Skip to main content

Art of Misdirection Using AES, Bi-layer Steganography and Novel King-Knight’s Tour Algorithm

  • Conference paper
  • First Online:
Advances in Signal Processing and Intelligent Recognition Systems

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 425))

  • 1685 Accesses

Abstract

Nowadays, the need for of data-integrity and privacy is higher than ever. From small bank transactions to large-scale classified military information, these factors have been prerequisites. This classified information can be faked deliberately by the sender with the help of a pseudo secret in order to increase the level of security. Cryptography makes this information unreadable and steganography hides the same. This paper brings together the paths of steganography and Rijndael encryption, which is commonly known as the AES. The secret image or text-file is encrypted using AES algorithm and is then camouflaged into the pseudo-secret image using a modified proposed Knight’s Tour-inspired chess-based algorithm that enhances data diffusion. Then the pseudo-secret image/text is once again encrypted using the AES algorithm and is masked into the cover image/text using a checkerboard-based location map. Thus lossless, highly secure, nested-layer steganography is achieved with high complexity and high PSNR for various extension types of images as illustrated in the paper.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

REFERENCES

  1. Katz, J., Lindell, Y.: Introduction to modern cryptography. CRC Press, London (2014)

    Google Scholar 

  2. .Zhang, Y.P., Zhai, Z.J., Liu, W., et al.: Digital image encryption algorithm based on chaos and improved DES. In: IEEE International Conference on Systems, Man and Cybernetics (2009)

    Google Scholar 

  3. Schneier, B.: Applied cryptography: protocols algorithms and source code in C. Wiley, New York (1996)

    Google Scholar 

  4. Menezes, A.J., Oorschot, P.C.V., Vanstone, S.A.: Handbook of applied cryptography. CRC Press, Boca Raton (1997)

    Google Scholar 

  5. .Rajput, A.S., Mishra, N., Sharma, S.: Towards the growth of image encryption and authentication schemes. In: IEEE International Conference on Advances in Computing, Communications and Informatics (ICACCI) (2013)

    Google Scholar 

  6. .Qiu, J., Wang, P.: An image encryption and authentication scheme. In: IEEE Seventh International Conference on Computational Intelligence and Security (CIS) (2011)

    Google Scholar 

  7. .Krishnagopal, S., Pratap, S., Prakash, B.: Image encryption and steganography using chaotic maps with a double key protection. In: Proceedings of Fourth International Conference on Soft Computing for Problem Solving. Springer, India (2015)

    Google Scholar 

  8. Nassar, S.S., Ayad, N.M., Kollash, H.M., et al.: Multi-level Security Technique Using Steganography with Chaotic Encryption. Digital Image Processing 6(3) (2014)

    Google Scholar 

  9. Patel, F.R., Cheeran, A.N.: Performance Evaluation of Steganography and AES encryption based on different formats of the Image. Performance Evaluation 4(5) (2015)

    Google Scholar 

  10. .Islam, M.R., Siddiqa, A., Uddin, M.P., et al.: An efficient filtering based approach improving LSB image steganography using status bit along with AES cryptography. In: IEEE International Conference on Informatics, Electronics and Vision (ICIEV) (2014)

    Google Scholar 

  11. .Mare, S.F., Vladutiu, M., Prodan, L.: Secret data communication system using Steganography, AES and RSA. In: 17th IEEE International Symposium for Design and Technology in Electronic Packaging (SIITME) (2011)

    Google Scholar 

  12. .Kadam, P., Nawale, M., Kandhare, A., et al.: Separable reversible encrypted data hiding in encrypted image using AES Algorithm and Lossy technique. In: International Conference on Pattern Recognition, Informatics and Mobile Engineering (PRIME) (2013)

    Google Scholar 

  13. .Peinado, A., García, A.O.: Reducing the key space of an image encryption scheme based on two-round diffusion process. In: International Joint Conference. Springer International (2015)

