Privacy Preservation in Big Data Application using Advanced Encryption Standard and Least Significant Bit Steganography

Abdulmalik Danlami Mohammed *, Oluwaseun A. Ojerinde **, Moses Folorunsho Victor ***, M. L. Agrawal****
*-**** Department of Computer Science, School of Information and Communication Technology, Federal University of Technology, Minna, Nigeria.
Periodicity:March - May'2020
DOI : https://doi.org/10.26634/jit.9.2.17550

Abstract

Over the years, the proliferation of internet data and its widespread usage has contributed to increase in threats to security. Many new technologies are transforming the face of the world in the real environment of today. Nevertheless because of these emerging technologies, we are unable to secure our private information in a very effective manner and these days' cybercrimes are growing day by day. Several methods such as authentication, firewall, cryptography and steganography are used to safeguard this vast amount of data on the internet. Hence, this research aims at protecting the privacy of big data applications using the Advanced Encryption Standard (AES) technique and the Least Significant Bit (LSB) steganography technique. This proposed algorithm hides the generated cipher text using the AES algorithm inside a cover image to hide the presence of the cipher text using the LSB technique. Based on the PSNR, SNR, SSIM and MSE values obtained, it can be concluded that the proposed system is robust and reliable.

Keywords

Steganography, Least Significant Bit, Encryption, Decryption, Stego Document.

How to Cite this Article?

Mohammed, A. D., Ojerinde, O. A., Victor, M. F., and Kenneth, M. O. (2020). Privacy Preservation in Big Data Application using Advanced Encryption Standard and Least Significant Bit Steganography. i-manager's Journal on Information Technology, 9(2), 1-11. https://doi.org/10.26634/jit.9.2.17550

References

[1]. Abdullah, A. (2017). Advanced encryption standard (AES) algorithm to encr ypt and decr ypt data. Cryptography and Network Security.
[2]. Agarsana, B. G., Anjali, T. K., & Kirthika, M. S. S. (2018). Image steganography using secured force algorithm for hiding audio signal into colour image. International Research Journal of Engineering and Technology, 05(02), 1-5.
[3]. Ali, U. A. M. E., Sohrawordi, M., & Uddin, M. P. (2019). A robust and secured image steganography using LSB and random bit substitution. American Journal of Engineering Research, 8, 39-44.
[4]. Almazaydeh, W. I. A., & Sheshadri, H. (2016). Image steganography using LSB, LSB+Huffman code, and LSB+Arithmetic code. International Journal of Computer Applications, 155(11), 1–7. https://doi.org/10.5120/ijca2 016911478
[5]. Al-Mazaydeh, W. I. A. (2014). Image steganography using LSB and LSB+Huffman code. International Journal of Computer Applications, 99(5), 17-22. https://doi.org/ 10.5120/17370-7896
[6]. Al-Najjar, Y. A., & Soong, D. C. (2012). Comparison of image quality assessment: PSNR, HVS, SSIM, UIQI. International Journal of Scientific Engineering and Research, 3(8), 1-5.
[7]. Azad, V., & Sharma, P. (2014). A review on objective image quality assessment techniques. International Journal of Emerging Engineering Research and Technology, 2(5), 188-192.
[8]. Basahel, A. M., Yamin, M., & Abi Sen, A. A. (2019). Enhancing security of transmitted data by improved steganography method. International Journal of Computer Science and Network Security (IJCSNS), 19(4), 239-244.
[9]. Chandra, S., & Paira, S. (2019). Secure transmission of data using image steganography. Journal of Image Video Process, 10(1), 2049-2053. https://doi.org/10.2191 7/ijivp. 2019.0291
[10]. Deepika, A.,& Kaur, G. (2016). Review paper on enhancing data security for cloud environment cryptography and steganography technique. International Journal of Applied Science and Engineering, 2(1), 44–48.
[11]. Emam, M. M., Aly, A. A., & Omara, F. A. (2016). An improved image steganography method based on LSB technique with random pixel selection. International Journal of Advanced Computer Science & Applications, 1(7), 361-366. https://doi.org/10.14569/IJACSA.2016.070 350
[12]. Goswami, P., & Madan, S. (2017). A survey on big data & privacy preserving publishing techniques. Advances in Computational Sciences and Technology, 10(3), 395-408.
[13]. Hameed, M. A., Hassaballah, M., Aly, S., & Awad, A. I. (2019). An adaptive image steganography method based on histogram of oriented gradient and PVD-LSB techniques. IEEE Access, 7, 185189-185204. https://doi. org/10.1109/ACCESS.2019.2960254
[14]. Hemalatha, S., Acharya, D. U., Renuka, A., & Kamath, P. R. (2013). A secure and high capacity image steganography technique. Signal Image Process, 4(1), 83–89. https://doi.org/10.5121/sipij.2013.4108
[15]. Hore, A., & Ziou, D. (2010, August). Image quality th metrics: PSNR vs. SSIM. In 2010, 20 International Conference on Pattern Recognition (pp. 2366-2369). IEEE. https://doi.org/10.1109/ICPR.2010.579
[16]. Kumar, R., Sharma, G., & Sanduja, V. (2018). A real time approach to compare PSNR and MSE value of different original images and noise (salt and pepper, speckle, gaussian) added images. International Journal of Latest Technology in Engineering, Management and Applied Science, 7, 43-46.
[17]. Maganbhai, P. A. K., & Chouhan, K. (2015). A study and literature review on image steganography. International Journal of Computer Science and Information Technologies, 6(1), 685-688.
[18]. Maheswari, S. U., & Hemanth, D. J. (2015). Different methodology for image steganography-based data hiding. International Journal of Information and Communication Technology, 7(4-5), 521-536. https://doi. org/10.1504/IJICT.2015.070330
[19]. Nashat, D., & Mamdouh, L. (2019). An efficient steganographic technique for hiding data. Journal of the Egyptian Mathematical Society, 27(1), 1-14. https://doi. org/10.1186/s42787-019-0061-6
[20]. Osunade, O., & Adeniyi, G. I. (2016). Enhancing the least significant bit (LSB) algorithm for steganography. International Journal of Computer Applications, 149(3), 1–8. https://doi.org/10.5120/ijca2016911363
[21]. Pavani, M., Naganjaneyulu, S., & Nagaraju, C. (2013). A survey on LSB based steganography methods. International Journal of Engineering and Computer Science, 2(08), 2464-2467.
[22]. Pujari, A. A., & Shinde,S. S. (2016). Data security using cryptography and steganography. IOSR Journal of Computer Engineering, 18(04), 130–139. https://doi.org/ 10.9790/0661-180405130139
[23]. Rahman, M. S., Khalil, I., Yi, X., & Gu, T. (2019). A novel privacy preserving search technique for stego data in untrusted cloud. In The Hawaii International Conference on System Sciences. https://doi.org/10.2425 1/HICSS.2019.513
[24]. Reddy, D. L. K. D. A., & Jilani, S. A. K. (2016). Implementation of 128-bit AES algorithm in MATLAB. International Journal of Engineering Trends and Technology (IJETT), 33(3), 126-129. https://doi.org/10.144 45/22315381/IJETT-V33P223
[25]. Sara, U., Akter, M., & Uddin, M. S. (2019). Image quality assessment through FSIM, SSIM, MSE and PSNR—a comparative study. Journal of Computer and Communications, 7(3), 8-18. https://doi.org/10.4236/jcc. 2019.73002
[26]. Singh, S., & Lekha, B. (2014). A simple steganography technique for hiding data into image. International Journal of Computer Trends & Technology, 2(6).
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.