Skip to main content

An Authenticated BSS Methodology for Data Security Using Steganography

  • Conference paper
  • 1523 Accesses

Abstract

Within the past several years, there has been an exponential increase in the research community and industry’s focus towards information hiding techniques as opposed to the traditional cryptography area. The goal of Steganography is to conceal information, in plain sight. Providing security to the data means the third party cannot interpret the actual information. When providing authentication to the data then only authorized persons can interpret the data. This system deals with secure transmission of data. In computer system to represent a printable character it requires one byte, i.e. 8 bits. So a printable character occupies 7 bits and the last bit value is 0 which is not useful for the character. In BSS method we are stuffing a new bit in the place of unused bit which is shifting from another printable character. To provide authentication a four bit dynamic key is generated for every four characters of the encrypted data and the key is also maintained in the data itself. In this system we implement security using steganography. i.e. hiding large amount of information in an image without disturbing the image clarity and its pixels.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Information Hiding-A Survey. Proceedings of the IEEE, Special Issue on Protection of Multimedia Content 87(7), 1062–1078 (1999)

    Google Scholar 

  2. Anderson, R., Petitcolas, F.: On the Limits of Steganography. University of Cambridge, Computer Laboratory, Cambridge (September 1997); Published in IEEE Journal on Special Areas in Communications 16(4), 463–473 (May 1998)

    Google Scholar 

  3. Johnson, N.F., Jajodia, S.: Steganalysis of Images Created Using Current Steganography Software. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 273–289. Springer, Heidelberg (1998), http://www.jjtc.com/ihws98/jjgmu.html

    Chapter  Google Scholar 

  4. Ravi Kumar, B., Murti, P.R.K.: Data Encryption and Decryption process Using Bit Shifting and Stuffing (BSS) Methodology. International Journal on Computer Science and Engineering (IJCSE) 3(7), 2818–2827 (2011)

    Google Scholar 

  5. Ravi Kumar, B., Murti, P.R.K., Hemanth Kumar, B.: An Authenticated Bit Shifting and Stuffing (BSS) Methodology for Data Security. Computer Engineering and Intelligent Systems 2(3), 94–104 (2011)

    Google Scholar 

  6. Johnson, N.F., Jajodia, S.: Exploring Steganography: Seeing the unseen. IEEE Computer 31(2), 26–34 (1998)

    Article  Google Scholar 

  7. Marvel, L.M., Boncelet Jr., C.G., Retter, C.: Spread Spectrum Steganography. IEEE Transactions on Image Processing 8, 08 (1999)

    Google Scholar 

  8. Johnson, N.F., Jajodia, S.: Steganalysis of Images Created Using Current Steganography Software. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 273–289. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Ravi Kumar, B., Murti, P.R.K., Hemanth Kumar, B. (2012). An Authenticated BSS Methodology for Data Security Using Steganography. In: Meghanathan, N., Chaki, N., Nagamalai, D. (eds) Advances in Computer Science and Information Technology. Computer Science and Information Technology. CCSIT 2012. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 86. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27317-9_43

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-27317-9_43

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-27316-2

  • Online ISBN: 978-3-642-27317-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics