Skip to main content
Log in

A novel approach for dual layer security of message using Steganography and Cryptography

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

It is well known that the world is becoming more interconnected with the help of World Wide Web in distributed environment. Persons and Organizations want to share their valuable information over World Wide Web through internet in reliable and secure manner. The Steganography is an elegant strategy to pass on the private data to an approved beneficiary with the most solid wellbeing measure which prompts maintaining a strategic distance from the breaks of information security. These days the meaning of taking solid assurance measures in information correspondence medium has a difficult undertaking on account of security issues created by unapproved intercession. This introduction expects to provide another methodology dependent on a combination of Cryptography and Steganography system to hide the secret information into a cover object (Image, Text, Video etc.) with an improved level of security. In proposed methodology, the Elliptic Curve Cryptography (ECC) is used to encode the secret data and LSB Inversion method for embedding the scrambled information into a cover object. Proposed methodology based on two different techniques has achieved some fundamental characteristics known as information classification, respectability check, limit and heartiness which are the proof of successful execution of this proposed methodology. This new methodology strongly tried through a few steganalysis assaults like investigation of Chi-square, Visual and Histogram. Results show that stego picture has strong resistance power against all assaults.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Chang C-C, Lin M-H, Hu Y-C (2002) A fast and secure image hiding scheme based on LSB substitution. Int J Pattern Recognit Artif Intell 16(4):399–416

    Article  Google Scholar 

  2. Das R, Baykara M (2019) A novel approach to steganography: Enhanced least significant bit substitution algorithm integrated with self-determining encryption feature. 34(1): 23–32. 10.32604/csse.2019.34.023

  3. Desoky A (2008) A novel noiseless steganography paradigm. J Digit Forensic Pract 2:132–139. https://doi.org/10.1080/1556728080

    Article  Google Scholar 

  4. Hsu C-H, Manogaran G, Panchatcharam P, Vivekanandan S (2018) A new approachfor prediction of lung carcinoma using back propagation neural network with decision tree classifiers. J Ambient Intell Humanized Comput: 1–12. https://doi.org/10.1109/SC2.2018.00023

  5. Kekre HB, Athawale A, Halarnkar PN (2009) Performance evaluation of pixel value differencing and Kekre’s modified algorithm for information hiding in images. Proceedings of the ACM International Conference on Advances in Computing, Communication and Control (ICAC3), pp 342–346

  6. Kumar PM, Lokesh S, Varatharajan R, Babu GC, Parthasarathy P (2018) Cloud and IoT based diseaseprediction and diagnosis system for healthcare using fuzzy neural classifier. Futur Gener Comput Syst 86:527–534

    Article  Google Scholar 

  7. Liao X, Wena Q-y, Zhang J (2010) A steganographic method for digital images with four-pixel differencingand modified LSB substitution. IEEE Trans Image Process 10(22):1–8

    Google Scholar 

  8. Lokesh S, Kumar PM, Devi MR, Parthasarathy P, Gokulnath C (2018) An automatic Tamil speech recognition system by using bidirectional recurrent neural network with self-organizing map. Neural Comput Appl: 1–11. https://doi.org/10.1007/s00521-018-3466-5

  9. Mandal JK, Das D (2012) Steganography using adaptive pixel value differencing (APVD) for gray images through exclusion of underflow/overflow. Computer Science & Information Series, ISBN: 978-1-921987-03-8, pp 93–102

  10. Mathan K, Kumar PM, Panchatcharam P, Manogaran G, Varadharajan R (2018) A novel Gini indexdecision tree data mining method with neural network classifiers for prediction of heart disease. Design Automation for Embedded Systems, 1–18

  11. Meng R, Cui Q, Zhou Z, Yuan C, Sun X (2020) A novel steganography algorithm based on instance segmentation. CMC 63(1):183-196

  12. Pan J-S, Huang H-S, Jain LC (2007) Intelligent multimedia data hiding: New Directions. https://doi.org/10.1007/978-3-540-71169-8

  13. Pan J-S, Huang H-S, Jain LC (2009) Information hiding and applications. Springer. https://doi.org/10.1007/978-3-642-02335-4

  14. Pan J-S, Huang H-S, Jain LC , Zhao Y (2013) Recent advances in information hiding and applications

  15. Parthasarathy P, Vivekanandan S (2018) A typical IoT architecture-based regular monitoring of arthritisdisease using time wrapping algorithm. Int J Comput Appl: 1–11. https://doi.org/10.1080/1206212X.2018.1457471

