CRYPTO-STEG: A Hybrid Cryptology - Steganography Approach for Improved Data Security
نویسنده
چکیده
Internet is a widely used medium for transfer of information due to its reach and ease of availability. However, internet is an insecure medium and any information might be easily intercepted and viewed during its transfer. Different mechanisms like cryptology and steganography are adopted to secure the data communication over an inherently insecure medium like internet. Cryptology scrambles the information in a manner that an unintended recipient cannot easily extract the information, while steganography hides the information in a cover object so that it is transferred unnoticed in the cover. Encrypted data may not be extracted easily but causes a direct suspicion to any observer, while data hidden using steganographic techniques go inconspicuous. Cryptanalysis is the process of attacking the encrypted text to extract the information, while steganalysis is the process of detecting the disguised messages. In literature, both cryptology and steganography are treated separately. In this paper, we present our research on an improved data security paradigm, where data is first encrypted using AES (Advanced Encryption Standard) and DES (Data Encryption Standard) cryptology algorithms. Both plain and encrypted data is hidden in the images using Model Based and F5 steganographic techniques. Features are extracted in DWT (Discrete Wavelet Transform) and DCT (Discrete Cosine Transform) domains using higher order statistics for steganalysis, and subsequently used to train a FLD (Fisher Linear Discriminant) classifier which is employed to categorize a separate set of images as clean or stego (containing hidden messages). Experimental results demonstrate improved data security using proposed CRYPTO-STEG approach compared to plain text steganography. Results also demonstrate that the Model Based steganography is more secure than the F5 steganography.
منابع مشابه
A New Hybrid Method for Colored Image Steganography Based On DWT
Data transmission security has become an extremely important field of research. Steganography is an art of hiding information in image, audio and video files in a way that would meet the security requirements in the form of overt or covert. In this study, we propose a new hybrid steganography technique for color images that hide secret messages in the frequency domain of a cover image's blu...
متن کاملPros and Cons of Cryptography, Steganography and Perturbation techniques
Cryptology was as significant as weapons during the World War II and the Cold War. There were lots of studies to develop robust crypto-systems and to use them in communications. These studies have continued up to now. Today some of those crypto-systems called as “classical crypto-systems” are improved and still being used. Mostly we can secure our data in three ways first one is cryptography wh...
متن کاملA New Hybrid Method for Colored Image Steganography Based On DWT
Data transmission security has become an extremely important field of research. Steganography is an art of hiding information in image, audio and video files in a way that would meet the security requirements in the form of overt or covert. In this study, we propose a new hybrid steganography technique for color images that hide secret messages in the frequency domain of a cover image's blu...
متن کاملA New Approach for Secure Data Transfer based on Wavelet Transform
In today’s world, there are a number of cryptographic and steganographic techniques used in order to have secured data transfer between a sender and a receiver. In this paper we present a new hybrid approach that integrates the merits of cryptography and Image steganography based on multi resolution wavelet domain. First, the original message is encrypted using modified blowfish algorithm and t...
متن کاملA New Approach for Information Security using an Improved Steganography Technique
This research paper proposes a secured, robust approach of information security using steganography. It presents two component based LSB (Least Significant Bit) steganography methods for embedding secret data in the least significant bits of blue components and partial green components of random pixel locations in the edges of images. An adaptive LSB based steganography is proposed for embeddin...
متن کامل