You are on page 1of 10

DOUBLE LAYER SECURITY

USING CRYPTOGRAPHY AND


STEGANOGRAPHY

- DEEPANSHI ARORA
1/13/FET/MCS/1/012
M.Tech
DEPARTMENT OF ECE

LITERATURE SURVEY

New Directions in Cryptography


IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. IT-22, NO. 6, NOVEMBER 1976
Invited Paper
WHITFIELD DIFFIE AND MARTIN E. HELLMAN, MEMBER, IEEE

This paper suggests ways to solve these currently open problems. It


also discusses how the theories of communication and computation
are beginning to provide the tools to solve cryptographic problems of
long standing

A Steganography Implementation based on LSB &


DCT -Gurmeet Kaur and Aarti Kochhar; International Journal for Science
and Emerging Technologies with Latest Trends (2012)

The paper proposes image hiding using


LSB and DCT based steganography and
then comparing the results using PSNR.
The analysis shows that the BER and
PSNR is improved in the LSB Method
but security sake DCT is the best
method.

Enhancing the Security and Quality of LSB based Image


Steganography
- Nadeem Akhtar, Pragati Johri, Shahbaaz Khan ;2013 5th International Conference on Computational

Intelligence and Communication Networks

In this technique, certain least significant bits of cover image are


inverted after LSB steganography that co-occur with some pattern of
other bits and that reduces the number of modified LSBs.
Thus, less number of least significant bits of cover image is altered
in comparison to plain LSB method, improving the PSNR of
stegoimage.
To improve the robustness of steganography, RC4 algorithm has
been used to achieve the randomization in hiding message image
bits into cover image pixels instead of storing them sequentially.
This process randomly disperses the bits of the message in the
cover image and thus, making it harder for unauthorized people to
extract the original message.
The proposed method shows good enhancement to Least
Significant Bit technique in consideration to security as well as
image quality.

An Improved Inverted LSB Image Steganography


Nadeem Akhtar , International Conference on Issues and Challenges in
Intelligent Computing Techniques (ICICT) 2014 IEEE
An improvement in the plain LSB based image steganography is
proposed and implemented. The paper proposes the use of bit
inversion technique to improve the stego image quality.
In these techniques, LSBs of some pixels of cover image are
inverted if they occur with a particular pattern of some bits of the
pixels. In this way, less number of pixels is modified in comparison
to plain LSB method. So PSNR of stegoimage is improved.
In future work, other bit combinations of cover image pixels can be
considered. There are 21 C C2) bit combinations of two bits in a
pixel leaving the LSB. Further, more bits of cover image pixels can
be considered for analysis

Cryptography and Steganography A Survey


A.Joseph Raphael, Dr. V Sundaram, Int. J. Comp.
Tech. Appl., 2011, Vol 2 (3), 626-630

Objective : focuses on the strength of


combining cryptography and stegnography
methods to enhance the security of
communication over an open channel.
Gives a thorough explanation of
cryptography and steganography
algorithms and a comparison of both
techniques.

Securing Information: Cryptography and


Steganography
Ramakrishna Mathe et al, / (IJCSIT) International Journal of Computer
Science and Information Technologies, Vol. 3 (3) , 2012
Objective : This paper proposes a new approach to public-key
steganography based on matching method to hide the secret
information inside 24-bit image file. In the proposed method, the
stego-key is generated by applying a public key exchange protocol
which is based on discrete logarithm hard problem such as Diffie
Hellman.
We implemented the public-key steganography based on matching
method in different selected regions of an image to show the
performance of the proposed method.
In our implementation, we used 600400 bitmap image file to hide 5
KB text data.
Both of the two communication parties should find the secret key
(stegokey) first by applying Diffie-Hellman public-key exchange
protocol to perform high level of security.

Double layer security using visual cryptography


and transform based steganography
- PallaviB1, Vishala I. L2
IJRET: International Journal of Research in Engineering and Technology
Volume: 03 Special Issue: 03 | May-2014 | NCRIET-2014, Available @
http://www.ijret.org

Objective : To hide information using


visual cryptography and DCT based
steganography
The proposed scheme has several
advantages like 2 levels of security for
various applications
It requires more computation time.

PUBLIC-KEY STEGANOGRAPHY BASED ON


MODIFIED LSB METHOD
Volume 3, No. 4, April 2012 Journal of Global Research in Computer
Science
Vivek Jain1, Lokesh Kumar2

This paper proposed a technique to


implement steganogaraphy and cryptography
together to hide the data into an image.
This technique describes as: Find the shared
stego-key between the two communication
parties by applying Diffie-Hellman Key
exchange protocol, then encrypt the data
using secret stego-key.

You might also like