  16. Parthasarathy P, Vivekanandan S (2018) A numerical modelling of an amperometric-enzymatic based uricacid biosensor for GOUT arthritis diseases. Informatics in Medicine Unlocked. https://doi.org/10.1016/J.IMU.2018.03.001

  17. Parthasarathy P, Vivekanandan S, Parthasarathy P, Vivekanandan S (2018) Investigation on uric acid biosensor model for enzyme layerthickness for the application of arthritis disease diagnosis. Health Inf Sci Syst 6:1–6

  18. RajeshKumar N, Yuvaraj D, Manikandan G, BalaKrishnan R, Karthikeyan B, Narasimhan D, Raajan NR (2020) Secret image communication scheme based on visual cryptography and tetrolet tiling patterns. 65(2):1283–1301.https://doi.org/10.32604/cmc.2020.011226

  19. Shahid Rahma F, Masood WU, Khan N, Ullah FQ, Khan G, Tsaramirsis S, Ashraf M (2020) A novel approach of image steganography for secure communication based on LSB substitution technique. 64(1):31-61. https://doi.org/10.32604/cmc.2020.09186

  20. Shanthakumari R, Malliga S (2015), Data hiding in image using tree based parity check with LSB matching revisited algorithm. Int J Innov Res Comput Commun Eng 3(6). Corpus ID: 212474776,SEMANTIC SHOLAR

  21. Shanthakumari R, Malliga S (2017) Information hiding in digital images using modified LSB substitutionwith multi-pixel differencing and HL code. Asian J Res Soc Sci Humanit 7(1):198–207

    Google Scholar 

  22. Shanthakumari R, Malliga S, Dheepika S (2014) Data hiding scheme in spatial domain. Int J Comput Sci Eng Technol 4(12):400–403

    Google Scholar 

  23. Sharmila B, Shanthakumari R (2012) Efficient adaptive steganography for color images based on LSBMR algorithm. ICTACT J Image Video Process 02:03

    Google Scholar 

  24. Sundarasekar R, Thanjaivadivel M, Manogaran G, Kumar PM, Varatharajan R, Chilamkurti N, Hsu CH (2018) Internet of things with maximal overlap discrete wavelet transform for remote health monitoring ofabnormal ECG signals. J Med Syst 42(11):228

    Article  Google Scholar 

  25. Tyagi V, Kumar A (2012) Image steganography using least significant bit with cryptography. J Glob Res Comput Sci 3(3):53–55

    Google Scholar 

  26. Varatharajan R, Preethi AP, Manogaran G, Kumar PM, Sundarasekar R (2018) Stealthy attack detection inmulti-channel multi-radio wireless networks. Multimedia Tools and Applications 77(14):18503–18526. https://doi.org/10.1007/s11042-018-5866-z

    Article  Google Scholar 

  27. Wu M-Y, Ho Y-K, Lee J-H (2004) An iterative method of palette-based image steganography. J Pattern Recognit Lett 25. https://doi.org/10.1016/j.patrec.2003.10.013

  28. Wu HC, Wu NI, Tsai CS, Hwang MS (2005) Image steganographic scheme based on pixel- valuedifferencing and LSB replacement methods. IEE Proc Vis Image Signal Process 152(5):611–615

  29. Xiang-yang L, Wang D, Ping W, Fen-lin L (2008) A review on blind detection for image steganography. J Signal Process 88(9):2138–2157. https://doi.org/10.1016/j.sigpro.2008.03.016

    Article  MATH  Google Scholar 

  30. Yang C-H, Weng C-Y, Tso H-K, Wang S-J (2011) A data hiding scheme using the varieties of pixel-valuedifferencing in multimedia images. J Syst Softw 84(4):669–678

    Article  Google Scholar 

  31. Zhang X (2011) Reversible data hiding in encrypted image. IEEE Signal Process Lett 18(4):255–258

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Reena Bansal.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Bansal, R., Badal, N. A novel approach for dual layer security of message using Steganography and Cryptography. Multimed Tools Appl 81, 20669–20684 (2022). https://doi.org/10.1007/s11042-022-12084-y

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-022-12084-y

Keywords

Navigation