRYPTION KEY WITH ENHANCED SECURITY , 2009 .

[13]  Sushil Jajodia,et al.  Information Hiding: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking - Attacks and Countermeasures , 2000, IH 2012.

[14]  Anastasios Tefas,et al.  A survey on watermarking application scenarios and related attacks , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).

[15]  David Kahn,et al.  The History of Steganography , 1996, Information Hiding.

[16]  Ross J. Anderson Stretching the Limits of Steganography , 1996, Information Hiding.