Skip to main content

Braille Based Steganography System Using Dynamic Key Exchange

  • Conference paper
  • First Online:
Security in Computing and Communications (SSCC 2019)

Abstract

Cryptography provides a method for obscuring the original data, whereas steganography provides a means for obscuring the mere presence of data. Many different carriers are used such as audio, video, images etc. to hide the data. Images are the most commonly used carriers. Once the data is hidden, the image can then be sent to the receiver. This method is secure because only the sender and receiver are aware of the communication. Many different steganographic techniques have been proposed for secure data communication, but these are highly vulnerable to attacks when the presence of hidden data is exposed. In this paper, an improved image steganography method is proposed. The data is initially encrypted using RSA algorithm. Instead of using the traditional Least Significant Bit encoding, the proposed system uses a method similar to the Braille form of character representation. Using this representation, the encrypted text and the key are encoded into the image. The resultant image is the steganographic image that is used for communication. This proposed method has proven to be more secure than the existing methods. The results and experiments have been explained in detail.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Johnson, N.F., Jajodia, S.: Exploring steganography: seeing the unseen. Computer 31, 26–34 (1998)

    Article  Google Scholar 

  2. Ali, A.A., Saad, A.-H.S.: Image steganography technique by using Braille method of blind people (LSBraille). Int. J. Image Process. (IJIP) 7(1), 81–88 (2013)

    Google Scholar 

  3. Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)

    Article  MathSciNet  Google Scholar 

  4. Ali, A.A., et al.: Enhancing SMM image steganography method by using LSBraille image steganography Method (SMMWB; Secret Message Matching With Braille). Int. J. Comput. Appl. 70(8), 12–17 (2013)

    Google Scholar 

  5. Abdul-Sada, A.I.: Hiding data using LSB-3. J. Basrah Res. (Sci.) 33(4A), 81–88 (2007)

    Google Scholar 

  6. Ngo, H.H., Wu, X., Le, P.D., Wilson, C., Srinivasan, B.: Dynamic key cryptography and applications. IJ Network Secur. 10(3), 161–174 (2010)

    Google Scholar 

  7. Westfeld, A., Pfitzmann, A.: Attacks on steganographic systems. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 61–76. Springer, Heidelberg (2000). https://doi.org/10.1007/10719724_5

    Chapter  Google Scholar 

  8. Gupta, A., Walia, N.K.: Cryptography algorithms: a review. Citeseer (2014)

    Google Scholar 

  9. Bhattacharyya, S., Indu, P., Sanyal, G.: Hiding data in text using ASCII mapping technology (AMT). Int. J. Comput. Appl. 70(18), 29–37 (2013)

    Google Scholar 

  10. Rashid, A., Rahim, M.K.: Scrutiny of steganalysis for flipping steganography method. J. Adv. Math. Comput. Sci. 31(5), 1–18 (2019)

    Article  Google Scholar 

  11. Astuti, Y.P., Rachmawanto, E.H., Sari, C.A., et al.: Simple and secure image steganography using LSB and triple XOR operation on MSB. In: 2018 International Conference on Information and Communications Technology (ICOIACT), pp. 191–195 (2018)

    Google Scholar 

  12. Mewalal, N., Leung, W.S.: Improving hidden message extraction using LSB steganalysis techniques. In: Kim, K.J., Baek, N. (eds.) ICISA 2018. LNEE, vol. 514, pp. 273–284. Springer, Singapore (2019). https://doi.org/10.1007/978-981-13-1056-0_29

    Chapter  Google Scholar 

  13. Asok, A., Mohan, P.: Implementation and comparison of different data hiding techniques in image steganography. In: 2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI), pp. 1180–1183 (2019)

    Google Scholar 

  14. Pradhan, A., Sahu, A.K., Swain, G., Sekhar, K.R.: Performance evaluation parameters of image steganography techniques. In: 2016 International Conference on Research Advances in Integrated Navigation Systems (RAINS), pp. 1–8 (2016)

    Google Scholar 

  15. El-Loco G A few tools to discover hidden data. http://www.guillermito2.net/stegano/tools/index.html

  16. Braille Facts. https://www.royalblind.org/national-braille-week/about-braille/braille-facts

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shreyas Sriram .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sriram, S., Sathishkumar, S.P., Bhuvana, J. (2020). Braille Based Steganography System Using Dynamic Key Exchange. In: Thampi, S., Martinez Perez, G., Ko, R., Rawat, D. (eds) Security in Computing and Communications. SSCC 2019. Communications in Computer and Information Science, vol 1208. Springer, Singapore. https://doi.org/10.1007/978-981-15-4825-3_29

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-4825-3_29

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-4824-6

  • Online ISBN: 978-981-15-4825-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics