A Study on Integrating Crypto-Stego Techniques to Minimize the Distortion

  • Neha SharmaEmail author
  • Usha Batra
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 799)


Now a days on-line services has end up as a big part of our lives that performs communication electronically. This e-communication requires confidentiality and information integrity to protect from unauthorized users. Security can be provided by using two widespread techniques i.e., cryptography and steganography. However, no single technique in itself is well acquainted to cater to our needs in implementing a secure, and robust system. Steganography helps in hiding the data behind the cover image. But once known secret message can be captured very easily. Moreover, by embedding the data into the image medium, we increase the risk of distortion. If the distorted image is sent over the communication channel, the intruder can easily guess that some secret data has been sent and that secret data can be easily recovered. As we know, cryptography ciphers the text so that the secret data sent over the communication link cannot be understood. But if both the security mechanisms can be integrated we can come up with a system which is more secure and robust. This paper presents the study of hybrid crypto-stego techniques so as to reduce distortion by maintaining the imperceptibility, robustness and providing high security for the e-communication between two authorized parties.


Cryptography Steganography Encryption Decryption 


  1. 1.
    Wajgade, V.M., Kumar, S.: Stegocrypto – a review of steganography techniques using cryptography. Int. J. Comput. Sci. Eng. Technol. 4, 423–426 (2013). ISSN 2229-3345Google Scholar
  2. 2.
    Johnson, N.F., Jajodia, S.: Exploring steganography seeing the unseen. Computer 31, 26–34 (1998). IEEECrossRefGoogle Scholar
  3. 3.
    Kumar, A., et al.: A secure image steganography based on RSA algorithm and hash–LSB technique. IJARCSSE 3(7), 363–371 (2013)Google Scholar
  4. 4.
    Cole, E., Krutz, R.D. (eds.): Hiding in Plain Sight, Steganography and the Art of Covert Communication. Wiley Publishing, Inc., Hoboken (2003)Google Scholar
  5. 5.
    Madhuravani, B., et al.: Strong authentication using dynamic hashing and steganography. In: ICCCA. IEEE (2015)Google Scholar
  6. 6.
    Budi, P., Gernowo, R., Si, M., Noranita, B., Si, S., Kom, M.: The combination of bit matching-based steganography and DES cryptography for data security (2013)Google Scholar
  7. 7.
    Joseph Raphael, A., Sundaram, V.: A survey on cryptography and steganography. Int. J. Comput. Technol. Appl. 2(3) (2011). ISSN 2229-6093Google Scholar
  8. 8.
    Johnson, N.F., Katzenbeisser, S.: A survey of steganographic techniques. Information hiding techniques for steganography and digital watermarking, pp 43–78 (2000)Google Scholar
  9. 9.
    Medeni, M.B.O., Souidi, E.M.: Steganography and error correcting codes. Int. J. Comput. Sci. Inf. Secur. 8(8), 147–149 (2010)Google Scholar
  10. 10.
    Gaikwad, D.P., Wagh, S.J.: Colour image restoration for an effective steganography. i-Manag. J. Softw. Eng. 4(3), 65–71 (2010)Google Scholar
  11. 11.
    Nag, A., et al.: A novel technique for image steganography based on DWT and Huffman encoding. IJCSS 4(6), 561–570Google Scholar
  12. 12.
    Seethalakshmi, K.S., et al.: Security enhancement in image steganography using neural networks and visual cryptography. IEEE (2016)Google Scholar
  13. 13.
    Zhou, X., et al.: An improved method for LSB based color image steganography combined with cryptography. IEEE (2016)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  1. 1.G D Goenka UniversityGurugramIndia

Personalised recommendations