Abstract
Cryptography provides a method for obscuring the original data, whereas steganography provides a means for obscuring the mere presence of data. Many different carriers are used such as audio, video, images etc. to hide the data. Images are the most commonly used carriers. Once the data is hidden, the image can then be sent to the receiver. This method is secure because only the sender and receiver are aware of the communication. Many different steganographic techniques have been proposed for secure data communication, but these are highly vulnerable to attacks when the presence of hidden data is exposed. In this paper, an improved image steganography method is proposed. The data is initially encrypted using RSA algorithm. Instead of using the traditional Least Significant Bit encoding, the proposed system uses a method similar to the Braille form of character representation. Using this representation, the encrypted text and the key are encoded into the image. The resultant image is the steganographic image that is used for communication. This proposed method has proven to be more secure than the existing methods. The results and experiments have been explained in detail.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Johnson, N.F., Jajodia, S.: Exploring steganography: seeing the unseen. Computer 31, 26–34 (1998)
Ali, A.A., Saad, A.-H.S.: Image steganography technique by using Braille method of blind people (LSBraille). Int. J. Image Process. (IJIP) 7(1), 81–88 (2013)
Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)
Ali, A.A., et al.: Enhancing SMM image steganography method by using LSBraille image steganography Method (SMMWB; Secret Message Matching With Braille). Int. J. Comput. Appl. 70(8), 12–17 (2013)
Abdul-Sada, A.I.: Hiding data using LSB-3. J. Basrah Res. (Sci.) 33(4A), 81–88 (2007)
Ngo, H.H., Wu, X., Le, P.D., Wilson, C., Srinivasan, B.: Dynamic key cryptography and applications. IJ Network Secur. 10(3), 161–174 (2010)
Westfeld, A., Pfitzmann, A.: Attacks on steganographic systems. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 61–76. Springer, Heidelberg (2000). https://doi.org/10.1007/10719724_5
Gupta, A., Walia, N.K.: Cryptography algorithms: a review. Citeseer (2014)
Bhattacharyya, S., Indu, P., Sanyal, G.: Hiding data in text using ASCII mapping technology (AMT). Int. J. Comput. Appl. 70(18), 29–37 (2013)
Rashid, A., Rahim, M.K.: Scrutiny of steganalysis for flipping steganography method. J. Adv. Math. Comput. Sci. 31(5), 1–18 (2019)
Astuti, Y.P., Rachmawanto, E.H., Sari, C.A., et al.: Simple and secure image steganography using LSB and triple XOR operation on MSB. In: 2018 International Conference on Information and Communications Technology (ICOIACT), pp. 191–195 (2018)
Mewalal, N., Leung, W.S.: Improving hidden message extraction using LSB steganalysis techniques. In: Kim, K.J., Baek, N. (eds.) ICISA 2018. LNEE, vol. 514, pp. 273–284. Springer, Singapore (2019). https://doi.org/10.1007/978-981-13-1056-0_29
Asok, A., Mohan, P.: Implementation and comparison of different data hiding techniques in image steganography. In: 2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI), pp. 1180–1183 (2019)
Pradhan, A., Sahu, A.K., Swain, G., Sekhar, K.R.: Performance evaluation parameters of image steganography techniques. In: 2016 International Conference on Research Advances in Integrated Navigation Systems (RAINS), pp. 1–8 (2016)
El-Loco G A few tools to discover hidden data. http://www.guillermito2.net/stegano/tools/index.html
Braille Facts. https://www.royalblind.org/national-braille-week/about-braille/braille-facts
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Sriram, S., Sathishkumar, S.P., Bhuvana, J. (2020). Braille Based Steganography System Using Dynamic Key Exchange. In: Thampi, S., Martinez Perez, G., Ko, R., Rawat, D. (eds) Security in Computing and Communications. SSCC 2019. Communications in Computer and Information Science, vol 1208. Springer, Singapore. https://doi.org/10.1007/978-981-15-4825-3_29
Download citation
DOI: https://doi.org/10.1007/978-981-15-4825-3_29
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-4824-6
Online ISBN: 978-981-15-4825-3
eBook Packages: Computer ScienceComputer Science (R0)