Abstract
Information security has been one of the prominent fields due to the concerns regarding it, for the past few decades. Any loopholes in these may lead to dire consequences depending upon the importance of the message being transmitted. Thus there have emerged many techniques for this purpose, one such is crypto steganography which has been implemented in this paper, our algorithm uses a combination of Advanced Encryption Standard (AES) and columnar block ciphers to encrypt message and embedding it into the image using 1-Least Significant Bit (1-LSB) method and the reverse is done to get the data back at the other end. Hence this algorithm adds another layer of security with strong encryption techniques while maintaining the structure of the image. There is low distortion in the image with Mean Squared Error (MSE) as 0.028, Peak Signal-to-Noise Ratio (PSNR) as 63.719 and Structural Similarity Index (SSIM) values as 0.999 for png image and 0.044, 61.728, 0.999 respectively for bmp image.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
van Oorschot, P.C.: Security concepts and principles. In: van Oorschot, P.C. (ed.) Computer Security and the Internet: Tools and Jewels from Malware to Bitcoin, pp. 1–28. Springer International Publishing, Cham (2021). https://doi.org/10.1007/978-3-030-83411-1_1
Jakobsson, M., Yung, M., Zhou, J. (eds.): ACNS 2004. LNCS, vol. 3089. Springer, Heidelberg (2004). https://doi.org/10.1007/b98360
Biswas, C., Gupta, U.D., Haque, M.M.: A hierarchical key derivative symmetric key algorithm using digital logic. In: 2017 International Conference on Electrical, Computer and Communication Engineering (ECCE), pp. 604–609. IEEE (Feb 2017). https://doi.org/10.1109/ECACE.2017.7912976
Diffie, W., Hellman, M.E.: New directions in cryptography. In: Secure Communications and Asymmetric Cryptosystems, pp. 143–180. Routledge (2019)
Cheddad, A., Condell, J., Curran, K., Kevitt, P.M.: Digital image steganography: survey and analysis of current methods. Signal Process. 90(3), 727–752 (2010). https://doi.org/10.1016/j.sigpro.2009.08.010
Taha, M.S., Rahim, M.S.M., Lafta, S.A., Hashim, M.M., Alzuabidi, H.M.: Combination of steganography and cryptography: a short survey. IOP Conf. Ser.: Mater. Sci. Eng. 518(5), 052003 (2019). https://doi.org/10.1088/1757-899X/518/5/052003
Jung, K.H.: A study on machine learning for steganalysis. In: Proceedings of the 3rd International Conference on Machine Learning and Soft Computing, pp. 12–15 (Jan 2019)
Hureib, E.S., Gutub, A.A.: Enhancing medical data security via combining elliptic curve cryptography and image steganography. Int. J. Comput. Sci. Netw. Secur. (IJCSNS) 20(8), 1–8 (2020)
Hureib, E.S.B., Gutub, A.A.: Enhancing medical data security via combining elliptic curve cryptography with 1-LSB and 2-LSB image steganography. Int. J. Comp. Sci. Netw. Secur. (IJCSNS) 20(12), 232–241 (2020)
Biswas, C., Gupta, U.D., Haque, M.M.: An efficient algorithm for confidentiality, integrity and authentication using hybrid cryptography and steganography. In: 2019 International Conference on Electrical, Computer and Communication Engineering (ECCE), pp. 1–5. IEEE (Feb 2019)
Alsaffar, Q.S., Mohaisen, H.N., Almashhdini, F.N.: An encryption based on DNA and AES algorithms for hiding a compressed text in colored Image. IOP Conf. Ser.: Mater. Sci. Eng. 1058(1), 012048 (2021). https://doi.org/10.1088/1757-899X/1058/1/012048
Hassoon, N.H., Ali, R.A., Abed, H.N., Alkhazraji, A.A.J.: Multilevel hiding text security using hybrid technique steganography and cryptography. Int. J. Eng. Technol. 7(4), 3674–3677 (2018)
Wai, Y.Y., Myat, E.E.: Comparison of LSB, MSB and New Hybrid (NHB) of steganography in digital image. Int. J. Eng. Trends Appl. 5(4), 16–19 (2018)
Saravanan, M., Priya, A.: An algorithm for security enhancement in image transmission using steganography. Journal of the Institute of Electronics and Computer 1(1), 1–8 (2019)
Jassim, K.N., et al.: Hybrid cryptography and steganography method to embed encrypted text message within image. J. Phys. Conf. Ser. 1339(1), 012061 (2019). https://doi.org/10.1088/1742-6596/1339/1/012061
Abbas, M.S., Mahdi, S.S., Hussien, S.A.: Security improvement of cloud data using hybrid cryptography and steganography. In: 2020 International Conference on Computer Science and Software Engineering (CSASE), pp. 123–127. IEEE (Apr 2020)
Patel, N., Oza, P., Agrawal, S.: Homomorphic cryptography and its applications in various domains. In: Bhattacharyya, S., Hassanien, A.E., Gupta, D., Khanna, A., Pan, I. (eds.) International Conference on Innovative Computing and Communications. LNNS, vol. 55, pp. 269–278. Springer, Singapore (2019). https://doi.org/10.1007/978-981-13-2324-9_27
Oza, P., Kathrecha, V., Malvi, P.: Encryption algorithm using rubik’s cube principle for secure transmission of multimedia files. In: Third International Conference on Multidisciplinary Research and Practice IJRSI, vol. 4, pp. 239–243 (2016)
Shah, Y., Joshi, S., Oza, P., Agrawal, S.: An insight of information security: a skeleton. Int. J. Recent Technol. Eng. (IJRTE) 8(3), 2600–2605 (2019). https://doi.org/10.35940/ijrte.C4922.098319
Sharma, K., Aggarwal, A., Singhania, T., Gupta, D., Khanna, A.: Hiding data in images using cryptography and deep neural network. arXiv preprint arXiv:1912.10413 (2019)
Wang, Z., Bovik, A.C., Sheikh, H.R., Simoncelli, E.P.: Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Process. 13(4), 600–612 (2004)
Al-Afandy, K.A., Faragallah, O.S., ELmhalawy, A., El-Rabaie, E.S.M., El-Banby, G.M.: High security data hiding using image cropping and LSB least significant bit steganography. In: 2016 4th IEEE International Colloquium on Information Science and Technology (CiSt), pp. 400–404. IEEE (Oct 2016)
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Shah, H., Oza, P., Agrawal, S. (2022). Data Encryption Approach Using Hybrid Cryptography and Steganography with Combination of Block Ciphers. In: Rajagopal, S., Faruki, P., Popat, K. (eds) Advancements in Smart Computing and Information Security. ASCIS 2022. Communications in Computer and Information Science, vol 1760. Springer, Cham. https://doi.org/10.1007/978-3-031-23095-0_4
Download citation
DOI: https://doi.org/10.1007/978-3-031-23095-0_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-23094-3
Online ISBN: 978-3-031-23095-0
eBook Packages: Computer ScienceComputer Science (R0)