A New Hybrid Approach for Image Security using Steganography and Encryption

Authors

  • Rehana Saheb Department of Computer Science and Engineering, Lovely Professional University, Phagwara, Punjab, India Author
  • Nallamilli Satya Sai Kartheek Reddy Department of Computer Science and Engineering, Lovely Professional University, Phagwara, Punjab, India Author
  • Ritu Department of Computer Science and Engineering, Lovely Professional University, Phagwara, Punjab, India Author
  • Ashish Kumar Dhiman Department of Computer Science and Engineering, Lovely Professional University, Phagwara, Punjab, India Author
  • Nishant Department of Computer Science and Engineering, Lovely Professional University, Phagwara, Punjab, India Author
  • Nirmaljeet Kaur Department of Computer Science and Engineering, Lovely Professional University, Phagwara, Punjab, India Author

DOI:

https://doi.org/10.32628/CSEIT24102110

Keywords:

Hybrid Approach, Encryption Ensures, Cryptographic Algorithms

Abstract

In today's digital age, ensuring the security and confidentiality of image data is paramount, particularly with the proliferation of online communication and storage platforms. This project proposes a hybrid approach for enhancing image security by synergistically integrating encryption and steganography techniques. The combination of these two methods aims to fortify the protection of digital images against unauthorized access and tampering. Encryption ensures the confidentiality of image content by converting it into an unintelligible form using robust cryptographic algorithms. Concurrently, steganography conceals the encrypted data within the image itself, embedding it imperceptibly into the pixels or metadata. The synergy of encryption and steganography not only safeguards the integrity of image data but also adds an additional layer of concealment, making it arduous for adversaries to detect and decipher sensitive information. Through this project, the efficacy of the hybrid approach will be evaluated through experimentation and analysis, with the ultimate goal of providing a comprehensive solution for image security in various applications and contexts.

Downloads

Download data is not yet available.

References

Singh, G., & Kaur, M. (2019). A Review on Digital Image Security using Cryptography and teganography Techniques. International Journal of Computer Applications, 179(27), 12-17.

Sharma, S., & Kaur, A. (2020). A Comprehensive Review on Digital Image Security Using Hybrid Approach of Cryptography and Steganography. International Journal of Scientific & Engineering Research, 11(2), 365-370.

Saini, A., Kaur, M., & Kumar, A. (2018). A Hybrid Approach for Image Security Using Cryptography and Steganography Techniques. International Journal of Advanced Research in Computer Science, 9(3), 149-153.

Huang, J., Ni, Z., Shi, Y. Q., & Zhao, D. (2011). Reversible Data Hiding in Encrypted Images by Reversible Image Transformation. IEEE Transactions on Information Forensics and Security, 6(3), 667-676.

Li, B., Yang, X., Zhang, T., & Chen, B. (2018). A Novel Reversible Data Hiding Algorithm for Encrypted Image Based on Huffman Coding. IEEE Access, 6, 31893-31902.

Sharma, N., & Singh, S. (2020). An Enhanced Reversible Data Hiding Scheme for Encrypted Images Using Pixel Mapping. Multimedia Tools and Applications, 79(13-14), 9437-9458.

Mihcak, M. K., Kozintsev, I., & Ramchandran, K. (1998). Low-complexity image denoising based on statistical modeling of wavelet coefficients. IEEE Signal Processing Letters, 5(3), 72-75.

Fridrich, J. (2009). Steganography in Digital Media: Principles, Algorithms, and Applications. Cambridge University Press. DOI: https://doi.org/10.1017/CBO9781139192903

Katzenbeisser, S., & Petitcolas, F. A. P. (2000). Information Hiding Techniques for Steganography and Digital Watermarking. Artech House. DOI: https://doi.org/10.1201/1079/43263.28.6.20001201/30373.5

Stallings, W. (2017). Cryptography and Network Security: Principles and Practice. Pearson Education.

Ferguson, N., Schneier, B., & Kohno, T. (2010). Cryptography Engineering: Design Principles and Practical Applications. Wiley.

Schneier, B. (1996). Applied Cryptography: Protocols, Algorithms, and Source Code in C. Wiley.

Sharma, R., & Bharti, S. (2018). A hybrid approach of image steganography and encryption using advanced encryption standard. International Journal of Computer Applications, 179(7), 1-6. DOI: https://doi.org/10.5120/ijca2018916482

Singh, A., & Sharma, P. (2019). Image encryption using chaotic maps and steganography for secure communication. Journal of Information Security, 10(1), 1-12.

Khan, F., & Khan, S. (2020). Hybrid approach of encryption and steganography for image security using chaotic map. Procedia Computer Science, 171, 758-765.

Gupta, S., & Chaudhary, S. (2017). A hybrid approach for image encryption and steganography using chaotic map and genetic algorithm. International Journal of Computer Applications, 167(9), 31-38.

Joshi, A., & Sharma, V. (2021). Enhanced image security using hybrid approach of encryption and steganography. Journal of Advanced Research in Dynamical and Control Systems, 13(1), 1278-1286.

Zhang, Y., & Wang, X. (2019). A novel hybrid image encryption algorithm based on DOI: https://doi.org/10.1109/ICMA.2019.8816275

DNA sequence operation and steganography. Multimedia Tools and Applications, 78(8), 10315-10335.

Li, W., & Liu, S. (2018). A hybrid approach of image encryption and steganography using chaotic map and logistic map. Soft Computing, 22(10), 3275-3286.

Wu, J., & Zhang, J. (2019). Image encryption algorithm based on hyper-chaotic system and steganography. Journal of Ambient Intelligence and Humanized Computing, 10(1), 129-139.

Khan, S., & Gupta, P. (2017). A hybrid approach for image encryption using chaotic maps and steganography. Procedia Computer Science, 115, 57-64.

Rathore, V., & Agarwal, S. (2020). Secure image communication using hybrid encryption and steganography technique. Wireless Personal Communications, 110(2), 1015-1031.

Cox, I. J., Miller, M. L., Bloom, J. A., & Fridrich, J. (2008). Digital Watermarking and Steganography (2nd ed.). Morgan Kaufmann. DOI: https://doi.org/10.1016/B978-012372585-1.50015-2

Johnson, N. F., & Jajodia, S. (1998). Steganalysis: The Investigation of Hidden Information. Springer. DOI: https://doi.org/10.1109/IT.1998.713394

Downloads

Published

05-05-2024

Issue

Section

Research Articles

Similar Articles

1-10 of 232

You may also start an advanced similarity search for this article.