International Journal of Engineering
Trends and Technology

Research Article | Open Access | Download PDF

Volume 65 | Number 2 | Year 2018 | Article Id. IJETT-V65P227 | DOI : https://doi.org/10.14445/22315381/IJETT-V65P227

Enhanced Security of Symmetric Encryption Using Combination of Steganography with Visual Cryptography


Sherief H. Murad , Amr M. Gody , Tamer M. Barakat

Citation :

Sherief H. Murad , Amr M. Gody , Tamer M. Barakat, "Enhanced Security of Symmetric Encryption Using Combination of Steganography with Visual Cryptography," International Journal of Engineering Trends and Technology (IJETT), vol. 65, no. 2, pp. 149-154, 2018. Crossref, https://doi.org/10.14445/22315381/IJETT-V65P227

Abstract

Data security and confidentiality is required when communications over untrusted networks take place. Security tools such as cryptography and steganography are applied to achieve such objectives, but both have limitations and susceptible to attacks if they were used individually. To overcome these limitations, we proposed a powerful and secured system based on the integration of cryptography and steganography. The secret message is encrypted with blowfish cipher and visual cryptography. Finally, the encrypted data is embedded into two innocent cover images for future transmission. An extended analysis was made to prove the efficiency of the proposed model by measuring Mean-Square-Error (MSE), Peak-Signal-to-noise-Ratio (PSNR), and image histogram. The robustness was examined by launching statistical and 8-bit plane visual attacks. The proposed model provides a secure mean to transmit or store highly classified data that could be applied to the public security sector.


Keywords

Blowfish, Visual Cryptography, LSB

References

[1] S. William, “Cryptography and network security principles and practice”, 6th edition, Prentice Hall, New York, March 2013.
[2] Doshi, P. Jain, L. Gupta, "Steganography and Its Applications in Security", International Journal of Modern Engineering Research (IJMER), Vol.2, Pages 4634 – 4638, 2012.
[3] B. Schneier, “Description of a new variable-length key, 64-bit block cipher (blowfish) fast software encryption”, Cambridge security workshop proceedings (December 1993), springerverlag, 1994, pp. 191-204.
[4] S. Manku, K. Vasanth, "Blowfish Encryption Algorithm for Information Security", ARPN Journal of Engineering and Applied Science, Vol.10, Pages 4717-4719, 2015.M. Naor and A. Shamir, “Visual cryptography,” Advances in Cryptograhy: EUROCRYPT?94, LNCS, vol. 950, pp. 1–12, 1995.
[5] S.Chandramath., Ramesh Kumar R., Suresh R. and Harish S.,” An overview of visual cryptography”, International Journal of Computational Intelligence Techniques, Vol.1, Pages 32-37, 2010
[6] T. Morkel, J. H. P. Eloff, M. S. Olivier, "An Overview of Image Steganography", in Proceedings of the Fifth Annual Information Security South Africa Conference (ISSA2005), Sandton, South Africa, July 2005.
[7] B. Boehm, "StegExpose A Tool for Detecting LSB Steganography", master?s thesis, University of Kent, School of Computing, 2014.
[8] H. Y. Atown, "Hide and Encryption Fingerprint Image by using LSB and Transposition pixel by Spiral Method", International Journal of Computer Science and Mobile Computing (IJCSMC), Vol.3, Pages 624 – 632, 2014.
[9] S. Sekra, S. Balpande, K. Mulani, "LSB Based Steganography Using Genetic Algorithm and Visual Cryptography for Secured data Hiding and Transmission over Networks", International Journal of Computer Science and Engineering (IJETT-IJCSE), Vol.2, Pages 5 – 9, 2015.
[10] P. H. Dixit, K. B. Waskar, U. L. Bombale, "Multilevel Network Security Combining Cryptography and Steganography on ARM Platform", Journal of Embedded Systems, Vol.3, Pages 11 – 15, 2015.
[11] M. Gupta, D. Chauhan, "A Visual Cryptographic Scheme to Secure Image Shares Using Digital Watermarking", International Journal of Computer Science and Information Technologies (IJCSIT), Vol.6, Pages 4339 – 4343, 2015.
[12] T. S. Barhoom, S. M. A. Mousa, "A Steganography LSB Technique for Hiding Image Within Image using Blowfish Encryption Algorithm", International Journal of Research in Engineering and science (IJETT), Vol.3, Pages 61 – 66, 2015.
[13] M. D. Munjal, "Dual Steganography Technique Using Status LSB and DWT Algorithms", International Journal of Innovative Research in Computer and Communication Engineering (IJIRCCE), Vol.4, Pages 10483 – 10492, 2016.
[14] R. Rathod, D. Mistry, K. Patel, "Encrypted Steganography: A Combined Approach for Enhancing Image Security", International Journal of Innovative Research in Computer and Communication Engineering (IJIRCCE), Vol.4, Pages 9088 – 9096, 2016.
[15] P. K. Kavya, P. Haseena, "An Authentication Method Using A Verifible Visual Cryptography Scheme And A Steganographic Video Object Authentication Via Biometrics", International Journal of Innovative Research in Computer and Communication Engineering (IJIRCCE), Vol.6, Pages 470 – 477, 2017.
[16] B. Boehm, "StegExpose A Tool for Detecting LSB Steganography", master?s thesis, University of Kent, School of Computing, 2014.
[17] P. Bateman, H. G. Schaathun, "Image steganography and steganalysis", Master`s thesis, Department Of Computing, Faculty of Engineering and Physical Sciences,University of Surrey, Guildford, Surrey, United Kingdom, 2008


Time: 0.0014 sec Memory: 32 KB
Current: 1.88 MB
Peak: 4 MB