Security Enhancement System Based on the Integration of Cryptography and Steganography

Authors

  • Zin May Zaw
  • Su Wai Phyo

Keywords:

block-based transformation, Blowfish, LSB, correlation, entropy.

Abstract

Nowadays, due to the widespread use of data exchange in electronic way, the information security has become important in data storage and transmission. Lack of security makes many problems in security awareness applications. The two kinds of information that are widely used in daily communication are image and text. Steganography and cryptography are both ways to protect the data security against various attacks. Thus, this work focuses on the enhancement of not only image but also information security based on the combination of cryptography and steganography methods. From the cryptography point of view, image security is enhanced based on the combination of proposed block-based transformation and encryption technique. Firstly, the original image is transformed with proposed block-based transformation algorithm to obtain better robustness of image encryption. And then, the generated transformed image is encrypted by using Blowfish encryption algorithm. After getting the encrypted image, a steganography approach provides the data hiding system by using this encrypted image as a cover for information security. Moreover, to prove the advantages of using combination process (proposed transformation and Blowfish encryption) rather than single encryption, performance comparison is made by calculating the correlation and entropy of encrypted images generated by combination process and Blowfish encryption algorithm. 

References

M. V. Droogenbroech, R. Benedett, "Techniques for a selective encryption of uncompressed and compressed images," In ACIVS'02, Ghent, Belgium. Proceedings of Advanced Concepts for Intelligent Vision Systems,2002.

S.Fong, P.B. Ray, and S. Singh, "Improving the lightweight video encryption algorithm," proceeding of iasted international conference, single processing, pattern recognition and application, 2002, pp. 25-28.

S. P. Nana'vati., P. K. panigrahi. "Wavelets:applications to image compression- I," joined of the scientific and engineering computing, vol. 9, no . 3, 2004, pp. 4-10.

AL. Vitali, A. Borneo, M. Fumagalli and R. Rinaldo, "Video over IP using standard-compatible multiple description coding," Journal of Zhejiang University- Science A, vol. 7, no. 5 ,2006, pp. 668-676.

Li. Shujun, Li.Chengqing and C. Guanrong, “A general cryptanalysis of permutation-only multimedia encryption algorithms”, Fellow, IEEE. Available: http://eprint.iacr.org / 2004.

Isbell R. A.: “Steganography: Hidden Menace or Hidden Saviour”, Steganography White Paper, 10th May, (2002).

Dr.S.Kishore Reddy, “Encrypted data hiding in encrypted images”, International Journal of Research in Engineering and Applied Sciences, vol.2, pp. 50-59, September 2012. Available: http://www.euroasiapub.org.

Vinay Pandey, “Medical image protection using cryptography, data hiding and steganography”, International Journal of Emerging Technology and Advanced Engineering, vol.2. pp. 106-109, January 2012. Available: http://ijetae.com.

S. Vasumathi Kannaki, “Secure data hiding using an integration of cryptography and cryptography”, Research Journal of Computer Systems Engineering, vol. 4, June 2013. Available: http://technicaljournals.org//RJCSE.

B. Schneier, Applied Cryptography, John Wiley and Sons, New York, 1994.

B. Schneier, “Description of a new variable length key, 64 bit-block cipher(Blowfish)”, in Proc. Fast Software Encryption, Cambridge Security Workshop, Springer-Verlag, pp. 191-204, Dec. 1993.

Moulin P and Koetter R, "Data-hiding codes", Proceedings of the IEEE, 93 (12) (2005) pp. 2083-2126.

Krenn. R., Steganography and Steganalysis , http://www. krenn.nl/ univ/cry/steg/article.pdf.

Shannon C.E, Communication theory of secrecy systems, Bell System Technical Journal, pp. 656-715, 1949.

Burger W. and M. Burge, Digital Image Processing: An Algorithmic Introduction Using Java, Springer- Verlag, New York, 2008.

Downloads

Published

2015-10-13

How to Cite

May Zaw, Z., & Phyo, S. W. (2015). Security Enhancement System Based on the Integration of Cryptography and Steganography. International Journal of Computer (IJC), 19(1), 26–39. Retrieved from https://www.ijcjournal.org/index.php/InternationalJournalOfComputer/article/view/452

Issue

Section

Articles