    Google Scholar 

  14. Saini, J.K., Verma, H.K.: A hybrid approach for image security by combining encryption and steganography. In: IEEE Second International Conference on Image Information Processing (ICIIP) (2013)

    Google Scholar 

  15. .Thanikaiselvan, V., Arulmozhivarman, P., Amirtharajan, R., Rayappan, J.B.B.: Horse riding and hiding in image for data guarding. In: Procedia Engineering (2012)

    Google Scholar 

  16. Paar, C., Pelzl, J.: Understanding cryptography: a textbook for students and practitioners. Springer Science & Business Media (2009)

    Google Scholar 

  17. Sanchez-Avila, C., Sanchez-Reillo, R.: The Rijndael block cipher (AES proposal): a comparison with DES. In: IEEE 35th International Carnahan Conference on Security Technology (2001)

    Google Scholar 

  18. Chan, C.-K., Cheng, L.-M.: Hiding data in images by simple LSB substitution. Pattern recognition 37(3) (2004)

    Google Scholar 

  19. Bender, W., Gruhl, D., Morimoto, N., et al.: Techniques for data hiding. IBM Systems Journal 35 (1996)

    Google Scholar 

  20. Amirtharajan, R., Anushiadevi, R., Meena, V., et al.: Image Hides Image: A Secret Stego Tri-layer Approach. Research Journal of Information Technology (2013)

    Google Scholar 

  21. Jung, K.H., Ha, K.J., Yoo, K.Y.: Image data hiding method based on multi-pixel differencing and LSB substitution methods. In: International Conference on Convergence and Hybrid Information Technology (ICHIT) (2008)

    Google Scholar 

  22. Ian, P.: An efficient algorithm for the Knight’s tour problem. Discrete Applied Mathematics (1997)

    Google Scholar 

  23. Gotelli, N.J., Entsminger, G.L.: Swap and fill algorithms in null model analysis: rethinking the knight’s tour. Oecologia (2001)

    Google Scholar 

  24. Daemen, J., Rijmen, V.: The design of Rijndael: AES-the advanced encryption standard. Springer Science & Business Media (2013)

    Google Scholar 

  25. Pareek Narendra, K.: Design and analysis of a novel digital image encryption scheme. arXiv preprint arXiv:1204.1603 (2012)

  26. Manisha, M., Malvika, S.S., Karthikeyan, B., et al.: Devanagari text embedding in a gray image: an offbeat approach. In: 2nd International Conference on Electronics and Communication Systems (ICECS) (2015)

    Google Scholar 

  27. Karthikeyan, B., Chakravarthy, J., Ramasubramanian, S.: Amalgamation of scanning paths and modified hill cipher for secure Steganography. Australian Journal of Basic and Applied Sciences (2012)

    Google Scholar 

  28. Daneshkhah, A., Aghaeinia, H., Seyedi, S.H.: A more secure steganography method in spatial domain. In: International Conference on Intelligent Systems, Modelling and Simulation (ISMS) (2011)

    Google Scholar 

  29. Janakiraman, S., Anitha Mary, A., Chakravarthy, J., et al.: Smart bit manipulation for K bit encoded hiding in K-1 pixel bits. In: 3rd International Conference on Trendz in Information Sciences and Computing (TISC) (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sudharshan Chakravarthy .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Chakravarthy, S., Sharon, V., Balasubramanian, K., Vaithiyanathan, V. (2016). Art of Misdirection Using AES, Bi-layer Steganography and Novel King-Knight’s Tour Algorithm. In: Thampi, S., Bandyopadhyay, S., Krishnan, S., Li, KC., Mosin, S., Ma, M. (eds) Advances in Signal Processing and Intelligent Recognition Systems. Advances in Intelligent Systems and Computing, vol 425. Springer, Cham. https://doi.org/10.1007/978-3-319-28658-7_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-28658-7_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-28656-3

  • Online ISBN: 978-3-319-28658-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics