Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2020, International Journal of Emerging Trends in Engineering Research
https://doi.org/10.30534/ijeter/2020/63842020…
7 pages
1 file
Information Security has always been a very substantial facet when it comes to hindering unauthorised access, destruction or inspection of confidential data. Today every field in the world makes use of multimedia information like image, video, or audio and the file transmitted. To serve data security cryptography and steganography are mainly used techniques, each of them had a problem. Cryptography is that the art of saving information by encrypting it into an obscure format. On the opposite hand, steganography is that the art and science of secret communication to send messages during a way which hides even the existence of the communication. This paper provides a mixed system design utilizing cryptography and steganography techniques to provide a reliable communication system capable of resisting attackers. The affine cipher is used in this paper to encrypt the hidden text message which provides an effective level of security. After that, combining the techniques of Discrete Cosine Transform (DCT) and Least Significant Bit (LSB) cryptography is utilized to mask encrypted messages inside the image. The achievement of the built structure is measured using the value of Mean Square Error (MSE), Peak signal to noise ratio (PSNR) value, and analysis of histograms. The results indicate the system designed offers a noble security level.
Information Security has always been a very substantial facet when it comes to hindering unauthorised access, destruction or inspection of confidential data. Today every field in the world makes use of multimedia information like image, video, or audio and the file transmitted. To serve data security cryptography and steganography are mainly used techniques, each of them had a problem. Cryptography is that the art of saving information by encrypting it into an obscure format. On the opposite hand, steganography is that the art and science of secret communication to send messages during a way which hides even the existence of the communication. This paper provides a mixed system design utilizing cryptography and steganography techniques to provide a reliable communication system capable of resisting attackers. The affine cipher is used in this paper to encrypt the hidden text message which provides an effective level of security. After that, combining the techniques of Discrete Cosine Transform (DCT) and Least Significant Bit (LSB) cryptography is utilized to mask encrypted messages inside the image. The achievement of the built structure is measured using the value of Mean Square Error (MSE), Peak signal to noise ratio (PSNR) value, and analysis of histograms. The results indicate the system designed offers a noble security level.
2015
Secure transmissions of information become a critical issue in the digital world with the growing importance of the internet. Cryptography and steganography helps in providing this much-needed data confidentiality. This research presented an improved steganographic method for hiding secure data. The proposed system is incorporating of text encryption, steganography and data compression based on an efficient keystream generator. In the first step, the secret data has been encrypted using stream cipher. This cipher text is embedded into BMP image format cover using pseudorandom keystream generator as a private key. Then the image file transmitted is compressed by using discrete cosine transform to obtain the JPEG image format. The experimental results show that the proposed method is provide improved robustness, security due to multi-level security and the use of the efficient keystream generator increases the complexity of the encryption process.
2017 International Conference on Innovative and Creative Information Technology (ICITech), 2017
Sending image in a plain form has a high risk for the data being vulnerable to steal. Thus, due to reducing the risk, data security techniques should be implemented. Data security techniques can be done using Cryptography and Steganography. Based on the literature, the combination of cryptography and steganography can enhance results. Cryptography as one of science in information security, which used in the process of securing image. One of the cryptographic methods that have been used to secure the data is Data Encryption Standard (DES). This algorithm often implemented for the encryption process in an ATM machine and SIM card operator worldwide. Our proposed method firstly encrypts the image message using DES encryption. This process produces visible data, which is caused suspicion by others. In this paper, to conceal the encrypted image, we used steganography method. Our experiment chooses Least Significant Bit (LSB) based on canny edge detection. LSB algorithm was chosen because it is simple to be implemented and has good imperceptible value. Then, canny edge detection used to determines the coordinates of the object's edges of the cover image. We utilize the Canny coordinate result as the position to embed the image message because of the results more accurate and it can improve imperceptibility. Our experimental results were measured using Mean Square Error (MSE) and Peak Signal to Noise Ratio (PSNR). From the measurement, results obtained the best MSE value is 0.0038557 and PSNR are 72.2698 dB.
2020
Advancement in technology have brought about several sophisticated devices, using electronic media communication is more prone to attacks than communicating over traditional channels. While the traditional communication systems were insecure, it was rather more difficult to intercept communication without the communicating parties without the realization of the owner of the information being sent, due to either breaking of the seal to find out the content, or harm to the courier carrier. The message is open to all, once inserted into the shared network, or sent to the receiver from the sender, and moreover completely insecure. The message being sent must also conform to network security convention confidentiality, integrity, authentication and availability. In this paper, we followed some objectives in which we hid the message or a secret data into an image which acts as cover medium using LSB technique and how information exchange can be carried out using symmetric key based stegan...
