- DEEPANSHI ARORA 1/13/FET/MCS/1/012 M.Tech DEPARTMENT OF ECE
LITERATURE SURVEY
New Directions in Cryptography
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. IT-22, NO. 6, NOVEMBER 1976 Invited Paper WHITFIELD DIFFIE AND MARTIN E. HELLMAN, MEMBER, IEEE
This paper suggests ways to solve these currently open problems. It
also discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing
A Steganography Implementation based on LSB &
DCT -Gurmeet Kaur and Aarti Kochhar; International Journal for Science and Emerging Technologies with Latest Trends (2012)
The paper proposes image hiding using
LSB and DCT based steganography and then comparing the results using PSNR. The analysis shows that the BER and PSNR is improved in the LSB Method but security sake DCT is the best method.
Enhancing the Security and Quality of LSB based Image
Steganography - Nadeem Akhtar, Pragati Johri, Shahbaaz Khan ;2013 5th International Conference on Computational
Intelligence and Communication Networks
In this technique, certain least significant bits of cover image are
inverted after LSB steganography that co-occur with some pattern of other bits and that reduces the number of modified LSBs. Thus, less number of least significant bits of cover image is altered in comparison to plain LSB method, improving the PSNR of stegoimage. To improve the robustness of steganography, RC4 algorithm has been used to achieve the randomization in hiding message image bits into cover image pixels instead of storing them sequentially. This process randomly disperses the bits of the message in the cover image and thus, making it harder for unauthorized people to extract the original message. The proposed method shows good enhancement to Least Significant Bit technique in consideration to security as well as image quality.
An Improved Inverted LSB Image Steganography
Nadeem Akhtar , International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT) 2014 IEEE An improvement in the plain LSB based image steganography is proposed and implemented. The paper proposes the use of bit inversion technique to improve the stego image quality. In these techniques, LSBs of some pixels of cover image are inverted if they occur with a particular pattern of some bits of the pixels. In this way, less number of pixels is modified in comparison to plain LSB method. So PSNR of stegoimage is improved. In future work, other bit combinations of cover image pixels can be considered. There are 21 C C2) bit combinations of two bits in a pixel leaving the LSB. Further, more bits of cover image pixels can be considered for analysis
Cryptography and Steganography A Survey
A.Joseph Raphael, Dr. V Sundaram, Int. J. Comp. Tech. Appl., 2011, Vol 2 (3), 626-630
Objective : focuses on the strength of
combining cryptography and stegnography methods to enhance the security of communication over an open channel. Gives a thorough explanation of cryptography and steganography algorithms and a comparison of both techniques.
Securing Information: Cryptography and
Steganography Ramakrishna Mathe et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 3 (3) , 2012 Objective : This paper proposes a new approach to public-key steganography based on matching method to hide the secret information inside 24-bit image file. In the proposed method, the stego-key is generated by applying a public key exchange protocol which is based on discrete logarithm hard problem such as Diffie Hellman. We implemented the public-key steganography based on matching method in different selected regions of an image to show the performance of the proposed method. In our implementation, we used 600400 bitmap image file to hide 5 KB text data. Both of the two communication parties should find the secret key (stegokey) first by applying Diffie-Hellman public-key exchange protocol to perform high level of security.
Double layer security using visual cryptography
and transform based steganography - PallaviB1, Vishala I. L2 IJRET: International Journal of Research in Engineering and Technology Volume: 03 Special Issue: 03 | May-2014 | NCRIET-2014, Available @ http://www.ijret.org
Objective : To hide information using
visual cryptography and DCT based steganography The proposed scheme has several advantages like 2 levels of security for various applications It requires more computation time.
PUBLIC-KEY STEGANOGRAPHY BASED ON
MODIFIED LSB METHOD Volume 3, No. 4, April 2012 Journal of Global Research in Computer Science Vivek Jain1, Lokesh Kumar2
This paper proposed a technique to
implement steganogaraphy and cryptography together to hide the data into an image. This technique describes as: Find the shared stego-key between the two communication parties by applying Diffie-Hellman Key exchange protocol, then encrypt the data using secret stego-key.