Abstract
It is well known that the world is becoming more interconnected with the help of World Wide Web in distributed environment. Persons and Organizations want to share their valuable information over World Wide Web through internet in reliable and secure manner. The Steganography is an elegant strategy to pass on the private data to an approved beneficiary with the most solid wellbeing measure which prompts maintaining a strategic distance from the breaks of information security. These days the meaning of taking solid assurance measures in information correspondence medium has a difficult undertaking on account of security issues created by unapproved intercession. This introduction expects to provide another methodology dependent on a combination of Cryptography and Steganography system to hide the secret information into a cover object (Image, Text, Video etc.) with an improved level of security. In proposed methodology, the Elliptic Curve Cryptography (ECC) is used to encode the secret data and LSB Inversion method for embedding the scrambled information into a cover object. Proposed methodology based on two different techniques has achieved some fundamental characteristics known as information classification, respectability check, limit and heartiness which are the proof of successful execution of this proposed methodology. This new methodology strongly tried through a few steganalysis assaults like investigation of Chi-square, Visual and Histogram. Results show that stego picture has strong resistance power against all assaults.
Similar content being viewed by others
References
Chang C-C, Lin M-H, Hu Y-C (2002) A fast and secure image hiding scheme based on LSB substitution. Int J Pattern Recognit Artif Intell 16(4):399–416
Das R, Baykara M (2019) A novel approach to steganography: Enhanced least significant bit substitution algorithm integrated with self-determining encryption feature. 34(1): 23–32. 10.32604/csse.2019.34.023
Desoky A (2008) A novel noiseless steganography paradigm. J Digit Forensic Pract 2:132–139. https://doi.org/10.1080/1556728080
Hsu C-H, Manogaran G, Panchatcharam P, Vivekanandan S (2018) A new approachfor prediction of lung carcinoma using back propagation neural network with decision tree classifiers. J Ambient Intell Humanized Comput: 1–12. https://doi.org/10.1109/SC2.2018.00023
Kekre HB, Athawale A, Halarnkar PN (2009) Performance evaluation of pixel value differencing and Kekre’s modified algorithm for information hiding in images. Proceedings of the ACM International Conference on Advances in Computing, Communication and Control (ICAC3), pp 342–346
Kumar PM, Lokesh S, Varatharajan R, Babu GC, Parthasarathy P (2018) Cloud and IoT based diseaseprediction and diagnosis system for healthcare using fuzzy neural classifier. Futur Gener Comput Syst 86:527–534
Liao X, Wena Q-y, Zhang J (2010) A steganographic method for digital images with four-pixel differencingand modified LSB substitution. IEEE Trans Image Process 10(22):1–8
Lokesh S, Kumar PM, Devi MR, Parthasarathy P, Gokulnath C (2018) An automatic Tamil speech recognition system by using bidirectional recurrent neural network with self-organizing map. Neural Comput Appl: 1–11. https://doi.org/10.1007/s00521-018-3466-5
Mandal JK, Das D (2012) Steganography using adaptive pixel value differencing (APVD) for gray images through exclusion of underflow/overflow. Computer Science & Information Series, ISBN: 978-1-921987-03-8, pp 93–102
Mathan K, Kumar PM, Panchatcharam P, Manogaran G, Varadharajan R (2018) A novel Gini indexdecision tree data mining method with neural network classifiers for prediction of heart disease. Design Automation for Embedded Systems, 1–18
Meng R, Cui Q, Zhou Z, Yuan C, Sun X (2020) A novel steganography algorithm based on instance segmentation. CMC 63(1):183-196
