Security Improvisation in Image Steganography using DES

被引:0
作者
Ramaiya, Manoj Kumar [1 ]
Hemrajani, Naveen [1 ]
Saxena, Anil Kishore [2 ]
机构
[1] Suresh Gyanvihar Univ, Dept Comp Engn, Jaipur, Rajasthan, India
[2] Shri Ram Coll Engn & Mgmt, Dept Comp Sci & Engn, Gwalior, India
来源
PROCEEDINGS OF THE 2013 3RD IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC) | 2013年
关键词
Steganography; DES; S-Box; LSB Technique; Cryptography; Preprocessing of Secrete Image;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The incredible evolution of Internet technologies & its applications require high level the security of data over the communication channel. Image steganography is a digital technique for concealing information into a cover image. Least Significant-Bit (LSB) based approach is most popular steganographic technique in spatial domain due to its simplicity and hiding capacity. All of existing methods of steganography focus on the embedding strategy with less consideration to the pre-processing, such as encryption of secrete image. The conventional algorithm does not provide the preprocessing required in image based steganography for better security, as they do not offer flexibility, robustness and high level of security. The proposed work presents a unique technique for Image steganography based on the Data Encryption Standard (DES) using the strength of S-Box mapping & Secrete key. The preprocessing of secrete image is carried by embedding function of the steganography algorithm using two unique S-boxes. The preprocessing provide high level of security as extraction is not possible without the knowledge of mapping rules and secrete key of the function. Additionally the proposed scheme is capable of not just scrambling data but it also changes the intensity of the pixels which contributes to the safety of the encryption.
引用
收藏
页码:1094 / 1099
页数:6
相关论文
共 14 条
  • [1] Digital steganography: Hiding data within data
    Artz, D
    [J]. IEEE INTERNET COMPUTING, 2001, 5 (03) : 75 - 80
  • [2] Chanu Yambin Jina, 2012, IEEE T SCI MANAGEMEN, P709
  • [3] Cosic Jasmin, 2009, 52 IEEE T INT S ELMA, P85
  • [4] Ge Huayong, 2011, 2011 4th International Congress on Image and Signal Processing (CISP 2011), P252, DOI 10.1109/CISP.2011.6099953
  • [5] Higher-order Statistical Steganalysis of Random LSB Steganography
    Khosravirad, Saeed R.
    Eghlidos, Taraneh
    Ghaemmaghami, Shahrokh
    [J]. 2009 IEEE/ACS INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, VOLS 1 AND 2, 2009, : 629 - 632
  • [6] Edge Adaptive Image Steganography Based on LSB Matching Revisited
    Luo, Weiqi
    Huang, Fangjun
    Huang, Jiwu
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2010, 5 (02) : 201 - 214
  • [7] LSB matching revisited
    Mielikainen, J
    [J]. IEEE SIGNAL PROCESSING LETTERS, 2006, 13 (05) : 285 - 287
  • [8] Moerland T., Steganography and steganalysis, Leiden Institute of advanced computing science
  • [9] Nag Amitava, IEEE T INT C ADV ENG
  • [10] Provos N., 2003, IEEE Security & Privacy, V1, P32, DOI 10.1109/MSECP.2003.1203220