Abstract
Computers find application in virtually all aspect of human existence, especially in today’s modern world. Although this comes with a lot of benefits, it also comes with a number of undesirable consequences. Chief among these consequences is the rising concerns for security of information and even loss of privacy. Steganography, an Information hiding technique could be a fitting solution to these security issues. This paper presents an improved Steganography technique for ensuring the security of the widely spread and used internet materials or information that are shared globally with risk of vulnerability of attack. In this current research work, Elliptic Curve Cryptography (ECC) and Discrete Cosine Transform (DCT) Steganography were combined together to achieve effective security in the proposed system. A given plain text or secret message is first converted to a cipher text using ECC. The resultant encrypted text is then hidden under a cover-image using DCT-based image steganography technique to produce a final output called stego-image. To the Human Visual System (HVS), the stego-image remains the same as the original cover image. This ensures that the hidden secret message gets delivered to the target recipient without any suspicion. Standard metrics such as Peak Signal to Noise Ratio (PSNR) and Mean Square Error (MSE), as well as average computation time, were used to evaluate the performance of the proposed steganography system. The results indicate better performance compared to the conventional steganography systems. Thus the proposed system is a 2-level steganography system effective for storing sensitive data and even for securely transferring information over an open/enterprise network.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Alese, B.K., Gabriel, A.J., Olukayode, O., Daramola, O.A.: Modelling of risk management procedures for cybercrime control systems. In: Proceedings of the World Congress on Engineering (WCE 2014) London, United Kingdom. ISBN 978-988-19252-7-5
Daodu, M.N., Gabriel, A.J., Alese, B.K., Adetunmbi, A.O.: A Data Encryption Standard (DES) based web services security architecture. Ann. Comput. Sci. Ser. Tibiscus Univ. 14(2), 53–58 (2016)
Kuboye, B.M., Gabriel, A.J., Thompson, A.F., Joseph, V.O.: Analysis of algorithms in Long Term Evolution (LTE) network. J. Comput. Sci. Appl. 25(2), 59–71 (2018)
Gabriel, A.J., Egwuche, O.S.: Modelling the employees’ activities of public service sector using production rules. Anale. Seria Informatică 13(2), 65–68 (2015). Vol. XIII fasc. 2 – 2015 Annals. Computer Science Series, University of Timisoara, Romania
Iwasokun, G.B., Egwuche, O.S., Gabriel, A.J.: Neural network- based health personnel monitoring system. Afr. J. Comput. ICT IEEE 8(1), 79–87 (2015)
Gabriel, A.J., Alese, B.K., Adetunmbi, A.O., Adewale, O.S., Sarumi, O.A.: Post-quantum crystography system for secure electronic voting, open computer science. DeGruyter 9, 292–298 (2019)
Agboola, A.H., Gabriel, A.J., Aliyu, E.O., Alese, B.K.: Development of a fuzzy logic based rainfall prediction model. Int. J. Eng. Technol. 3(4), 427–435 (2013). ISSN 2049-3444
Alabi, O., Thompson, A.F., Alese, B.K., Gabriel, A.J.: Cloud application security using hybrid encryption. Commun. Appl. Electron. 7(33) (2020)
Gabriel, A.J., Alese, B.K., Adetunmbi, A.O., Adewale, O.S.: Post-quantum crystography; a combination of post-quantum cryptography and steganography. In: The 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013), Technically Co-Sponsored by IEEE UK/RI Computer Chapter, London, UK, pp. 454–457, 9th–12th December 2013
Gabriel, A.J., Alese, B.K., Adetunmbi, A.O., Adewale, O.S.: Post-quantum crystography based security framework for cloud computing. J. Internet Technol. Secured Trans. (JITST) 4(1), 351–357 (2015)
Malik, A., Sikka, G., Verma, H.K.: A high capacity text steganography scheme based on LZW compression and colour coding. Eng. Sci. Technol. Int. J. 4–11 (2016)
Vidhya, P.M., Paul, V.: A method for text steganography using malayalam text. Proc. Int. J. Comput. Sci. 46, 524–531 (2015)
Jain, M., Kumar, S.: Adaptive circular queue image steganography with RSA cryptosystem. Elsevier Perspect. Sci. 8, 417–420 (2016)
Sethi, P., Kapoor, V.: A proposed novel architecture for information hiding in image steganography by using genetic algorithm and cryptography. Proc. Comput. Sci. 2016(87), 61–66 (2016)
Cheong, S., Ling, H., Teh, P.: Encrypted steganography graphical password scheme for near field communication smartphone access control system. Elsevier Expert Syst. Appl. 41(14), 3561–3568 (2014)
Malathi, P., Gireeshkumar, T.: Relating the embedding efficiency of LSB steganography. Elsevier Proc. Comput. Sci. 2016(93), 878–885 (2016)
Snasel, V., Kromer, P., Safarik, J., Platos, J.: JPEG steganography with particle swarm optimization accelerated by AVX. Special Issue Paper (2019). https://doi.org/10.1002/cpe.544. Wiley; https://onlinelibrary.wiley.com
Chatterjee, A., Ghosal, S.K., Sarkar, R.: LSB based steganography with OCR: an intelligent amalgamation. Multimed Tools Appl. 79, 11747–11765 (2020). https://doi.org/10.1007/s11042-019-08472-6
Rachael, O., Misra, S., Ahuja, R., Adewumi, A., Ayeni, F., Mmaskeliunas, R.: Image steganography and steganalysis based on Least Significant Bit (LSB). In: Singh, P.K., Panigrahi, B.K., Suryadevara, N.K., Sharma, S.K., Singh, A.P. (eds.) Proceedings of ICETIT 2019. LNEE, vol. 605, pp. 1100–1111. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-30577-2_97
Balgurgi, P.P., Jagtap, S.K.: Audio steganography used for secure data transmission. In: Kumar, M.A., Selvarani, R., Kumar, T. (eds.) Proceedings of International Conference on Advances in Computing. Advances in Intelligent Systems and Computing, vol. 174. Springer, Heidelberg (2013). https://doi.org/10.1007/978-81-322-0740-5_83
Adeboje, O.T., Adetunmbi, A.O., Gabriel, A.J.: Embedding text in audio steganography system using advanced encryption standard and spread spectrum. Int. J. Comput. Appl. (0975–8887) 177(41), 46–51 (2020). https://doi.org/10.5120/ijca2020919
Wang, S., Sang, J., Song, X., Niu, X.: Least Significant Qubit (LSQb) information hiding algorithm for quantum for quantum image. Measurement 73, 352–359 (2015)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Gabriel, A.J., Adetunmbi, A.O., Obaila, P. (2020). A Two-Layer Image-Steganography System for Covert Communication Over Enterprise Network. In: Gervasi, O., et al. Computational Science and Its Applications – ICCSA 2020. ICCSA 2020. Lecture Notes in Computer Science(), vol 12254. Springer, Cham. https://doi.org/10.1007/978-3-030-58817-5_34
Download citation
DOI: https://doi.org/10.1007/978-3-030-58817-5_34
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-58816-8
Online ISBN: 978-3-030-58817-5
eBook Packages: Computer ScienceComputer Science (R0)