Skip to main content

A Two-Layer Image-Steganography System for Covert Communication Over Enterprise Network

  • Conference paper
  • First Online:
Computational Science and Its Applications – ICCSA 2020 (ICCSA 2020)

Abstract

Computers find application in virtually all aspect of human existence, especially in today’s modern world. Although this comes with a lot of benefits, it also comes with a number of undesirable consequences. Chief among these consequences is the rising concerns for security of information and even loss of privacy. Steganography, an Information hiding technique could be a fitting solution to these security issues. This paper presents an improved Steganography technique for ensuring the security of the widely spread and used internet materials or information that are shared globally with risk of vulnerability of attack. In this current research work, Elliptic Curve Cryptography (ECC) and Discrete Cosine Transform (DCT) Steganography were combined together to achieve effective security in the proposed system. A given plain text or secret message is first converted to a cipher text using ECC. The resultant encrypted text is then hidden under a cover-image using DCT-based image steganography technique to produce a final output called stego-image. To the Human Visual System (HVS), the stego-image remains the same as the original cover image. This ensures that the hidden secret message gets delivered to the target recipient without any suspicion. Standard metrics such as Peak Signal to Noise Ratio (PSNR) and Mean Square Error (MSE), as well as average computation time, were used to evaluate the performance of the proposed steganography system. The results indicate better performance compared to the conventional steganography systems. Thus the proposed system is a 2-level steganography system effective for storing sensitive data and even for securely transferring information over an open/enterprise network.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Alese, B.K., Gabriel, A.J., Olukayode, O., Daramola, O.A.: Modelling of risk management procedures for cybercrime control systems. In: Proceedings of the World Congress on Engineering (WCE 2014) London, United Kingdom. ISBN 978-988-19252-7-5

    Google Scholar 

  2. Daodu, M.N., Gabriel, A.J., Alese, B.K., Adetunmbi, A.O.: A Data Encryption Standard (DES) based web services security architecture. Ann. Comput. Sci. Ser. Tibiscus Univ. 14(2), 53–58 (2016)

    Google Scholar 

  3. Kuboye, B.M., Gabriel, A.J., Thompson, A.F., Joseph, V.O.: Analysis of algorithms in Long Term Evolution (LTE) network. J. Comput. Sci. Appl. 25(2), 59–71 (2018)

    Google Scholar 

  4. Gabriel, A.J., Egwuche, O.S.: Modelling the employees’ activities of public service sector using production rules. Anale. Seria Informatică 13(2), 65–68 (2015). Vol. XIII fasc. 2 – 2015 Annals. Computer Science Series, University of Timisoara, Romania

    Google Scholar 

  5. Iwasokun, G.B., Egwuche, O.S., Gabriel, A.J.: Neural network- based health personnel monitoring system. Afr. J. Comput. ICT IEEE 8(1), 79–87 (2015)

    Google Scholar 

  6. Gabriel, A.J., Alese, B.K., Adetunmbi, A.O., Adewale, O.S., Sarumi, O.A.: Post-quantum crystography system for secure electronic voting, open computer science. DeGruyter 9, 292–298 (2019)

    Google Scholar 

  7. Agboola, A.H., Gabriel, A.J., Aliyu, E.O., Alese, B.K.: Development of a fuzzy logic based rainfall prediction model. Int. J. Eng. Technol. 3(4), 427–435 (2013). ISSN 2049-3444

    Google Scholar 

  8. Alabi, O., Thompson, A.F., Alese, B.K., Gabriel, A.J.: Cloud application security using hybrid encryption. Commun. Appl. Electron. 7(33) (2020)

    Google Scholar 

  9. Gabriel, A.J., Alese, B.K., Adetunmbi, A.O., Adewale, O.S.: Post-quantum crystography; a combination of post-quantum cryptography and steganography. In: The 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013), Technically Co-Sponsored by IEEE UK/RI Computer Chapter, London, UK, pp. 454–457, 9th–12th December 2013

