Skip to main content

Encrypted Transfer of Confidential Information Using Steganography and Identity Verification Using Face Data

  • Conference paper
  • First Online:
Artificial Intelligence and Evolutionary Computations in Engineering Systems

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1056))

Abstract

In last few years, information security has become a significant part of data communication. In order to address this crucial point in data communication to secure the confidential data, steganography and cryptography can be combined to give better results. Steganography is a practice to hide any confidential or sensitive information into another information that plays as the cover for the information, adding a layer of security on top of science of secret writing, known as cryptography. In this paper, we discuss an improved LSB steganography technique to optimize the algorithm hiding the bits in different channels selected dynamically using key. We further propose a platform leveraging cryptographic algorithms and verification using face data in pipeline to help keep data more secure.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Hussain, M., Wahab, A.W.A., Idris, Y.I.B., Ho, A.T.S., Jung, K.-H.: Image steganography in spatial domain: a survey. Sig. Process. Image Communi. (2018)

    Google Scholar 

  2. El_Rahman, S.A.: A comparative analysis of image steganography based on DCT algorithm and steganography tool to hide nuclear reactors confidential information. Comput. Electr. Eng. (2016)

    Google Scholar 

  3. Masud Karim, S.M., Rahman, M.S., Hossain, M.I.: A new approach for LSB image steganography using secret key. In: Proceedings of 14th International Conference on Computer and Information Technology (ICCIT 201 I), 22–24 Dec 2011, Dhaka, Bangladesh

    Google Scholar 

  4. Gondhi, N.K., Kour, E.N.: A comparative analysis on various face recognition techniques. In: International Conference on Intelligent Computing and Control Systems, Madurai, India (2017)

    Google Scholar 

  5. Neeta, D., Snehal, K., Jacobs, D.: Implementation of the LSB steganography and its evaluation for various bits. In: International Conference on Intelligent Computing and Control Systems (ICICCS), Bangalore, India, 6 Dec 2006

    Google Scholar 

  6. Sheth, U, Saxena, S.: Image steganography using AES encryption and least significant Nibble. In: International Conference on Communication and Signal Processing, Melmaruvathur, India, 6–8 Apr 2016

    Google Scholar 

  7. Gaurav, K., Ghanekar, U.: Image steganography based on Canny edge detection, dilation operator and hybrid coding. J. Inf. Secur. Appl. (2018)

    Google Scholar 

  8. Bhowmik, S., Bhaumik, A.K.: A new approach in color image steganography with high level of perceptibility and security. In: International Conference on Intelligent Control Power and Instrumentation (ICICPI), Kolkata, India, 21–23 Oct 2016

    Google Scholar 

  9. Pravin, D.P., Kasar, S.: Security improvisation in steganography using AES 128/192/256. Int. J. Eng. Res. Technol. 3(11) (2014)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Parth Agarwal .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Agarwal, P., Moudgil, D., Priya, S. (2020). Encrypted Transfer of Confidential Information Using Steganography and Identity Verification Using Face Data. In: Dash, S., Lakshmi, C., Das, S., Panigrahi, B. (eds) Artificial Intelligence and Evolutionary Computations in Engineering Systems. Advances in Intelligent Systems and Computing, vol 1056. Springer, Singapore. https://doi.org/10.1007/978-981-15-0199-9_14

Download citation

Publish with us

Policies and ethics