A new technique proposed with the combination of
cryptography and steganography enhanced with new secure feature for generating
a new security system. Cryptography and Steganography are two popular ways for
secure data transmission in which the former distorts a message so it cannot be
understood and another hides a message so it cannot be seen. In cryptography,
this system is used advanced encryption standard (AES) algorithm to encrypt
secret message and then these are separated keys; one of which is used to hide
in cover image. In steganography, a part of encrypted message as a key is used
to hide in discrete cosine transform (DCT) of an image which is highly secured.
This kind of system is to be introduced in applications such as transferring
secret data that can be authentication of various fields. Steganography is a
technique to embed the data in the content like text, images, videos etc. by
means of providing security to the data which has been sent over the internet
or mail. The word steganography has its own meaning i.e. hidden writing. The
word ―Steganography‖ is formed by the two Greek words that are ―Stego means
Hidden or Covered‖ and ―Grafia means writing. The notion of data hiding or
steganography was first introduced with the example of prisoners’ secret
message by Simmons in 1983. We can use
steganography over the cryptography; these are very closely related to each
other. The use of cryptography as a way to secure the hidden message mainly
addresses the security requirement in the Information-Hiding system. For the
purpose of steganography, symmetric encryption is followed. The symmetric
encryption is a method of encryption that uses the same key to encrypt and
decrypt a message. If one person encrypts and decrypts data, that person must
keep the key secret. If the data is transmitted between parties, each party must
agree on a shared secret key and find a secure method to exchange the key. The
security of encrypted data depends on the secrecy of the key. If someone gains
knowledge of the secret key, he or she can use the key to decrypt all the data
that was encrypted with the key. No encryption method is completely secure.
Given knowledge of the algorithm and enough time, attackers can reconstruct
most encrypted data. A strong algorithm (the one that is built on sound
mathematical methods, creates no predictable patterns in encrypted data, and
has a sufficiently long key) can deter most attacks. Cryptography is a
technique in which the secret message is converted into another form by using
this technique the intruder can’t know the original message. Steganography is a
technique in which the message is hidden inside in another file like image but
the image looks like a normal image it doesn’t have any hidden information. Steganography
can be achieved in any other file format like text, audio and video. In this
current world of increasing technology trends and the “internet age”, the
security of our personal information has become more important than it has ever
been there are media reports of identity theft and fraud and the numbers of
innocent victims are increasing exponentially. Steganography plays an important
role in preventing such information destruction by implementing a principle of
imperceptible secret sharing. By this security can be established by clearly
embedding data in such a way that the quality of the image is not affected.
Information hiding is a technique for providing security to the communication
channel thereby preventing attackers from hacking our personal data. A third
person who is watching the communication should not be able to decipher whether
the sender is sending any additional information along with the cover. It is a
“multilevel secure” system used by military organizations. To prevent
information sabotage various technologies are adopted like cryptography, water
marking, finger printing and steganography. Most of the precedent algorithms
have been cracked easily by hackers thus increasing the necessity for an
impregnable algorithm. In this context, steganography extends its helping hand
to protect secrets by hiding information in video, audio, digital image, etc.
which in turn is very hard to be hacked or cracked. If the presence of some
secret message file is suspected then the purpose of steganography will be
defeated, however its strength can be maximized by using it with cryptography.
The cover of steganography can be an image, audio or video. In steganography
the original image is called as the cover image and the image after embedding
the secret message file is called the stego image which will be passed to the
receiver through a communication medium. This way, the secret data will travel from
sender to the receiver safely.
This project under lies in the data or information security category, I am working on it with the help of different cryptographic technique with the collaboration of steganography tool which help us to secure data with multi fold way. Software-based security solutions encrypt the data to protect it from theft. In this project we want to achieve the data or information security in multiple way like we can apply the security on data first to convert it into histogram or binary data.
Plain text is the data (e.g. file contents) that represent only characters of readable material but not its graphical representation nor other objects (images, etc.).
Styled text, also known as rich text, is any text representation containing plain text completed by information such as a language identifier, font size, color, and hypertext links.For instance, Rich text such as SGML, RTF, HTML, XML, wiki markup, and TeX relies on plain text.
Three types of cryptographic techniques used in general.
1. Symmetric-key cryptography
2. Public-key cryptography
3. Hash functions.
Symmetric-key Cryptography: Both the sender and receiver share a single key. The sender uses this key to encrypt plaintext and send the cipher text to the receiver. On the other side the receiver applies the same key to decrypt the message and recover the plain text.
Cryptography: This is the most revolutionary concept
in the last 300-400 years. In Public-Key Cryptography two related keys (public
and private key) are used. Public key may be freely distributed, while its
paired private key, remains a secret. The public key is used for encryption and
for decryption private key is used.
A fixed-length hash value is computed as per the plain
text that makes it impossible for the contents of the plain text to be
recovered. Hash functions are also used by many operating systems to encrypt
Stagnography (Embedding Technique)
1. W. Stallings, “Cryptography and Network Security Principles and Practices”, Low Price Edition, (2003).
2. A.Cheddad, J. Condell, K. Curran and P. M. Kevitt, “Digital Image Steganography: Survey and Analysis of Current Methods”, Signal Processing (2010).
3. D.C.Wu and W. H. Tsai, “A Stagnography Method for Images by Pixel Value Differencing”, pattern recognition letters (2003).
4. C. C. Chang and H. W. Tseng, “A Steganographic Method for Digital Images Using Side Match” pattern recognition letters (2004).
5.Y.K.Jain and R. R. Ahirwal, “A Novel Image Stagnography Method with Adaptive Number of Least Significant bits Modification Based on Private Stego Keys”, International Journal of Computer Science and Security (2010).
Author: Arvind Dangi