A novel approach for dual layer security of message using Steganography and Cryptography

被引:4
作者
Bansal, Reena [1 ]
Badal, Neelendra [2 ]
机构
[1] Hindustan Aeronaut Ltd Sch, Amethi, UP, India
[2] Rajkiya Engn Coll, Bijnor, UP, India
关键词
Information security; Data hiding; Data embedding; Elliptic Curve Cryptography; LSB Inversion; Cryptography; Steganography; Histogram etc;
D O I
10.1007/s11042-022-12084-y
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
It is well known that the world is becoming more interconnected with the help of World Wide Web in distributed environment. Persons and Organizations want to share their valuable information over World Wide Web through internet in reliable and secure manner. The Steganography is an elegant strategy to pass on the private data to an approved beneficiary with the most solid wellbeing measure which prompts maintaining a strategic distance from the breaks of information security. These days the meaning of taking solid assurance measures in information correspondence medium has a difficult undertaking on account of security issues created by unapproved intercession. This introduction expects to provide another methodology dependent on a combination of Cryptography and Steganography system to hide the secret information into a cover object (Image, Text, Video etc.) with an improved level of security. In proposed methodology, the Elliptic Curve Cryptography (ECC) is used to encode the secret data and LSB Inversion method for embedding the scrambled information into a cover object. Proposed methodology based on two different techniques has achieved some fundamental characteristics known as information classification, respectability check, limit and heartiness which are the proof of successful execution of this proposed methodology. This new methodology strongly tried through a few steganalysis assaults like investigation of Chi-square, Visual and Histogram. Results show that stego picture has strong resistance power against all assaults.
引用
收藏
页码:20669 / 20684
页数:16
相关论文
共 31 条
[1]  
[Anonymous], INFORM HIDING APPL
[2]  
[Anonymous], INFORM MED UNLOCKED
[3]   A fast and secure image hiding scheme based on LSB substitution [J].
Chang, CC ;
Lin, MH ;
Hu, YC .
INTERNATIONAL JOURNAL OF PATTERN RECOGNITION AND ARTIFICIAL INTELLIGENCE, 2002, 16 (04) :399-416
[4]  
Das R, 2019, COMPUT SYST SCI ENG, V34, P23
[5]  
Desoky Abdelrahman, 2008, Journal of Digital Forensic Practice, V2, P132, DOI 10.1080/15567280802558818
[6]  
HSU CH, 2018, J AMB INTEL HUM COMP, P111
[7]  
Kekre HB, 2009, P ACM INT C ADV COMP, P342
[8]   Cloud and IoT based disease prediction and diagnosis system for healthcare using Fuzzy neural classifier [J].
Kumar, Priyan Malarvizhi ;
Lokesh, S. ;
Varatharajan, R. ;
Babu, Gokulnath Chandra ;
Parthasarathy, P. .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 86 :527-534
[9]   A steganographic method for digital images with four-pixel differencing and modified LSB substitution [J].
Liao, Xin ;
Wen, Qiao-yan ;
Zhang, Jie .
JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2011, 22 (01) :1-8
[10]   RETRACTED: An Automatic Tamil Speech Recognition system by using Bidirectional Recurrent Neural Network with Self-Organizing Map (Retracted article. See vol. 35, pg. 3575, 2023) [J].
Lokesh, S. ;
Kumar, Priyan Malarvizhi ;
Devi, M. Ramya ;
Parthasarathy, P. ;
Gokulnath, C. .
NEURAL COMPUTING & APPLICATIONS, 2019, 31 (05) :1521-1531