Enhanced Secure Image Steganography using RSA Algorithm and Hamming Codes

A. Sree Mrudhula*, G. Arun**, C.N. Sujatha***
*-** Department of Electronics and Communication Engineering, Sreenidhi Institute of Science and Technology, Hyderabad, India.
*** Associate Professor, Department of Electronics and Communication Engineering, Sreenidhi Institute of Science and Technology, Hyderabad, India.
Periodicity:January - March'2017
DOI : https://doi.org/10.26634/jip.4.1.13522

Abstract

Nowadays, the idea of transmitting the text or data safely and securely is the most crucial part. Hiding capacity of the data and its confidentiality plays a vital role in covert communication. A solution for this challenging part of the secure transmission is presented in this paper, wherein the security of transmission is ensured, by first encrypting the data that is to be transmitted by using the RSA algorithm, so the part of security and confidentiality of the message is covered and then Image Steganography is used. It is a technique where the transmitting data is hidden in an image. For hiding the information in an image there are many steganography techniques, in which LSB technique is chosen in this case. In this technique, the data is the text message which is converted into binary format by considering its ASCII values and then the bits of the information is hidden in the least significant bits of the R, G, B values of the pixels of the image.

Keywords

Cryptography, Decryption, Encryption, LSB Technique, RSA Algorithm.

How to Cite this Article?

Mrudhula, A. S., Arun, G., and Sujatha, C.N. (2017). Enhanced Secure Image Steganography using RSA Algorithm and Hamming Codes. i-manager’s Journal on Image Processing, 4(1), 33-42. https://doi.org/10.26634/jip.4.1.13522

References

[1]. Avcibas, I., Memon, N., & Sankur, B. (2003). Steganalysis using image quality metrics. IEEE Transactions on Image Processing, 12(2), 221-229.
[2]. Ayele, A. A., & Sreenivasarao, V. (2013). A Modified RSA Encryption Technique Based on Multiple public keys. International Journal of Innovative Research in Computer and Communication Engineering, 1(4), 859-864.
[3]. Bhavana, S., & Sudha, K. L. (2012). Text Steganography using LSB Insertion Method along with Chaos Theory. International Journal of Computer Science, Engineering and Applications, 2(2), 145-149.
[4]. Goshwe, N. Y. (2013). Data encryption and decryption using RSA Algorithm in a Network Environment. International Journal of Computer Science and Network Security (IJCSNS), 13(7), 9.
[5]. Jain, S. (n.d.). Analysis of LSB insertion for through digital steganography. International Organization of Scientific Research Journal of Electronics and Communication Engineering, National Conference on Network Security (143-146).
[6]. Mehboob, B., & Faruqui, R. A. (2008, April). A stegnography implementation. In Biometrics and Security Technologies, 2008. ISBAST 2008. International Symposium on (pp.1-5). IEEE.
[7]. Morkel, T., Eloff, J. H., & Olivier, M. S. (2005, June). An overview of image steganography. In ISSA (pp. 1-11).
[8]. Poornima, R., & Iswarya, R. J. (2013). An overview of digital image steganography. International Journal of Computer Science and Engineering Survey, 4(1), 23-31.
[9]. Preetha, M., & Nithya, M. (2013). A study and Performance Analysis of RSA Algorithm. IJCSMC, 2, 126- 139.
[10]. Reddy, V. L., Subramanyam, A., & Reddy, P. C. (2011). Implementation of LSB steganography and its evaluation for various file formats. Int. J. Advanced Networking and Applications, 2(05), 868-872.
[11]. Rivest, R. L., Shamir, A., & Adleman, L. (1978). A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2), 120- 126.
[12]. Sharma, S., & Kumar, U. (2015). Review of Transform Domain Techniques for Image Steganography. International Journal of Science and Research, 2(2), 1.
[13]. Sutaone, M. S., & Khandare, M. V. (2008). Image based steganography using LSB insertion technique. In 2008 IET International Conference on Wireless, Mobile and Multimedia Networks (146-151).
[14]. Zhou, X., Gong, W., Fu, W., & Jin, L. (2016, June). An improved method for LSB based color image steganography combined with cr yptography. In Computer and Information Science (ICIS), 2016 IEEE/ACIS 15th International Conference on (pp. 1-4). IEEE.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.