Nothing Special   »   [go: up one dir, main page]

Skip to main content

Data Encryption Approach Using Hybrid Cryptography and Steganography with Combination of Block Ciphers

  • Conference paper
  • First Online:
Advancements in Smart Computing and Information Security (ASCIS 2022)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1760))

Abstract

Information security has been one of the prominent fields due to the concerns regarding it, for the past few decades. Any loopholes in these may lead to dire consequences depending upon the importance of the message being transmitted. Thus there have emerged many techniques for this purpose, one such is crypto steganography which has been implemented in this paper, our algorithm uses a combination of Advanced Encryption Standard (AES) and columnar block ciphers to encrypt message and embedding it into the image using 1-Least Significant Bit (1-LSB) method and the reverse is done to get the data back at the other end. Hence this algorithm adds another layer of security with strong encryption techniques while maintaining the structure of the image. There is low distortion in the image with Mean Squared Error (MSE) as 0.028, Peak Signal-to-Noise Ratio (PSNR) as 63.719 and Structural Similarity Index (SSIM) values as 0.999 for png image and 0.044, 61.728, 0.999 respectively for bmp image.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 64.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 84.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. van Oorschot, P.C.: Security concepts and principles. In: van Oorschot, P.C. (ed.) Computer Security and the Internet: Tools and Jewels from Malware to Bitcoin, pp. 1–28. Springer International Publishing, Cham (2021). https://doi.org/10.1007/978-3-030-83411-1_1

    Chapter  Google Scholar 

  2. Jakobsson, M., Yung, M., Zhou, J. (eds.): ACNS 2004. LNCS, vol. 3089. Springer, Heidelberg (2004). https://doi.org/10.1007/b98360

    Book  Google Scholar 

  3. Biswas, C., Gupta, U.D., Haque, M.M.: A hierarchical key derivative symmetric key algorithm using digital logic. In: 2017 International Conference on Electrical, Computer and Communication Engineering (ECCE), pp. 604–609. IEEE (Feb 2017). https://doi.org/10.1109/ECACE.2017.7912976

  4. Diffie, W., Hellman, M.E.: New directions in cryptography. In: Secure Communications and Asymmetric Cryptosystems, pp. 143–180. Routledge (2019)

    Google Scholar 

  5. Cheddad, A., Condell, J., Curran, K., Kevitt, P.M.: Digital image steganography: survey and analysis of current methods. Signal Process. 90(3), 727–752 (2010). https://doi.org/10.1016/j.sigpro.2009.08.010

    Article  MATH  Google Scholar 

  6. Taha, M.S., Rahim, M.S.M., Lafta, S.A., Hashim, M.M., Alzuabidi, H.M.: Combination of steganography and cryptography: a short survey. IOP Conf. Ser.: Mater. Sci. Eng. 518(5), 052003 (2019). https://doi.org/10.1088/1757-899X/518/5/052003

    Article  Google Scholar 

  7. Jung, K.H.: A study on machine learning for steganalysis. In: Proceedings of the 3rd International Conference on Machine Learning and Soft Computing, pp. 12–15 (Jan 2019)

    Google Scholar 

  8. Hureib, E.S., Gutub, A.A.: Enhancing medical data security via combining elliptic curve cryptography and image steganography. Int. J. Comput. Sci. Netw. Secur. (IJCSNS) 20(8), 1–8 (2020)

    Google Scholar 

  9. Hureib, E.S.B., Gutub, A.A.: Enhancing medical data security via combining elliptic curve cryptography with 1-LSB and 2-LSB image steganography. Int. J. Comp. Sci. Netw. Secur. (IJCSNS) 20(12), 232–241 (2020)

    Google Scholar 

  10. Biswas, C., Gupta, U.D., Haque, M.M.: An efficient algorithm for confidentiality, integrity and authentication using hybrid cryptography and steganography. In: 2019 International Conference on Electrical, Computer and Communication Engineering (ECCE), pp. 1–5. IEEE (Feb 2019)

