Open Access Open Access  Restricted Access Subscription or Fee Access

Improved Communication Security and Enhance Reliability Using Cryptography and Steganography

Kamlesh Kumar singh, Urvi Dadu, Bramah Hazela, Deependra Pandey

Abstract


Increased use of technologies and computers has profited humans in many ways but also have resulted in various security concerns. And these security concerns are breached onto the path over which the data is to be transferred. Sending normal messages over the Internet is no longer a secure method for data sharing. In this paper, we have determined how can we provide an encrypted
message so that there will be no fear of data Integrity, Confidentiality, etc. The way of propagation of the data or the thing can be in any form such as sound, video, text message, audio, etc, but here we have focused on text messages. This project first sends the message which is taken in the text format and then that text data is encrypted by using some cryptographic techniques. Then the encrypted message or the data that has been encrypted using the cryptographic technique is embedded in the image form by using some of the steganographic techniques. Now whatever image we have taken up can be sent over the internet for transferring any hidden message or confidential message to the person. After that, we can decode it on the other side. We have also performed some comparison based studies by using some set of algorithms by comparing cryptographic and steganographic techniques. As focusing on security purposes, the combination of steganography with cryptography improves communication security and enhances reliability by encrypting the commencing message and hiding the same message. There are important tools that help utterly in cybersecurity. This paper comprises various algorithms used such as RSA, AES, DES, DCT, OTP, etc. These are the algorithms of symmetric, asymmetric cryptography, and steganography.


Full Text:

PDF

References


Ozdemir Cetin and A Turan Ozcerit. A new steganography algorithm based on color histograms

for data embedding into raw video streams. computers & security, 28(7):670–682, 2009.

Edi Jaya Kusuma, Oktaviana Rena Indriani, Christy Atika Sari, Eko Hari Rachmawanto, et al.

An imperceptible lsb image hiding on edge region using des encryption. In 2017 International

Conference on Innovative and Creative Information Technology (ICITech), pages 1–6. IEEE,

Eko Hari Rachmawanto, Christy Atika Sari, et al. Secure image steganography algorithm based

on dct with otp encryption. Journal of Applied Intelligent System, 2(1):1–11, 2017.

Prasetiyo Budi, Rahmat Gernowo, Beta Noranita, and M Kom. The combination of bit matching-

based steganography and des cryptography for data security. 2013.

Alan C Bovik. The essential guide to image processing. Academic Press, 2009.

Vegh, L., & Miclea, L. (2014, May). Enhancing security in cyber-physical systems through

cryptographic and steganographic techniques. In 2014 IEEE international conference on

automation, quality and testing, robotics (pp. 1-6). IEEE.

Hureib, E. S. B., & Gutub, A. A. (2020). Enhancing medical data security via combining elliptic

curve cryptography with 1-LSB and 2-LSB image steganography. International J Comp Sci

Network Security (IJCSNS), 20(12), 232-241.

Rathore, M. S., Poongodi, M., Saurabh, P., Lilhore, U. K., Bourouis, S., Alhakami, W., ... &

Hamdi, M. (2022). A novel trust-based security and privacy model for internet of vehicles using

encryption and steganography. Computers and Electrical Engineering, 102, 108205.

Denis, R., & Madhubala, P. (2020). Evolutionary computing assisted visually-imperceptible

hybrid cryptography and steganography model for secure data communication over cloud

environment. Int. J. Comput. Netw. Appl, 7, 208-230.

El-Bendary, M. A. (2017). FEC merged with double security approach based on encrypted image

steganography for different purpose in the presence of noise and different attacks. Multimedia

Tools and Applications, 76, 26463-26501.




DOI: https://doi.org/10.37628/jdcas.v9i1.1838

Refbacks

  • There are currently no refbacks.