Multilevel Steganography for Data Protection

  • Sourabh TyagiEmail author
  • Priyanka Anurag
  • Smitha N. Pai
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 904)


Nowadays, the world is changing very fast. In this world, there are many technologies that are being developed to protect the data from the outer world. Here the outer world is referred to a hacker or the third man who is in between one end user and the other end user. There is many software’s which protects and transfers the data from the one machine to another machine or from one user to the other user, as in mobile phones, laptop, IoT devices, cloud, etc. There are also many algorithms and techniques, which protect data from unauthorized accesses. One of the techniques is called stenography. Two levels of data protection are carried out in the current proposed model. One is image stenography and another one is video stenography. Here, the text is encrypted by using digital encryption system (DES). The encrypted data is embedded in the image by using the LSB technique. The stegano image is converted to the base 16 in text format and embedded on to the video by using the frame converting technique. This process is called the multilevel stenography where the data is processed by two stenography techniques, i.e., image stenography and video stenography. This increases the security of data and the data is easily transmitted from one machine to the other machine providing multilevel security.


Encryption system Base 16 Security Data Image steganography Video steganography LSB 


  1. 1.
    Rabah, K.: Steganography-the art of hiding data. Inf. Technol. J. 3(3), 245–269 (2004)MathSciNetCrossRefGoogle Scholar
  2. 2.
    Joseph, P., Vishnukumar, S.: A study on steganographic techniques. In: 2015 Global Conference on Communication Technologies (GCCT), pp. 206–210. IEEE, New York (2015)Google Scholar
  3. 3.
    Cheddad, A., Condell, J., Curran, K., Mc Kevitt, P.: Digital image steganography: survey and analysis of current methods. Signal process. 90(3), 727–752 (2010)CrossRefGoogle Scholar
  4. 4.
    Yi, G.: Notice of violation of ieee publication principles research on a novel MAS for automated negotiation method. In: 3rd International Conference on Intelligent System and Knowledge Engineering, 2008. ISKE 2008, vol. 1, pp. 635–639. IEEE, New York (2008)Google Scholar
  5. 5.
    Jassim, F.A.: A novel steganography algorithm for hiding text in image using five modulus method. arXiv preprint arXiv:1307.0642 (2013)
  6. 6.
    Shirali-Shahreza, M.H., Shirali-Shahreza, M.: An anti-SMS-spam using CAPTCHA. In: ISECS International Colloquium on Computing, Communication, Control, and Management, 2008. CCCM’08, vol. 2, pp. 318–321. IEEE, New York (2008)Google Scholar
  7. 7.
    Singh, A., Jauhari, U.: Data security by preprocessing the text with secret hiding. Adv. Comput. 3(3), 63 (2012)Google Scholar
  8. 8.
    Al-Afandy, K.A., Faragallah, O.S., ELmhalawy, A., El-Rabaie, E.-S M., El-Banby, G.M.: High security data hiding using image cropping and lsb least significant bit steganography. In: 2016 4th IEEE International Colloquium on Information Science and Technology (CiSt), pp. 400–404. IEEE, New York (2016)Google Scholar
  9. 9.
    Haney, J.D.: The use of cryptography to create data file security: with the rijndael cipher block. J. Comput. Sci. Colleges 21(3), 30–39 (2006)Google Scholar
  10. 10.
  11. 11.
    Zhuoran, Z., Daolian, X., Yunyun, S., Jikun, D., Lei, X.: The LCD interface design based on pic16f877 and ra8835. Microcomput. Appl. 17, 010 (2011)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  • Sourabh Tyagi
    • 1
    Email author
  • Priyanka Anurag
    • 1
  • Smitha N. Pai
    • 1
  1. 1.Department of Information and Communication TechnologyManipal Institute of Technology, MAHE, Manipal UniversityManipalIndia

Personalised recommendations