Abstract
Now a days on-line services has end up as a big part of our lives that performs communication electronically. This e-communication requires confidentiality and information integrity to protect from unauthorized users. Security can be provided by using two widespread techniques i.e., cryptography and steganography. However, no single technique in itself is well acquainted to cater to our needs in implementing a secure, and robust system. Steganography helps in hiding the data behind the cover image. But once known secret message can be captured very easily. Moreover, by embedding the data into the image medium, we increase the risk of distortion. If the distorted image is sent over the communication channel, the intruder can easily guess that some secret data has been sent and that secret data can be easily recovered. As we know, cryptography ciphers the text so that the secret data sent over the communication link cannot be understood. But if both the security mechanisms can be integrated we can come up with a system which is more secure and robust. This paper presents the study of hybrid crypto-stego techniques so as to reduce distortion by maintaining the imperceptibility, robustness and providing high security for the e-communication between two authorized parties.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Wajgade, V.M., Kumar, S.: Stegocrypto – a review of steganography techniques using cryptography. Int. J. Comput. Sci. Eng. Technol. 4, 423–426 (2013). ISSN 2229-3345
Johnson, N.F., Jajodia, S.: Exploring steganography seeing the unseen. Computer 31, 26–34 (1998). IEEE
Kumar, A., et al.: A secure image steganography based on RSA algorithm and hash–LSB technique. IJARCSSE 3(7), 363–371 (2013)
Cole, E., Krutz, R.D. (eds.): Hiding in Plain Sight, Steganography and the Art of Covert Communication. Wiley Publishing, Inc., Hoboken (2003)
Madhuravani, B., et al.: Strong authentication using dynamic hashing and steganography. In: ICCCA. IEEE (2015)
Budi, P., Gernowo, R., Si, M., Noranita, B., Si, S., Kom, M.: The combination of bit matching-based steganography and DES cryptography for data security (2013)
Joseph Raphael, A., Sundaram, V.: A survey on cryptography and steganography. Int. J. Comput. Technol. Appl. 2(3) (2011). ISSN 2229-6093
Johnson, N.F., Katzenbeisser, S.: A survey of steganographic techniques. Information hiding techniques for steganography and digital watermarking, pp 43–78 (2000)
Medeni, M.B.O., Souidi, E.M.: Steganography and error correcting codes. Int. J. Comput. Sci. Inf. Secur. 8(8), 147–149 (2010)
Gaikwad, D.P., Wagh, S.J.: Colour image restoration for an effective steganography. i-Manag. J. Softw. Eng. 4(3), 65–71 (2010)
Nag, A., et al.: A novel technique for image steganography based on DWT and Huffman encoding. IJCSS 4(6), 561–570
Seethalakshmi, K.S., et al.: Security enhancement in image steganography using neural networks and visual cryptography. IEEE (2016)
Zhou, X., et al.: An improved method for LSB based color image steganography combined with cryptography. IEEE (2016)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Sharma, N., Batra, U. (2018). A Study on Integrating Crypto-Stego Techniques to Minimize the Distortion. In: Panda, B., Sharma, S., Roy, N. (eds) Data Science and Analytics. REDSET 2017. Communications in Computer and Information Science, vol 799. Springer, Singapore. https://doi.org/10.1007/978-981-10-8527-7_51
Download citation
DOI: https://doi.org/10.1007/978-981-10-8527-7_51
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-8526-0
Online ISBN: 978-981-10-8527-7
eBook Packages: Computer ScienceComputer Science (R0)