Back
 JIS  Vol.10 No.3 , July 2019
A Secure Image Steganography Using Advanced Encryption Standard and Discrete Cosine Transform
Abstract: Cryptography and Steganography are two prominent techniques to obtain secure communication over the shared media like the Internet. Steganography is slightly ahead of cryptography because of its stealthy characteristics. In this paper, a new method has been proposed which combines cryptography and steganography to ensure even more secure communication. The Advanced Encryption Standard (AES) in spatial domain of the carrier/cover image and Least Significant Bit (LSB) replacement in the transformed domain of the same image has been used after performing a Discrete Cosine Transform (DCT) on the pixels. An additional layer of security has been introduced by applying XOR operation on the AES encrypted message with the pixel values of the carrier image. The Peak Signal to Noise Ratio (PSNR) of the proposed algorithm is better than most of the similar algorithms. With better PSNR, the proposed method depicts a three layer of security of the information and error free decryption.
Cite this paper: Tauhid, A. , Tasnim, M. , Noor, S. , Faruqui, N. and Yousuf, M. (2019) A Secure Image Steganography Using Advanced Encryption Standard and Discrete Cosine Transform. Journal of Information Security, 10, 117-129. doi: 10.4236/jis.2019.103007.
References

[1]   Morkel, T., Eloff, J.H. and Olivier, M.S. (2005) An Overview of Image Steganography. Information Security South Africa, Johannesburg, 29 June-1 July 2005, 1-11.

[2]   Wang, H. and Wang, S. (2004) Cyber Warfare: Steganography vs. Steganalysis. Communications of the ACM, 47, 76-82.
https://doi.org/10.1145/1022594.1022597

[3]   Kour, J. and Verma, D. (2014) Steganography Techniques—A Review Paper. International Journal of Emerging Research in Management & Technology, 3, 132-135.

[4]   Ge, H., Huang, M. and Wang, Q. (2011) Steganography and Steganalysis Based on Digital Image. 4th International Congress on Image and Signal Processing, Shanghai, 15-17 October 2011, 252-255.
https://doi.org/10.1109/CISP.2011.6099953

[5]   Lie, W.N. and Chang, L.C. (1999) Data Hiding in Images with Adaptive Numbers of Least Significant Bits Based on The Human Visual System. Proceedings of IEEE International Conference on Image Processing, Kobe, 24-28 October 1999, 286-290.

[6]   Chan, C.K. and Cheng, L.M. (2004) Hiding Data in Images by Simple LSB Substitution. Pattern Recognition, 37, 469-474.
https://doi.org/10.1016/j.patcog.2003.08.007

[7]   Ker, A.D. (2005) Steganalysis of LSB Matching in Grayscale Images. IEEE Signal Process, 12, 441-444.
https://doi.org/10.1109/LSP.2005.847889

[8]   Wu, D.C. and Tsai, W.H. (2003) A Steganographic Method for Images by Pixel-Value Differencing. Pattern Recognition Letters, 24, 1613-1626.
https://doi.org/10.1016/S0167-8655(02)00402-6

[9]   Zhang, X. and Wang, S. (2004) Vulnerability of Pixel-Value Differencing Steganography to Histogram Analysis and Modification for Enhanced Security. Pattern Recognition Letters, 25, 331-339.
https://doi.org/10.1016/j.patrec.2003.10.014

[10]   Kawaguchi, E. and Eason, R.O. (1998) Principles and Applications of BPCS Steganography. Proceedings of SPIE: Multimedia Systems and Applications, Boston, 22 January 1999, Vol. 3528, 464-473.
https://doi.org/10.1117/12.337436

[11]   Maya, S.T., Miyatake, M.N. and Meana, H.P. (2006) An Image Steganography System Based on BPCS and IWT. 16th International Conference on Electronics, Communications and Computers, Puebla, 13 March 2006, 51.
https://doi.org/10.1109/CONIELECOMP.2006.14

[12]   Bansal, D. and Chhikara, R. (2014) An Improved DCT Based Steganography Technique. International Journal of Computer Applications, 102, 46-49.
https://doi.org/10.5120/17887-8861

[13]   Jameelah, H.S. (2012) Discrete Cosine Transform Using in Hiding Image Technique. Al-Mustansiriyah Journal of Science, 23, 157-168.