Our modern world has witnessed a revolution in the digital information, which has their impact upon our societies and lives. On the other hand, many challenges have arisen embedded in the easy access for this information and revealing them, especially if we know that part of them is very important and needs pr otection as well as secrecy for various reasons. For protecting most of such information and da ta, which require secrecy, the need for inventing protection systems has become necessary, amongst them our research that deals with the studying and constructing a proposed system for this task. In guaranteeing more secrecy for such data and the difficulty in detecting them, the researcher trey to propose a system, which depends upon combining steganography with encryption in order to add more security layers. Our research, therefore, tries to support the secrecy of data and information the researcher wish to send with great secrecy that make them difficult to be detected or, at least, to hinder their detection for a long time in which they lose their importance. Our proposed system depends upon pr eparing the image's data for the next step (DCT Quantization) through steganographic process and using two levels of security: the RSA algorithm and the digital signature, then storing the image in a JPEG form at. In this case, the secret message will be looked as plain text with digital signature, while the cover is coloured image. Then, the results of the algorithm are submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm and its activity. Thus, the proposed algorithm for this research can be divided into two main parts: hiding th e text of the sender, and extracting it by the receiver. More over, part can be divided into many procedures done by the program Delphi 5.
Computer Engineering and Intelligent Systems, 2015
In the present scenario the use of images increased extremely in the cyber world so that we can easily transfer data with the help of these images in a secured way. Image steganography becomes important in this manner. Steganography and cryptography are the two techniques that are often confused with each other. The input and output of steganography looks alike, but for cryptography the output will be in an encrypted form which always draws attraction to the attacker. This paper combines both steganography and cryptography so that attacker doesn’t know about the existence of message and the message itself is encrypted to ensure more security. The textual data entered by the user is encrypted using AES algorithm. After encryption, the encrypted data is stored in the colour image by using a hash based algorithm. We have proposed a novel algorithm for mixing the AES ciphertext and the SHA-512 hash obtained from plaintext, which is embedded into an image so that the attacker cannot sepa...
2018
Electronic medical records (EMR) are vital information, extremely sensitive private data in healthcare, and need to be frequently shared via the internet among peers. One of the major benefits derived from the internet is the ease of sending information from one system to another, irrespective of the location or distance between the nodes. This, and many other related important functionality, over the years, has attracted attackers who dedicate themselves to breaching the integrity, availability and confidentiality of EMR information. Existing literature have proposed cryptographic techniques that are not quantum-safe. In this paper, an audiobased system for hiding EMR information using a quantumsafe cryptographic technique, Nth degree Truncated Polynomial Ring Units (NTRU) cryptosystem, and the Least Significant Bit (LSB) steganographic technique is proposed. The system was evaluated based on embedding capacity (EC), peak signal to noise ratio (PSNR), mean square error (MSE), and h...
IOSR Journal of Computer Engineering, 2014
In this information era, digital information sharing and transfer plays a vital role and their use has increased exponentially with the development of technology. Thus providing security of data is a topic of concern. Data hiding is a powerful tool that provides mechanism for securing data over insecure channel by concealing information within information. Steganography inherits data hiding concept and passes information through host files in such a way that the existence of the embedded secret is unknown. This paper presents a joint application of compression, encryption and embedding techniques for implementing digital image steganography. Compression technique generates noise in the image. Inorder to retain the noise distortion to a minimum level, LSB insertion method is used for embedding purpose where the bits are inserted at the last 2 LSB's of the image. In this proposed technique the secret information is initially compressed and then the resultant bits are encrypted. Finally these encrypted bits are embedded into an image. The main objective is to develop an application that increases the steganographic capacity and enhances the stego image quality while keeping the security intact.
Indonesian Journal of Electrical Engineering and Computer Science
Recently, there is increasing interest in data transfer between many different devices. Data must be encrypted before being sent so that the intended receiver can only read it to prevent unauthorized access and processing of a secret message. This paper suggests two levels of security to secure import messages that are sent via the internet. A secret text is encrypted by a Blowfish algorithm, then the secret text is hidden in an image by the least significant bit (LSB) technique. The LSB method of concealing important information was developed to conceal at least the first of at least two bits, depending on the cover data. The resolution of an image is raised in our work where the sender selects a stego image with a high peak signal to noise ratio (PSNR). The receiver knows all the necessary information for decoding by the first nine pixels. The PSNR is used for evaluating the resolution of the image to check robustness at sending. The number of PSNR illustrates in our proposal that...
International Journal of Multidisciplinary Thought, 2018
Tránsitos y resistencias. Ontologías de la historia., 2017
Lumbung Inovasi: Jurnal Pengabdian kepada Masyarakat
BioSocieties
Resenha Eleitoral - revista técnica, 2014
Sosiohumaniora, 2010
Editorial Tirant Humanidades, 2020
Microelectromechanical Systems, 2002
Information & Communications Technology Law, 2017
The Journal of Rehabilitation Research and Development, 2004
Journal of British Cinema and …, 2010
Zelenilo grada Zagreba, 2013
2016
Journal of the American Chemical Society, 2008
Iranica Journal of Energy & Environment, 2012
ACS Nano, 2020
Journal of Neurology, Neurosurgery & Psychiatry, 2014
The Journal of Spinal Surgery, 2015