Open Access Open Access  Restricted Access Subscription or Fee Access

Filter Bank Block Cipher and LSB Based Steganography for Secure Data Exchange


(*) Corresponding author


Authors' affiliations


DOI: https://doi.org/10.15866/irecap.v7i1.11118

Abstract


The transmission of information over a non-secure channel is considered a critical problem. The problem appears due to the existing of many attackers that try to reveal the information. Therefore, it is important to have a secure algorithm to protect the information. Different algorithms can be combined to provide the security of information. In this paper, two techniques are combined together to increase the level of security. Filter bank and XOR and addition modulo 28 block cipher is used to encrypt the information. Then, the encrypted information is passed through another security layer, which hides the encrypted information over a cover image using least significant bit (LSB) based steganography. This combination provides the security level, where the filter bank block cipher provides security, scalability, low complexity and speed. Also LSB based steganography provides security, low complexity, and speed.  The proposed algorithm is evaluated using several security analysis methods, such as, peak signal noise ratio (PSNR) analysis and histogram method. The simulation and security analysis results show that the proposed algorithm is secure and can enhance the level of security.
Copyright © 2017 Praise Worthy Prize - All rights reserved.

Keywords


Filter Bank; Least Significant Bit; Block Ciphr; Steganography; Histogram; PSNR

Full Text:

PDF


References


Saleh Saraireh, Yazeed Al-sbou, Ja’afer Al-saraireh and Othman Alsmadi, Image Encryption Scheme Based on Filter Bank and Lifting, International Journal of Communications, Network and System Sciences , Volume 7, Issue 2, 2013.
http://dx.doi.org/10.4236/ijcns.2014.71006

S. Saraireh, M. Saraireh, and Y. Al – Sbou, Secure Image Encryption using Filter Bank and Addition Modulo 28 with Exclusive OR Combination, International Journal of Computer Science and Security , Volume 7, Issue. 2, 2013, Pages 66 – 80.
http://dx.doi.org/10.4236/ijcns.2014.71006

R. Mathe, V. Atukuri, S. K. Deviredd, Securing Information: Cryptography and Steganography, International Journal of Computer Science and Information Technologies, Volume 3, Issue 3, 2012, Pages 4251 – 4255.
http://dx.doi.org/10.1007/978-3-642-40576-1_33

V. Babu and K.J. Helen, A Study on Combined Cryptography and Steganography, International Journal of Research Studies in Computer Science and Engineering (IJRSCSE) Volume 2, Issue 5, May 2015, Pages 45-49.
http://dx.doi.org/10.5120/7691-1011

S. Saraireh, A Secure Data Communication System using Cryptography and Steganography, International Journal of Computer Networks & Communications , Volume 5, Issue 3, May 2013, Pages125 – 137.
http://dx.doi.org/10.5121/ijcnc.2013.5310

P. Rani and A. Arora, Image Security System using Encryption and Steganography, International Journal of Innovative Research in Science, Engineering and Technology, Volume 4, Issue 6, June 2015.
http://dx.doi.org/10.15680/ijirset.2015.0406008

N. Khan and K. S. Gorde, Data Security by Video Steganography and Cryptography Techniques, International Journal of Emerging Trends in Electrical and Electronics, Volume 11, Issue. 5, Sep-2015, Pages 58 – 64.
http://dx.doi.org/10.15662/ijareeie.2015.0405015

S. E. Thomas and S. T. Philip, S. Nazar, and A. Mathew, Niya Joseph, Advanced Cryptographic Steganography using Multimedia Files, International Conference on Electrical Engineering and Computer Science(ICEECS), May 2012, Pages 239-242.
http://dx.doi.org/10.1109/iceecs.2014.7045207

P. Singh, H. Upadhyay, M. Thakor and K. Suthar, A Survey: A Hybrid Approach to Secure Transmitted Message by Combining Steganography and Asymmetric Cryptography, International Journal of Innovative Research in Computer and Communication Engineering, Volume 2, Issue 11, November 2014, Pages 7071 – 7073.
http://dx.doi.org/10.1109/iccce.2014.88

G. Sateesh, E. S. Lakshmi, M. Ramanamma, K. Jairam and A. Yeswanth,”Assured Data Communication Using Cryptography and Steganography, IJLTEMAS, Volume 5, Issue 3, March 2016, Pages 102 – 106.
http://dx.doi.org/10.9756/bijrce.8216

P. Aung and T. Naing,”A Novel Secure Combination Technique of Steganography and Cryptography, International Journal of Information Technology, Modeling and Computing Volume 2, Issue 1, February 2014, Pages 55 – 62.
http://dx.doi.org/10.5121/ijitmc.2014.2105

H. Sharma, M. Arya and D. Goyal, Secure Image Hiding Algorithm using Cryptography and Steganography, IOSR Journal of Computer Engineering, Volume 13, Issue 5, Jul. - Aug. 2013, Pages 1 – 6.
http://dx.doi.org/10.9790/0661-1350106

M. Bani Younes and A. Jantan, A New Steganography Approach for Image Encryption Exchange by Using the Least Significant Bit Insertion, International Journal of Computer Science and Network Security, Volume 8, Issue 6, June 2008, Pages 247 – 254.
http://dx.doi.org/10.1145/1741906.1742143

G. Raja, S. Reddy, C. Reddy and M. Younus, A New Genetic Approach to Cryptography and Steganography, IJCSET ,Volume 2, Issue 6, June 2012,Pages 1252-1256.
http://dx.doi.org/10.1049/cp.2012.2519

F. Septimiu, M. Vladutiu and P. Lucian ,Secret data communication system using Steganography, AES and RSA, IEEE 17th International Symposium for Design and Technology in Electronic Packaging, 2011.
http://dx.doi.org/10.1109/siitme.2011.6102748

R.Valarmathi, G. M. Kadhar, A Novel Approach for Audiography - A Combination of Audio Steganography and Cryptography, International Journal of Emerging Technology and Advanced Engineering, Volume 4, Issue 1, January 2014,Pages 324 – 329.
http://dx.doi.org/10.15866/irecos.v9i10.3808

S. Saraireh and M. Benaissa, A scalable block cipher design using filter banks over finite fields, Acoustics Speech and Signal Processing (ICASSP), IEEE International Conference, Dallas, TX, USA 2010.
http://dx.doi.org/10.1109/icassp.2010.5495404

S. Katzenbeisser and F. Petitcolas, Information Hiding Techniques for Steganography and Digital Watermarking. Artech House, Inc., Boston, London, 2000.
http://dx.doi.org/10.1201/1079/43263.28.6.20001201/30373.5

R. O. Elsafy, H. H. Zayed and A. Dessouki, An adaptive steganography technique based on integer wavelet transform, ICNM International Conference on Networking and Media Convergence, Pages 111-117, 2009.
http://dx.doi.org/10.1109/icnm.2009.4907200


Refbacks

  • There are currently no refbacks.



Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2024 Praise Worthy Prize