[14]   Gunjal, M. and Jha, J. (2014) Image Steganography Using Discrete Cosine Transform (DCT) and Blowfish Algorithm. International Journal of Computer Trends and Technology, 11, 144-150.
https://doi.org/10.14445/22312803/IJCTT-V11P131

[15]   Tseng, H.W. and Chang, C.C. (2004) Steganography Using JPEG Compressed Images. 4th International Conference on Computer and Information Technology, Wuhan, 14-16 September 2004, 12-17.

[16]   Hashad, A.I., Madani, A.S. and Wahdan, A.E.M.A. (2005) A Robust Steganography Technique Using Discrete Cosine Transform Insertion. International Conference on Information and Communication Technology, Cairo, 5-6 December 2005, 255-264.
https://doi.org/10.1109/ITICT.2005.1609628

[17]   Seivi, G.K., Mariadhasan, L. and Shunmuganathan, K.L. (2012) Steganography Using Edge Adaptive Image. International Conference on Computing, Electronics and Electrical Technologies, Kumaracoil, 21-22 March 2012, 1023-1027.

[18]   Banik, B.G. and Bandyopadhyay, S.K. (2015) Implementation of Image Steganography Algorithm Using Scrambled Image and Quantization Coefficient Modification in DCT. 2015 IEEE International Conference on Research in Computational Intelligence and Communication Networks, Kolkata, 20-22 November 2015, 400-405.
https://doi.org/10.1109/ICRCICN.2015.7434272

[19]   Daemen, J. and Rijmen, V. (2002) The Design of Rijndael. Springer-Verlag, Berlin, Heidelberg.
https://doi.org/10.1007/978-3-662-04722-4

[20]   Sheidaee, A. and Farzinvash, L. (2017) A Novel Image Steganography Method Based on DCT and LSB. 9th International Conference on Information and Knowledge Technology, Tehran, 18-19 October 2017, 116-123.
https://doi.org/10.1109/IKT.2017.8258628

[21]   Diniz, P.S.R., Silva, E.A.B.D. and Netto, S.L. (2010) Digital Signal Processing-System Analysis & Design. Second Edition, Cambridge University, Cambridge.

[22]   Cheddad, A., Condell, J., Curran, K. and McKevitt, P. (2010) Digital Image Steganography: Survey and Analysis of Current Methods. Signal Process, 90, 727-752.
https://doi.org/10.1016/j.sigpro.2009.08.010

[23]   Anurag and Meena, S. (2018) Color Image Steganography Using Random Key Matrix. 3rd International Conference for Convergence in Technology, Pune, 6-8 April 2018, 1-5.
https://doi.org/10.1109/I2CT.2018.8529425

[24]   Chang, C.C., Chou, Y.C. and Kieu, T.D. (2008) An Information Hiding Scheme Using Sudoku. 3rd International Conference on Innovative Computing, Information and Control, Dalian, 18-20 June 2008, 17-21.
https://doi.org/10.1109/ICICIC.2008.149

[25]   Hong, W., Chen, T.S. and Shiu, C.W. (2008) A Minimal Euclidean Distance Searching Technique for Sudoku Steganography. International Symposium on Information Science and Engineering, Shanghai, 20-22 December 2008, 515-518.

[26]   Lin, C.N., Chang, C.C., Lee, W.B. and Lin, J. (2009) A Novel Secure Data Hiding Scheme Using a Secret Reference Matrix. 5th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Kyoto, 12-14 September 2009, 369-373.
https://doi.org/10.1109/IIH-MSP.2009.143

[27]   Singh, A. and Singh, H. (2015) An Improved LSB Based Image Steganography Technique for RGB Images. IEEE International Conference on Electrical, Computer and Communication Technologies, Coimbatore, 5-7 March 2015, 1-4.
https://doi.org/10.1109/ICECCT.2015.7226122

[28]   Maheswari, S.U. and Hemanth, D.J. (2014) Frequency Domain QR Code Based Image Steganography Using Fresnelet Transform. International Journal of Electronics and Communications, 69, 539-544.
https://doi.org/10.1016/j.aeue.2014.11.004

 
 
Top