Abstract
In last few years, information security has become a significant part of data communication. In order to address this crucial point in data communication to secure the confidential data, steganography and cryptography can be combined to give better results. Steganography is a practice to hide any confidential or sensitive information into another information that plays as the cover for the information, adding a layer of security on top of science of secret writing, known as cryptography. In this paper, we discuss an improved LSB steganography technique to optimize the algorithm hiding the bits in different channels selected dynamically using key. We further propose a platform leveraging cryptographic algorithms and verification using face data in pipeline to help keep data more secure.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Hussain, M., Wahab, A.W.A., Idris, Y.I.B., Ho, A.T.S., Jung, K.-H.: Image steganography in spatial domain: a survey. Sig. Process. Image Communi. (2018)
El_Rahman, S.A.: A comparative analysis of image steganography based on DCT algorithm and steganography tool to hide nuclear reactors confidential information. Comput. Electr. Eng. (2016)
Masud Karim, S.M., Rahman, M.S., Hossain, M.I.: A new approach for LSB image steganography using secret key. In: Proceedings of 14th International Conference on Computer and Information Technology (ICCIT 201 I), 22–24 Dec 2011, Dhaka, Bangladesh
Gondhi, N.K., Kour, E.N.: A comparative analysis on various face recognition techniques. In: International Conference on Intelligent Computing and Control Systems, Madurai, India (2017)
Neeta, D., Snehal, K., Jacobs, D.: Implementation of the LSB steganography and its evaluation for various bits. In: International Conference on Intelligent Computing and Control Systems (ICICCS), Bangalore, India, 6 Dec 2006
Sheth, U, Saxena, S.: Image steganography using AES encryption and least significant Nibble. In: International Conference on Communication and Signal Processing, Melmaruvathur, India, 6–8 Apr 2016
Gaurav, K., Ghanekar, U.: Image steganography based on Canny edge detection, dilation operator and hybrid coding. J. Inf. Secur. Appl. (2018)
Bhowmik, S., Bhaumik, A.K.: A new approach in color image steganography with high level of perceptibility and security. In: International Conference on Intelligent Control Power and Instrumentation (ICICPI), Kolkata, India, 21–23 Oct 2016
Pravin, D.P., Kasar, S.: Security improvisation in steganography using AES 128/192/256. Int. J. Eng. Res. Technol. 3(11) (2014)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Agarwal, P., Moudgil, D., Priya, S. (2020). Encrypted Transfer of Confidential Information Using Steganography and Identity Verification Using Face Data. In: Dash, S., Lakshmi, C., Das, S., Panigrahi, B. (eds) Artificial Intelligence and Evolutionary Computations in Engineering Systems. Advances in Intelligent Systems and Computing, vol 1056. Springer, Singapore. https://doi.org/10.1007/978-981-15-0199-9_14
Download citation
DOI: https://doi.org/10.1007/978-981-15-0199-9_14
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-0198-2
Online ISBN: 978-981-15-0199-9
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)