    Google Scholar 

  10. Gabriel, A.J., Alese, B.K., Adetunmbi, A.O., Adewale, O.S.: Post-quantum crystography based security framework for cloud computing. J. Internet Technol. Secured Trans. (JITST) 4(1), 351–357 (2015)

    Article  Google Scholar 

  11. Malik, A., Sikka, G., Verma, H.K.: A high capacity text steganography scheme based on LZW compression and colour coding. Eng. Sci. Technol. Int. J. 4–11 (2016)

    Google Scholar 

  12. Vidhya, P.M., Paul, V.: A method for text steganography using malayalam text. Proc. Int. J. Comput. Sci. 46, 524–531 (2015)

    Article  Google Scholar 

  13. Jain, M., Kumar, S.: Adaptive circular queue image steganography with RSA cryptosystem. Elsevier Perspect. Sci. 8, 417–420 (2016)

    Article  Google Scholar 

  14. Sethi, P., Kapoor, V.: A proposed novel architecture for information hiding in image steganography by using genetic algorithm and cryptography. Proc. Comput. Sci. 2016(87), 61–66 (2016)

    Article  Google Scholar 

  15. Cheong, S., Ling, H., Teh, P.: Encrypted steganography graphical password scheme for near field communication smartphone access control system. Elsevier Expert Syst. Appl. 41(14), 3561–3568 (2014)

    Article  Google Scholar 

  16. Malathi, P., Gireeshkumar, T.: Relating the embedding efficiency of LSB steganography. Elsevier Proc. Comput. Sci. 2016(93), 878–885 (2016)

    Article  Google Scholar 

  17. Snasel, V., Kromer, P., Safarik, J., Platos, J.: JPEG steganography with particle swarm optimization accelerated by AVX. Special Issue Paper (2019). https://doi.org/10.1002/cpe.544. Wiley; https://onlinelibrary.wiley.com

  18. Chatterjee, A., Ghosal, S.K., Sarkar, R.: LSB based steganography with OCR: an intelligent amalgamation. Multimed Tools Appl. 79, 11747–11765 (2020). https://doi.org/10.1007/s11042-019-08472-6

  19. Rachael, O., Misra, S., Ahuja, R., Adewumi, A., Ayeni, F., Mmaskeliunas, R.: Image steganography and steganalysis based on Least Significant Bit (LSB). In: Singh, P.K., Panigrahi, B.K., Suryadevara, N.K., Sharma, S.K., Singh, A.P. (eds.) Proceedings of ICETIT 2019. LNEE, vol. 605, pp. 1100–1111. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-30577-2_97

    Chapter  Google Scholar 

  20. Balgurgi, P.P., Jagtap, S.K.: Audio steganography used for secure data transmission. In: Kumar, M.A., Selvarani, R., Kumar, T. (eds.) Proceedings of International Conference on Advances in Computing. Advances in Intelligent Systems and Computing, vol. 174. Springer, Heidelberg (2013). https://doi.org/10.1007/978-81-322-0740-5_83

  21. Adeboje, O.T., Adetunmbi, A.O., Gabriel, A.J.: Embedding text in audio steganography system using advanced encryption standard and spread spectrum. Int. J. Comput. Appl. (0975–8887) 177(41), 46–51 (2020). https://doi.org/10.5120/ijca2020919

    Article  Google Scholar 

  22. Wang, S., Sang, J., Song, X., Niu, X.: Least Significant Qubit (LSQb) information hiding algorithm for quantum for quantum image. Measurement 73, 352–359 (2015)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Arome Junior Gabriel .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Gabriel, A.J., Adetunmbi, A.O., Obaila, P. (2020). A Two-Layer Image-Steganography System for Covert Communication Over Enterprise Network. In: Gervasi, O., et al. Computational Science and Its Applications – ICCSA 2020. ICCSA 2020. Lecture Notes in Computer Science(), vol 12254. Springer, Cham. https://doi.org/10.1007/978-3-030-58817-5_34

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-58817-5_34

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-58816-8

  • Online ISBN: 978-3-030-58817-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics