A Secure Dual Encryption Scheme Combined With Steganography

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
© 2014 by IJETT Journal
Volume-13 Number-5
Year of Publication : 2014
Authors : A Aswathy Nair , Deepu Job


A Aswathy Nair , Deepu Job. "A Secure Dual Encryption Scheme Combined With Steganography", International Journal of Engineering Trends and Technology (IJETT), V13(5),218-225 July 2014. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group


In this paper a new encoding scheme is proposed which combines encryption and steganography there by ensuring secure data exchange..Encryption hides the confidential information for the purpose of security, by converting the data in to an unintelligible form and steganography hides the data in medias like image, video, audio etc so that the detection of hidden secret is prevented. In the proposed system, the data is dual encrypted and the resultant cipher is then embedded within an image using LSB steganographic technique to ensure secrecy and privacy. The encryption algorithms used is much secure as each step in the process is fully dependent on the key. The LSB steganographic technique hides the data in least significant bits of the pixels of the image and therefore the reflected change in the stego image is hardly noticeable to human eye. The key management for the system is done using RSA encryption technique.


[1] T. Sharp. An implementation of key-based digital signal steganography. Proc. 4th. Information Hiding Workshop, LNCS, vol. 2137, Berlin: Springer-Verlag, 2001, pp. 13–26.
[2] Westfeld A, Pfitzmann A. Attacks on Steganographic Systems, Proc. 3rd. Information Hiding Workshop, LNCS,Vol.1768,Berlin: Springer-Verlag, 2000, pp.61-76
[3] Fridrich J, Goljan M, Du R. Detecting LSB steganography in color and gray-scale images. IEEE Multimedia, 2001, Vol.8(4),pp.22-28.
[4] Thomas Leontin Philjon. and Venkateshvara Rao. ?”Metamorphic Cryptography - A Paradox between Cryptography and Steganography Using Dynamic Encryption” IEEE-International Conference on Recent Trends in Information Technology, ICRTIT 2011
[5] Khalil Challita and Hikmat Farhat ,”Combining Steganography and Cryptography: New Directions”, International Journal on New Computer Architectures and Their Applications (IJNCAA) 1(1): 199-208,The Society of Digital Information and Wireless Communications, 2011 (ISSN 2220-9085).
[6] Dhawal Seth, L. Ramanathan,”SecurityEnhancement: Combining Cryptography and Steganography”, International Journal of Computer Applications (0975 – 8887) Volume 9– No.11, November 2010.
[7] Shouchao Song, Jie Zhangb,Xin Liao,Jiao Du Qiaoyan Wen, “A Novel Secure Communication Protocol Combining Steganography and Cryptography”, 2011 Published by Elsevier Ltd. Selection and/or peerunder responsibility of [CEIS 2011] In Advanced in Control Engineering and Information Science.
[8] Dr.R.Sridevi,Vijaya, Paruchuri,,K.S.SadaShiva Rao, “Image Steganography combined with Cryptography “,Council for Innovative Research Peer Review Research Publishing System Journal: IJCT Vol 9, No 1 , ISSN 22773061 976 | P a g e J u l y 1 5 , 2 0 1 3 This email address is being protected from spambots. You need JavaScript enabled to view it.
[9] “Cryptography and Network Security: principles and practices”, William Stallings, pearsons education, first Indian reprint 2003.
[10] Johnson, Neil F., and SushilJajodia. “Exploring Steganography: Seeing the Unseen”, IEEE Computer Feb. 1998: 26-34.
[11] Rosziati Ibrahim and Teoh Suk Kuan ?Steganography Algorithm to Hide Secret Message inside an Image? Computer Technology and Application 2 (2011) 102-108
[12] Diffie W and Hellman M, "New Direction in Cryptography, IEEE Transaction on Information Theory, IT-22(6): 644-654, 1976
[13] Ashwak M. AL-Abiachi, Faudziah Ahmad and Ku Ruhana ?A Competitive Study of Cryptography Techniques over Block Cipher? UKSim 13th IEEE International Conference on Modelling and Simulation 2011
[14] Wenbo Mao. Modern cryptography: Theory and practice. Prentic Hall, 1st edition, 2003.
[15] D. Gruhl, W. Bender, and N. Morimoto, “Techniques for data hiding,” Tech. rep., MIT Media Lab, Cambridge, MA, 1994.
[16] Nath A., Ghosh S., Mallik M.A., “Symmetric Key Cryptography Using Random Key Generator”, Proceedings of the 2010 International Conference on Security & Management, SAM-2010, Vol. 2, pp. 239-244, Las Vegas Nevada (USA), 12-15 July 2010.
[17] Al-Fayoumi,Aboud Jabbar.H "An Efficient RSA Public Key Encryption Scheme" Information Technology: New Generations, 2008. ITNG 2008. Fifth International Conference on DOI: 10.1109/ITNG.2008.199 2008 , Page(s): 127- 130

Encryption, Steganography, Security, Key-Management.