Enhanced Security of Symmetric Encryption Using Combination of Steganography with Visual Cryptography
Citation
MLA Style: Sherief H. Murad , Amr M. Gody , Tamer M. Barakat "Enhanced Security of Symmetric Encryption Using Combination of Steganography with Visual Cryptography" International Journal of Engineering Trends and Technology 65.3 (2018): 149-154.
APA Style:Sherief H. Murad , Amr M. Gody , Tamer M. Barakat (2018). Enhanced Security of Symmetric Encryption Using Combination of Steganography with Visual Cryptography. International Journal of Engineering Trends and Technology, 65(3), 149-154.
Abstract
Data security and confidentiality is required when communications over untrusted networks take place. Security tools such as cryptography and steganography are applied to achieve such objectives, but both have limitations and susceptible to attacks if they were used individually. To overcome these limitations, we proposed a powerful and secured system based on the integration of cryptography and steganography. The secret message is encrypted with blowfish cipher and visual cryptography. Finally, the encrypted data is embedded into two innocent cover images for future transmission. An extended analysis was made to prove the efficiency of the proposed model by measuring Mean-Square-Error (MSE), Peak-Signal-to-noise-Ratio (PSNR), and image histogram. The robustness was examined by launching statistical and 8-bit plane visual attacks. The proposed model provides a secure mean to transmit or store highly classified data that could be applied to the public security sector.
Reference
[1] S. William, “Cryptography and network security principles and practice”, 6th edition, Prentice Hall, New York, March 2013.
[2] Doshi, P. Jain, L. Gupta, "Steganography and Its Applications in Security", International Journal of Modern Engineering Research (IJMER), Vol.2, Pages 4634 – 4638, 2012.
[3] B. Schneier, “Description of a new variable-length key, 64-bit block cipher (blowfish) fast software encryption”, Cambridge security workshop proceedings (December 1993), springerverlag, 1994, pp. 191-204.
[4] S. Manku, K. Vasanth, "Blowfish Encryption Algorithm for Information Security", ARPN Journal of Engineering and Applied Science, Vol.10, Pages 4717-4719, 2015.M. Naor and A. Shamir, “Visual cryptography,” Advances in Cryptograhy: EUROCRYPT?94, LNCS, vol. 950, pp. 1–12, 1995.
[5] S.Chandramath., Ramesh Kumar R., Suresh R. and Harish S.,” An overview of visual cryptography”, International Journal of Computational Intelligence Techniques, Vol.1, Pages 32-37, 2010
[6] T. Morkel, J. H. P. Eloff, M. S. Olivier, "An Overview of Image Steganography", in Proceedings of the Fifth Annual Information Security South Africa Conference (ISSA2005), Sandton, South Africa, July 2005.
[7] B. Boehm, "StegExpose A Tool for Detecting LSB Steganography", master?s thesis, University of Kent, School of Computing, 2014.
[8] H. Y. Atown, "Hide and Encryption Fingerprint Image by using LSB and Transposition pixel by Spiral Method", International Journal of Computer Science and Mobile Computing (IJCSMC), Vol.3, Pages 624 – 632, 2014.
[9] S. Sekra, S. Balpande, K. Mulani, "LSB Based Steganography Using Genetic Algorithm and Visual Cryptography for Secured data Hiding and Transmission over Networks", International Journal of Computer Science and Engineering (IJETT-IJCSE), Vol.2, Pages 5 – 9, 2015.
[10] P. H. Dixit, K. B. Waskar, U. L. Bombale, "Multilevel Network Security Combining Cryptography and Steganography on ARM Platform", Journal of Embedded Systems, Vol.3, Pages 11 – 15, 2015.
[11] M. Gupta, D. Chauhan, "A Visual Cryptographic Scheme to Secure Image Shares Using Digital Watermarking", International Journal of Computer Science and Information Technologies (IJCSIT), Vol.6, Pages 4339 – 4343, 2015.
[12] T. S. Barhoom, S. M. A. Mousa, "A Steganography LSB Technique for Hiding Image Within Image using Blowfish Encryption Algorithm", International Journal of Research in Engineering and science (IJETT), Vol.3, Pages 61 – 66, 2015.
[13] M. D. Munjal, "Dual Steganography Technique Using Status LSB and DWT Algorithms", International Journal of Innovative Research in Computer and Communication Engineering (IJIRCCE), Vol.4, Pages 10483 – 10492, 2016.
[14] R. Rathod, D. Mistry, K. Patel, "Encrypted Steganography: A Combined Approach for Enhancing Image Security", International Journal of Innovative Research in Computer and Communication Engineering (IJIRCCE), Vol.4, Pages 9088 – 9096, 2016.
[15] P. K. Kavya, P. Haseena, "An Authentication Method Using A Verifible Visual Cryptography Scheme And A Steganographic Video Object Authentication Via Biometrics", International Journal of Innovative Research in Computer and Communication Engineering (IJIRCCE), Vol.6, Pages 470 – 477, 2017.
[16] B. Boehm, "StegExpose A Tool for Detecting LSB Steganography", master?s thesis, University of Kent, School of Computing, 2014.
[17] P. Bateman, H. G. Schaathun, "Image steganography and steganalysis", Master`s thesis, Department Of Computing, Faculty of Engineering and Physical Sciences,University of Surrey, Guildford, Surrey, United Kingdom, 2008
Keywords
Blowfish, Visual Cryptography, LSB