Abstract
Nowadays, the need for of data-integrity and privacy is higher than ever. From small bank transactions to large-scale classified military information, these factors have been prerequisites. This classified information can be faked deliberately by the sender with the help of a pseudo secret in order to increase the level of security. Cryptography makes this information unreadable and steganography hides the same. This paper brings together the paths of steganography and Rijndael encryption, which is commonly known as the AES. The secret image or text-file is encrypted using AES algorithm and is then camouflaged into the pseudo-secret image using a modified proposed Knight’s Tour-inspired chess-based algorithm that enhances data diffusion. Then the pseudo-secret image/text is once again encrypted using the AES algorithm and is masked into the cover image/text using a checkerboard-based location map. Thus lossless, highly secure, nested-layer steganography is achieved with high complexity and high PSNR for various extension types of images as illustrated in the paper.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
REFERENCES
Katz, J., Lindell, Y.: Introduction to modern cryptography. CRC Press, London (2014)
.Zhang, Y.P., Zhai, Z.J., Liu, W., et al.: Digital image encryption algorithm based on chaos and improved DES. In: IEEE International Conference on Systems, Man and Cybernetics (2009)
Schneier, B.: Applied cryptography: protocols algorithms and source code in C. Wiley, New York (1996)
Menezes, A.J., Oorschot, P.C.V., Vanstone, S.A.: Handbook of applied cryptography. CRC Press, Boca Raton (1997)
.Rajput, A.S., Mishra, N., Sharma, S.: Towards the growth of image encryption and authentication schemes. In: IEEE International Conference on Advances in Computing, Communications and Informatics (ICACCI) (2013)
.Qiu, J., Wang, P.: An image encryption and authentication scheme. In: IEEE Seventh International Conference on Computational Intelligence and Security (CIS) (2011)
.Krishnagopal, S., Pratap, S., Prakash, B.: Image encryption and steganography using chaotic maps with a double key protection. In: Proceedings of Fourth International Conference on Soft Computing for Problem Solving. Springer, India (2015)
Nassar, S.S., Ayad, N.M., Kollash, H.M., et al.: Multi-level Security Technique Using Steganography with Chaotic Encryption. Digital Image Processing 6(3) (2014)
Patel, F.R., Cheeran, A.N.: Performance Evaluation of Steganography and AES encryption based on different formats of the Image. Performance Evaluation 4(5) (2015)
.Islam, M.R., Siddiqa, A., Uddin, M.P., et al.: An efficient filtering based approach improving LSB image steganography using status bit along with AES cryptography. In: IEEE International Conference on Informatics, Electronics and Vision (ICIEV) (2014)
.Mare, S.F., Vladutiu, M., Prodan, L.: Secret data communication system using Steganography, AES and RSA. In: 17th IEEE International Symposium for Design and Technology in Electronic Packaging (SIITME) (2011)
.Kadam, P., Nawale, M., Kandhare, A., et al.: Separable reversible encrypted data hiding in encrypted image using AES Algorithm and Lossy technique. In: International Conference on Pattern Recognition, Informatics and Mobile Engineering (PRIME) (2013)
.Peinado, A., García, A.O.: Reducing the key space of an image encryption scheme based on two-round diffusion process. In: International Joint Conference. Springer International (2015)
Saini, J.K., Verma, H.K.: A hybrid approach for image security by combining encryption and steganography. In: IEEE Second International Conference on Image Information Processing (ICIIP) (2013)
.Thanikaiselvan, V., Arulmozhivarman, P., Amirtharajan, R., Rayappan, J.B.B.: Horse riding and hiding in image for data guarding. In: Procedia Engineering (2012)
Paar, C., Pelzl, J.: Understanding cryptography: a textbook for students and practitioners. Springer Science & Business Media (2009)
Sanchez-Avila, C., Sanchez-Reillo, R.: The Rijndael block cipher (AES proposal): a comparison with DES. In: IEEE 35th International Carnahan Conference on Security Technology (2001)
Chan, C.-K., Cheng, L.-M.: Hiding data in images by simple LSB substitution. Pattern recognition 37(3) (2004)
Bender, W., Gruhl, D., Morimoto, N., et al.: Techniques for data hiding. IBM Systems Journal 35 (1996)
Amirtharajan, R., Anushiadevi, R., Meena, V., et al.: Image Hides Image: A Secret Stego Tri-layer Approach. Research Journal of Information Technology (2013)
Jung, K.H., Ha, K.J., Yoo, K.Y.: Image data hiding method based on multi-pixel differencing and LSB substitution methods. In: International Conference on Convergence and Hybrid Information Technology (ICHIT) (2008)
Ian, P.: An efficient algorithm for the Knight’s tour problem. Discrete Applied Mathematics (1997)
Gotelli, N.J., Entsminger, G.L.: Swap and fill algorithms in null model analysis: rethinking the knight’s tour. Oecologia (2001)
Daemen, J., Rijmen, V.: The design of Rijndael: AES-the advanced encryption standard. Springer Science & Business Media (2013)
Pareek Narendra, K.: Design and analysis of a novel digital image encryption scheme. arXiv preprint arXiv:1204.1603 (2012)
Manisha, M., Malvika, S.S., Karthikeyan, B., et al.: Devanagari text embedding in a gray image: an offbeat approach. In: 2nd International Conference on Electronics and Communication Systems (ICECS) (2015)
Karthikeyan, B., Chakravarthy, J., Ramasubramanian, S.: Amalgamation of scanning paths and modified hill cipher for secure Steganography. Australian Journal of Basic and Applied Sciences (2012)
Daneshkhah, A., Aghaeinia, H., Seyedi, S.H.: A more secure steganography method in spatial domain. In: International Conference on Intelligent Systems, Modelling and Simulation (ISMS) (2011)
Janakiraman, S., Anitha Mary, A., Chakravarthy, J., et al.: Smart bit manipulation for K bit encoded hiding in K-1 pixel bits. In: 3rd International Conference on Trendz in Information Sciences and Computing (TISC) (2011)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Chakravarthy, S., Sharon, V., Balasubramanian, K., Vaithiyanathan, V. (2016). Art of Misdirection Using AES, Bi-layer Steganography and Novel King-Knight’s Tour Algorithm. In: Thampi, S., Bandyopadhyay, S., Krishnan, S., Li, KC., Mosin, S., Ma, M. (eds) Advances in Signal Processing and Intelligent Recognition Systems. Advances in Intelligent Systems and Computing, vol 425. Springer, Cham. https://doi.org/10.1007/978-3-319-28658-7_9
Download citation
DOI: https://doi.org/10.1007/978-3-319-28658-7_9
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-28656-3
Online ISBN: 978-3-319-28658-7
eBook Packages: EngineeringEngineering (R0)