Secret Data Transmission using Vital Image Steganography over Transposition Cipher

被引:0
|
作者
Jain, Mamta [1 ]
Lenka, Saroj Kumar [1 ]
机构
[1] Mody Univ Sci & Technol, Dept Informat Technol, Laxmangarh, Rajasthan, India
关键词
LSB; steganography; cryptography; Vernam cipher; encryption; decryption; embedding;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The idea behind this paper describes a modality about secret interface over the globalization of the communication over the world. To accomplish this phenomenon, two varieties of security mechanism, cryptography and steganography is being applied. At the former stage, encryption is being provided to secret plain text using Vernam cipher (One-Time Pad) transposition technique, since Vernam cipher show good performance metrics in terms of less CPU running time, file size same after encryption and strong avalanche effect compare with all transposition cipher. And at the later stage, it transform cipher text into bytes and divides each byte into pairs of bits and assigns the decimal values to each pairs, which is known as master variable. master variable value range will be vary between 0 to 3. Depending upon the master patchy value, add that cipher text in the career image at Least Significant Bit (LSB) 6 th and 7 th bit location or 7 th and 8 th bit location or 7 th and 6 th or 8 th and 7 th bit location. Which shows the embedding location dynamicity of the algorithm depends upon dynamically changed master variable value. After completion of embedding and sending the stego image to the receiver side, retrieving process of the cipher text from the said locations will be done. And then decryption process to get the secret plain text back will be performed using the Vernam cipher transposition algorithms. In this we provide robust image steganography. Performance analysis observed using MSE and PSNR value.
引用
收藏
页码:1026 / 1029
页数:4
相关论文
共 50 条
  • [41] Secure Image Data Storage and Transmission Using ESP32-Cam and Raspberry Pi with Steganography
    Gokhale, Hrishikesh
    Satapathy, Chirag
    Syed, Ali Zoya
    INTERNET OF THINGS, GIOTS 2022, 2022, 13533 : 292 - 301
  • [42] Strengthening wavelet based image steganography using Rubik's cube segmentation and secret image scrambling
    Khandelwal, Jyoti
    Sharma, Vijay Kumar
    MULTIMEDIA TOOLS AND APPLICATIONS, 2024, 83 (33) : 78797 - 78825
  • [43] Steganography and Hiding Data with Indicators-based LSB Using a Secret Key
    Saqer, Wesam
    Barhoom, Tawfiq
    ENGINEERING TECHNOLOGY & APPLIED SCIENCE RESEARCH, 2016, 6 (03) : 1013 - 1017
  • [44] MULTIPLE EMBEDDING SECRET KEY IMAGE STEGANOGRAPHY USING LSB SUBSTITUTION AND ARNOLD TRANSFORM
    Das, Pallavi
    Kushwaha, Satish Chandra
    Chakraborty, Madhuparna
    2015 2ND INTERNATIONAL CONFERENCE ON ELECTRONICS AND COMMUNICATION SYSTEMS (ICECS), 2015, : 845 - 849
  • [45] Using Image Steganography for Providing Enhanced Medical Data security
    Usmani, Muhammad Arslan
    Usman, Muhammad Rehan
    2018 15TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2018,
  • [46] Secret image scrambling and DWT-based image steganography using smoothing operation and convolution neural networks
    Sharma, Vijay Kumar
    Kumar, Pramendra
    Singhal, Sunita
    Soni, Bhanu Pratap
    Shukla, Praveen Kumar
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2023, 26 (03): : 695 - 705
  • [47] Reversible Data Hiding in Encrypted Images Using Cipher-Feedback Secret Sharing
    Hua, Zhongyun
    Wang, Yanxiang
    Yi, Shuang
    Zhou, Yicong
    Jia, Xiaohua
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2022, 32 (08) : 4968 - 4982
  • [48] Digital image data transmission over long distances using image compression and broadband ISDN
    Becker, T
    Simon, R
    COMPUTERS IN CARDIOLOGY 2001, VOL 28, 2001, 28 : 687 - 689
  • [49] Information hiding: Arabic text steganography by using Unicode characters to hide secret data
    Ditta, Allah
    Cai Yongquan
    Azeem, Muhammad
    Rana, Khurram Gulzar
    Yu, Haiyang
    Memon, Muhammad Qasim
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2018, 10 (01) : 61 - 78
  • [50] Leveraging coverless image steganography to hide secret information by generating anime characters using GAN
    Rehman, Hafiz Abdul
    Bajwa, Usama Ijaz
    Raza, Rana Hammad
    Alfarhood, Sultan
    Safran, Mejdl
    Zhang, Fan
    EXPERT SYSTEMS WITH APPLICATIONS, 2024, 248