Paper title:

Stegano-Crypto Hiding Encrypted Data in Encrypted Image Using Advanced Encryption Standard and Lossy Algorithm

DOI: https://doi.org/10.4316/JACSM.201502001
Published in: Issue 2, (Vol. 9) / 2015
Publishing date: 2015-10-22
Pages: 9-12
Author(s): Tahir Ari Shawakat
Abstract. The Steganography is an art and science of hiding information by embedding messages within other, seemingly harmless messages and lots of researches are working in it. Proposed system is using AES Algorithm and Lossy technique to overcome the limitation of previous work and increasing the process’s speed. The sender uses AES Algorithm to encrypt message and image, then using LSB technique to hide encrypted data in encrypted message. The receive get the original data using the keys that had been used in encryption process. The proposed system has been implemented in NetBeans 7.3 software uses image and data in different size to find the system’s speed
Keywords: Cryptography, Steganography, Image And Data Encryption; AES Algorithm, Lossy Algorithm
References:

1.Septimiu Fabian Mare, Mircea Vladutiu and Lucian Prodan “Secret data communication system using Steganography, AES and RSA”, IEEE 17th International Symposium for Design and Technology in Electronic Packaging, pp. 334-339, Oct 2011.

2.Neil F. Johnson, Sushil Jajodia, George Mason University, "Exploring Steganography: Seeing the Unseen", IEEE Computers, pp. 26-34, February 1998

3.T. Morkel, J. Eloff and M. Olivier, "An Overview of Image Steganography," The Fifth Annual Information Security South Africa Conference (ISSA2005), Sandton South Africa, July 2005.

4.K.Thangadurai and G.Sudha Devi, “An analysis of LSB Based Image Steganography Techniques”, International Conference on Computer Communication and Informatics (ICCCI -2014), 03 – 05 Jan 2014.

5.Abdelrahman Altigani and Bazara Barry, “A Hybrid Approach to Secure Transmitted Messages Using Advanced Encryption Standard (AES) and Word Shift Coding Protocol”, INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRICAL AND ELECTRONIC ENGINEERING (ICCEEE), pp. 134-139, 2013.

6.Jaspal Kaur Saini and Harsh K Verma. “A Hybrid Approach for Image Security by Combining Encryption and Steganography”, Proceedings of the 2013 IEEE Second International Conference on Image Information Processing, pp. 607-611, 2013.

7.Parag Kadam, Mangesh Nawale, Akash Kandhare and Mukesh Patil , “Separable Reversible Encrypted Data Hiding in Encrypted Image Using AES algorithm and Lossy Technique”, Proceedings of the 2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering (PRIME), pp. 312-316, 21-22 February 2013

Back to the journal content
Creative Commons License
This article is licensed under a
Creative Commons Attribution-ShareAlike 4.0 International License.
Home | Editorial Board | Author info | Archive | Contact
Copyright JACSM 2007-2024