Skip to main content

A Study on Integrating Crypto-Stego Techniques to Minimize the Distortion

  • Conference paper
  • First Online:

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 799))

Abstract

Now a days on-line services has end up as a big part of our lives that performs communication electronically. This e-communication requires confidentiality and information integrity to protect from unauthorized users. Security can be provided by using two widespread techniques i.e., cryptography and steganography. However, no single technique in itself is well acquainted to cater to our needs in implementing a secure, and robust system. Steganography helps in hiding the data behind the cover image. But once known secret message can be captured very easily. Moreover, by embedding the data into the image medium, we increase the risk of distortion. If the distorted image is sent over the communication channel, the intruder can easily guess that some secret data has been sent and that secret data can be easily recovered. As we know, cryptography ciphers the text so that the secret data sent over the communication link cannot be understood. But if both the security mechanisms can be integrated we can come up with a system which is more secure and robust. This paper presents the study of hybrid crypto-stego techniques so as to reduce distortion by maintaining the imperceptibility, robustness and providing high security for the e-communication between two authorized parties.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Wajgade, V.M., Kumar, S.: Stegocrypto – a review of steganography techniques using cryptography. Int. J. Comput. Sci. Eng. Technol. 4, 423–426 (2013). ISSN 2229-3345

    Google Scholar 

  2. Johnson, N.F., Jajodia, S.: Exploring steganography seeing the unseen. Computer 31, 26–34 (1998). IEEE

    Article  Google Scholar 

  3. Kumar, A., et al.: A secure image steganography based on RSA algorithm and hash–LSB technique. IJARCSSE 3(7), 363–371 (2013)

    Google Scholar 

  4. Cole, E., Krutz, R.D. (eds.): Hiding in Plain Sight, Steganography and the Art of Covert Communication. Wiley Publishing, Inc., Hoboken (2003)

    Google Scholar 

  5. Madhuravani, B., et al.: Strong authentication using dynamic hashing and steganography. In: ICCCA. IEEE (2015)

    Google Scholar 

  6. Budi, P., Gernowo, R., Si, M., Noranita, B., Si, S., Kom, M.: The combination of bit matching-based steganography and DES cryptography for data security (2013)

    Google Scholar 

  7. Joseph Raphael, A., Sundaram, V.: A survey on cryptography and steganography. Int. J. Comput. Technol. Appl. 2(3) (2011). ISSN 2229-6093

    Google Scholar 

  8. Johnson, N.F., Katzenbeisser, S.: A survey of steganographic techniques. Information hiding techniques for steganography and digital watermarking, pp 43–78 (2000)

    Google Scholar 

  9. Medeni, M.B.O., Souidi, E.M.: Steganography and error correcting codes. Int. J. Comput. Sci. Inf. Secur. 8(8), 147–149 (2010)

    Google Scholar 

  10. Gaikwad, D.P., Wagh, S.J.: Colour image restoration for an effective steganography. i-Manag. J. Softw. Eng. 4(3), 65–71 (2010)

    Google Scholar 

  11. Nag, A., et al.: A novel technique for image steganography based on DWT and Huffman encoding. IJCSS 4(6), 561–570

    Google Scholar 

  12. Seethalakshmi, K.S., et al.: Security enhancement in image steganography using neural networks and visual cryptography. IEEE (2016)

    Google Scholar 

  13. Zhou, X., et al.: An improved method for LSB based color image steganography combined with cryptography. IEEE (2016)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Neha Sharma .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sharma, N., Batra, U. (2018). A Study on Integrating Crypto-Stego Techniques to Minimize the Distortion. In: Panda, B., Sharma, S., Roy, N. (eds) Data Science and Analytics. REDSET 2017. Communications in Computer and Information Science, vol 799. Springer, Singapore. https://doi.org/10.1007/978-981-10-8527-7_51

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-8527-7_51

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-8526-0

  • Online ISBN: 978-981-10-8527-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics