A Dynamic Approach to Image Steganography Using the Three Least Significant Bits and Extended Hill Cipher

被引:8
作者
Swain, Gandharba [1 ]
Lenka, Saroj Kumar [2 ]
机构
[1] GMR Inst Technol, Dept Informat Technol, Srikakulam 532127, Andhra Pradesh, India
[2] Deemed Univ, MITS, Dept Comp Sci & Engn, Lakshmangarh 332311, Rajasthan, India
来源
MEMS, NANO AND SMART SYSTEMS, PTS 1-6 | 2012年 / 403-408卷
关键词
Steganography; Cryptography; Encryption; Decryption; Embedding; Hill cipher; Modular arithmetic inverse;
D O I
10.4028/www.scientific.net/AMR.403-408.842
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper we propose a technique for secure communication between sender and receiver. We use both cryptography and steganography. We take image as the carrier to use steganography. We have extended the existing hill cipher to increase its robustness and used it as our cryptography algorithm. By using this extended hill cipher (a new block cipher) which uses a 128 bit key, we encrypt the secret message. Then the cipher text of the secret message is embedded into the carrier image in 6th, 7th and 8th bit locations of some of the selected pixels (bytes). The 8th bit in a pixel (byte) is called as the least significant bit (LSB). The pixel selection is done depending on the bit pattern of the cipher text. So for different messages the embedding pixels will be different. That means to know the pixels of the image where the cipher text is embedded we should know the cipher text bits. Thus it becomes a stronger steganography. As the pixels where we embed are chosen during the run time of the algorithm, so we say that it is dynamic steganography. After embedding the resultant image will be sent to the receiver, the receiver will apply the reverse process what the sender has done and get the secret message.
引用
收藏
页码:842 / +
页数:2
相关论文
共 15 条
[1]  
Al-Husainy Mohammed A. F., 2009, Journal of Computer Sciences, V5, P33, DOI 10.3844/jcs.2009.33.38
[2]   On the limits of steganography [J].
Anderson, RJ ;
Petitcolas, FAP .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1998, 16 (04) :474-481
[3]  
Eggers J.J., 2002, P SPIE SECURITY WATE, V4675, P1
[4]  
Kumar P. Mohan, 2007, ASIAN J INFORM TECHN, V6, P1023
[5]   Is image steganography natural? [J].
Martín, A ;
Sapiro, G ;
Seroussi, G .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2005, 14 (12) :2040-2050
[6]   Spread spectrum image steganography [J].
Marvel, LM ;
Boncelet, CG ;
Retter, CT .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 1999, 8 (08) :1075-1083
[7]  
Motameni H., 2007, P WORLD ACAD SCI ENG, V24, P349
[8]   Product perfect codes and steganography [J].
Rifa-Pous, H. ;
Rifa, J. .
DIGITAL SIGNAL PROCESSING, 2009, 19 (04) :764-769
[9]  
Stallings William, 2003, CRYPTOGRAPHY NETWORK, P37
[10]   Steganography on point-sampled geometry [J].
Wang, CM ;
Wang, PC .
COMPUTERS & GRAPHICS-UK, 2006, 30 (02) :244-254