Pan J-S, Huang H-S, Jain LC (2007) Intelligent multimedia data hiding: New Directions. https://doi.org/10.1007/978-3-540-71169-8
Pan J-S, Huang H-S, Jain LC (2009) Information hiding and applications. Springer. https://doi.org/10.1007/978-3-642-02335-4
Pan J-S, Huang H-S, Jain LC , Zhao Y (2013) Recent advances in information hiding and applications
Parthasarathy P, Vivekanandan S (2018) A typical IoT architecture-based regular monitoring of arthritisdisease using time wrapping algorithm. Int J Comput Appl: 1–11. https://doi.org/10.1080/1206212X.2018.1457471
Parthasarathy P, Vivekanandan S (2018) A numerical modelling of an amperometric-enzymatic based uricacid biosensor for GOUT arthritis diseases. Informatics in Medicine Unlocked. https://doi.org/10.1016/J.IMU.2018.03.001
Parthasarathy P, Vivekanandan S, Parthasarathy P, Vivekanandan S (2018) Investigation on uric acid biosensor model for enzyme layerthickness for the application of arthritis disease diagnosis. Health Inf Sci Syst 6:1–6
RajeshKumar N, Yuvaraj D, Manikandan G, BalaKrishnan R, Karthikeyan B, Narasimhan D, Raajan NR (2020) Secret image communication scheme based on visual cryptography and tetrolet tiling patterns. 65(2):1283–1301.https://doi.org/10.32604/cmc.2020.011226
Shahid Rahma F, Masood WU, Khan N, Ullah FQ, Khan G, Tsaramirsis S, Ashraf M (2020) A novel approach of image steganography for secure communication based on LSB substitution technique. 64(1):31-61. https://doi.org/10.32604/cmc.2020.09186 “
Shanthakumari R, Malliga S (2015), Data hiding in image using tree based parity check with LSB matching revisited algorithm. Int J Innov Res Comput Commun Eng 3(6). Corpus ID: 212474776,SEMANTIC SHOLAR
Shanthakumari R, Malliga S (2017) Information hiding in digital images using modified LSB substitutionwith multi-pixel differencing and HL code. Asian J Res Soc Sci Humanit 7(1):198–207
Shanthakumari R, Malliga S, Dheepika S (2014) Data hiding scheme in spatial domain. Int J Comput Sci Eng Technol 4(12):400–403
Sharmila B, Shanthakumari R (2012) Efficient adaptive steganography for color images based on LSBMR algorithm. ICTACT J Image Video Process 02:03
Sundarasekar R, Thanjaivadivel M, Manogaran G, Kumar PM, Varatharajan R, Chilamkurti N, Hsu CH (2018) Internet of things with maximal overlap discrete wavelet transform for remote health monitoring ofabnormal ECG signals. J Med Syst 42(11):228
Tyagi V, Kumar A (2012) Image steganography using least significant bit with cryptography. J Glob Res Comput Sci 3(3):53–55
Varatharajan R, Preethi AP, Manogaran G, Kumar PM, Sundarasekar R (2018) Stealthy attack detection inmulti-channel multi-radio wireless networks. Multimedia Tools and Applications 77(14):18503–18526. https://doi.org/10.1007/s11042-018-5866-z
Wu M-Y, Ho Y-K, Lee J-H (2004) An iterative method of palette-based image steganography. J Pattern Recognit Lett 25. https://doi.org/10.1016/j.patrec.2003.10.013
Wu HC, Wu NI, Tsai CS, Hwang MS (2005) Image steganographic scheme based on pixel- valuedifferencing and LSB replacement methods. IEE Proc Vis Image Signal Process 152(5):611–615
Xiang-yang L, Wang D, Ping W, Fen-lin L (2008) A review on blind detection for image steganography. J Signal Process 88(9):2138–2157. https://doi.org/10.1016/j.sigpro.2008.03.016
Yang C-H, Weng C-Y, Tso H-K, Wang S-J (2011) A data hiding scheme using the varieties of pixel-valuedifferencing in multimedia images. J Syst Softw 84(4):669–678
Zhang X (2011) Reversible data hiding in encrypted image. IEEE Signal Process Lett 18(4):255–258
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Bansal, R., Badal, N. A novel approach for dual layer security of message using Steganography and Cryptography. Multimed Tools Appl 81, 20669–20684 (2022). https://doi.org/10.1007/s11042-022-12084-y
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-022-12084-y