    Google Scholar 

  11. Alsaffar, Q.S., Mohaisen, H.N., Almashhdini, F.N.: An encryption based on DNA and AES algorithms for hiding a compressed text in colored Image. IOP Conf. Ser.: Mater. Sci. Eng. 1058(1), 012048 (2021). https://doi.org/10.1088/1757-899X/1058/1/012048

    Article  Google Scholar 

  12. Hassoon, N.H., Ali, R.A., Abed, H.N., Alkhazraji, A.A.J.: Multilevel hiding text security using hybrid technique steganography and cryptography. Int. J. Eng. Technol. 7(4), 3674–3677 (2018)

    Google Scholar 

  13. Wai, Y.Y., Myat, E.E.: Comparison of LSB, MSB and New Hybrid (NHB) of steganography in digital image. Int. J. Eng. Trends Appl. 5(4), 16–19 (2018)

    Google Scholar 

  14. Saravanan, M., Priya, A.: An algorithm for security enhancement in image transmission using steganography. Journal of the Institute of Electronics and Computer 1(1), 1–8 (2019)

    Article  Google Scholar 

  15. Jassim, K.N., et al.: Hybrid cryptography and steganography method to embed encrypted text message within image. J. Phys. Conf. Ser. 1339(1), 012061 (2019). https://doi.org/10.1088/1742-6596/1339/1/012061

    Article  Google Scholar 

  16. Abbas, M.S., Mahdi, S.S., Hussien, S.A.: Security improvement of cloud data using hybrid cryptography and steganography. In: 2020 International Conference on Computer Science and Software Engineering (CSASE), pp. 123–127. IEEE (Apr 2020)

    Google Scholar 

  17. Patel, N., Oza, P., Agrawal, S.: Homomorphic cryptography and its applications in various domains. In: Bhattacharyya, S., Hassanien, A.E., Gupta, D., Khanna, A., Pan, I. (eds.) International Conference on Innovative Computing and Communications. LNNS, vol. 55, pp. 269–278. Springer, Singapore (2019). https://doi.org/10.1007/978-981-13-2324-9_27

    Chapter  Google Scholar 

  18. Oza, P., Kathrecha, V., Malvi, P.: Encryption algorithm using rubik’s cube principle for secure transmission of multimedia files. In: Third International Conference on Multidisciplinary Research and Practice IJRSI, vol. 4, pp. 239–243 (2016)

    Google Scholar 

  19. Shah, Y., Joshi, S., Oza, P., Agrawal, S.: An insight of information security: a skeleton. Int. J. Recent Technol. Eng. (IJRTE) 8(3), 2600–2605 (2019). https://doi.org/10.35940/ijrte.C4922.098319

    Article  Google Scholar 

  20. Sharma, K., Aggarwal, A., Singhania, T., Gupta, D., Khanna, A.: Hiding data in images using cryptography and deep neural network. arXiv preprint arXiv:1912.10413 (2019)

  21. Wang, Z., Bovik, A.C., Sheikh, H.R., Simoncelli, E.P.: Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Process. 13(4), 600–612 (2004)

    Article  Google Scholar 

  22. Al-Afandy, K.A., Faragallah, O.S., ELmhalawy, A., El-Rabaie, E.S.M., El-Banby, G.M.: High security data hiding using image cropping and LSB least significant bit steganography. In: 2016 4th IEEE International Colloquium on Information Science and Technology (CiSt), pp. 400–404. IEEE (Oct 2016)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Parita Oza or Smita Agrawal .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Shah, H., Oza, P., Agrawal, S. (2022). Data Encryption Approach Using Hybrid Cryptography and Steganography with Combination of Block Ciphers. In: Rajagopal, S., Faruki, P., Popat, K. (eds) Advancements in Smart Computing and Information Security. ASCIS 2022. Communications in Computer and Information Science, vol 1760. Springer, Cham. https://doi.org/10.1007/978-3-031-23095-0_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-23095-0_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-23094-3

  • Online ISBN: 978-3-031-23095-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics