A New Approach of Data Hiding in BMP Image Using LSB Steganography and Caesar Vigenere Cipher Cryptography

Authors

  • Bhanupriya M  Information Science and Engineering, GSSSIETW, Mysuru, Karnataka, India
  • Shwetha B C  Information Science and Engineering, GSSSIETW, Mysuru, Karnataka, India
  • Sumana Bhat N M  Information Science and Engineering, GSSSIETW, Mysuru, Karnataka, India

Keywords:

Cryptography, LSB, Steganography, BMP

Abstract

The digital image is one of the most common media is known by the public. Steganography is a method of cryptography used to hide the data in a digital image so that data transmitted cannot be identified by irresponsible parties. One of a kind of digital imageries that is a BMP format or bitmap, bitmap file format may consist of 1,4,8,24 and 32 bits of color for each pixel. The method used to conceal secret messages is how to insert cryptography messages into the low bits to the pixel data that make up a digital image file BMP. By developing a method of Steganography then sending the data which do not only have a good level of security, but also has a level of security to protect a copyright of a digital image.

References

  1. Karim Masud S.M, Rahman Saifur Md, Hossain Ismail md, “A New Approach for LSB Based Image Steganography using Secret Key”, Proceedings of 14th International Conference on Computer and Information Technology (ICCIT 201 I) 22-24 December, 2011, Dhaka, Bangladesh.
  2. Thangadurai K, Devi Sudha G , “An analysis of LSB Based Image Steganography Techniques”, International Conference on Computer Communication and Informatics (ICCCI -2014),Jan. 03 – 05, 2014.
  3. Karim Masud S.M, Rahman Saifur Md, Hossain Ismail md, “A New Approach for LSB Based Image Steganography using Secret Key”, Proceedings of 14th International Conference on Computer and Information Technology (ICCIT 201 I) 22-24 December, 2011, Dhaka, Bangladesh.
  4. Thangadurai K, Devi Sudha G , “An analysis of LSB Based Image Steganography Techniques”, International Conference on Computer Communication and Informatics (ICCCI -2014),Jan. 03 – 05, 2014.
  5. Saha Abhisek, Halder Sholanki, Kollya Shama, ”Image Steganography Using 24-Bit Bitmap Images”, Proceedings of 14th International Conference on Computer and Infonnation Technology (ICCIT 2011), 22-24 December, 2011.
  6. Karthikeyan B, Deepak A, Subalakshmi K.S, M M Raj Anishin, “A Combined Approach of Steganography with LSB Encoding technique and DES Algorithm”, 3rd International Conference on Advances in Electrical, Electronics, Information, Communication and BioInformatics, 2017.
  7. Thakur Ramesh Kumar, Saravanan Chandran, “Analysis of Steganography with Various Bits of LSB for Color Images”, International Conference on Electrical, and Optimization Techniques (ICEEOT), 2016.
  8. Arora Aman, Singh Manish Pratap, Thakral Prateek, Jarwal Naveen, “ Image Steganography Using Enhanced LSB Subsitution Technique”, 2016 Fourth Interntional Conference on parallel, Distributed and Grid Coumputing (PDGC), 2016.
  9. Al -Afandy Khalid A, EL-Rabaie El-Sayed M, Faragallah Osama S, Elmhalawy Ahmed, El-Banby Gh.M, “High Security Data Hiding Using Image Cropping and LSB Least Significant Bit Steganography”, 4th IEEE International Colloquium on Information Science and Technology (CiSt), 2016.
  10. Bhatt Santhosi, Ray Arghya, Ghosh Avishake, Ray Ananya, “Image Steganography and Visible Watermarking using LSB Extraction Technique”, IEEE Sponsored 9th International Conference on Intelligent Systems and Control (ISCO), 2015.
  11. Akhtar Nadeem, Khan Shahbaaz, Johri Pragati, “An Improved Inverted LSB Image Steganography”, 2014 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT), 2014.
  12. Chandramouli R, Memon Nasir, “Analysis of LSB based image steganography techniques”, International Conference on Image Processing, Proceedings. 2001.
  13. Bhukari Sadaf, Arif Shoaib Muhammad, AnjumM.R, Dilbar Samia, “Enhancing security of images by Steganography and Cryptography techniques”, The Sixth International Conference on Innovative Computing Technology (INTECH), 2016.
  14. Mishra Rina, Bhanodiya Praveen, “A review on steganography and cryptography”, The International Conference on Advances in Computer Engineering and Applications (ICACEA), 2015.
  15. Saritha M, Khadabadi M. Vishwanath, Sushravya M, “Image and text steganography with cryptography using MATLAB” , The International Conference on Signal Processing, Communication, Power and Embedded System (SCOPES), 2016.
  16. Jain Mamta, Lenka Kumar Saroj, “Digital Image Steganography using RGB Color Model: A Review”, International Journal of Applied Engineering Research (IJAER).
  17. Priyanka Kumari, Aritra Pal, Parth Dixit, Dr. A. Shanthini, “STEGANOGRAPHY USING DYNAMIC KEY GENERATION”, International Journal of Advances in Engineering Research (IJAER) 2016, Vol. No. 11, Issue No. V.
  18. Sriram, S, Karthikeyan, B, Vaithiyanathan, V, Anishin Raj, M. M, “An Approach of Cryptography and Steganography using Rotor cipher for secure Transmission”, IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), 2015.
  19. Fahrul Ikhsan Lubis, Hasanal Fachri Satia Simbolon, Toras Pangidoan Batubara, Rahmat Widia Sembiring, “Combination of Caesar Cipher Modification with Transposition Cipher”, Advances in Science, Technology and Engineering Systems Journal Vol. 2, No. 5, 22-25, 2
  20. Deshpande Neeta, Kamalapur Snehal, Daisy Jacobs, “Implementation of LSB Steganography and Its Evaluation for Various Bits”, 1st International Conference on Digital Information Management, 2006. Xinyi Zhou, Wei Gong, WenLong Fu, LianJing Jin, “An improved method for LSB based color image steganography combined with cryptography”, 15th International Conference on Computer and Information Science (ICIS), 2016.

Downloads

Published

2018-05-08

Issue

Section

Research Articles

How to Cite

[1]
Bhanupriya M, Shwetha B C, Sumana Bhat N M, " A New Approach of Data Hiding in BMP Image Using LSB Steganography and Caesar Vigenere Cipher Cryptography, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 4, Issue 6, pp.219-227, May-June-2018.