Image Security Using Steganography And Cryptographic Techniques

  ijett-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
  
© 2012 by IJETT Journal
Volume-3 Issue-3                          
Year of Publication : 2012
Authors :  R.Nivedhitha , Dr.T.Meyyappan

Citation 

R.Nivedhitha , Dr.T.Meyyappan. "Image Security Using Steganography And Cryptographic Techniques". International Journal of Engineering Trends and Technology (IJETT). V3(3):366-371 May-Jun 2012. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group

Abstract

Steganography is the art of hiding the fact communication is taking place, by hiding information in other information.Many different carrier file formats can be used,but digital images are the most popular because of their frequency on the internet.This paper introduces two new methods where in cryptography and steganography are combined to encrypt the data as well as to hide the data in another medium through image processing . This paper secur ing the image by encryption is done by DES algorithm using the key image. The encrypted image can be hide in another image by using LSB techniques,so that the secret’s very existence is concealed. The decryption can be done by the same key image using DES algorithm.

References

[1] C. Kurak and J. McHugh, A cautionary note on image downgrading, in: Proceedings of the IE EE 8 Annual Computer Security Applications Conference, 30 Nov - 4 Dec, 1992, pp. 153 - 159.
[2] J.C. Judge, Steganography: Past, present, future. SANS Institute publication, http://www.sans.org/reading_room/whitepapers/stenganography/55 2.php, 2001.
[3] K m. Pooja ,Arvind Kumar , “Steganography - A Data Hiding Technique” International Journal of Computer Applications ISSN 0975 – 8887, Volume 9 – No.7, November 2010.
[4] N.F. Johnson and S. Jajodia, Exploring steganography: Seeing the unseen, IEEE Compu ter, 31(2)(1998) 2634.
[5] N. Provos and P. Honeyman, Hide and seek: An introduction to steganography, IEEE Security and Privacy, 01 (3)(2003)32 - 44.
[6 ] N.F. Johnson and S.C. Katzenbeisser, “A survey of steganographic techniques”, in: S. Katzenbeisse r and F.A.P. Petitcolas, (ed.) (2000) Information hiding techniques for steganography and digital watermarking, Norwood: Artech House, INC.
[7] P. Moulin and R. Koetter, Data - hiding codes, Proceedings of the IEEE, 93 (12)(2005)2083 - 2126.
[8] R. Chan dramouli, M. Kharrazi, N. Memon, “Image Steganography and Steganalysis: Concepts and Practice “ , International Workshop on DigitalWatermarking, Seoul, October 2004.
[9] R.J. Anderson and F. A. P. Petitcolas (2001) On the limits of the Stegnography, IE EE Journal Selected Areas in Communications, 16(4), pp. 474 - 481.
[10] S.B. Sadkhan, Cryptography: Current status and future trends, in: Proceedings of IEEE International Conference on Information & Communication Technologies: From Theory to Applications, Damascus. Syria, April 19 - 23, 2004, pp. 417 - 418.
[11] T. Morkel, J. H. P. Eloff, M. S. Olivier, ”An Overview of Image Steganography”, Information and Computer Security Architecture (ICSA) Research Group, Department of Computer Science, University of Pret oria, SA.
[12 ]Hide & Seek: An Introduction to Stegnography:http: niels.xtdnet.nl/papers/pratical.pdf.
[13] KafaRabah. Steganography - The Art of Hiding Data. Information technology Journal 3 (3) - 2004

Keyword
Steganography, Cryptography, image hiding, least - significant bit(LSB) method