Call for Paper - November 2022 Edition
IJCA solicits original research papers for the November 2022 Edition. Last date of manuscript submission is October 20, 2022. Read More

A Combined Approach of Steganography and Cryptography Technique based on Parity Checker and Huffman Encoding

Print
PDF
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2016
Authors:
Abdelmged A. A., Al-Hussien Seddik Saad, Nada Hussien
10.5120/ijca2016911031

Abdelmged A A., Al-Hussien Seddik Saad and Nada Hussien. A Combined Approach of Steganography and Cryptography Technique based on Parity Checker and Huffman Encoding. International Journal of Computer Applications 148(2):26-32, August 2016. BibTeX

@article{10.5120/ijca2016911031,
	author = {Abdelmged A. A. and Al-Hussien Seddik Saad and Nada Hussien},
	title = {A Combined Approach of Steganography and Cryptography Technique based on Parity Checker and Huffman Encoding},
	journal = {International Journal of Computer Applications},
	issue_date = {August 2016},
	volume = {148},
	number = {2},
	month = {Aug},
	year = {2016},
	issn = {0975-8887},
	pages = {26-32},
	numpages = {7},
	url = {http://www.ijcaonline.org/archives/volume148/number2/25731-2016911031},
	doi = {10.5120/ijca2016911031},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}
}

Abstract

Steganography and Cryptography are two popular ways of sending vital and pivotal information in a secret way. But neither cryptography nor steganography alone can guarantee better security because they can be cracked after some efforts. So it is necessary to combine both cryptography and steganography to generate a hybrid system called as Crypto-Steganography. Cryptography is the art of saving information by encrypting it into an immersed format. On the other hand, steganography is the art and science of secret communication to send messages in a way which hides even the existence of the communication. This paper aims to improve a new approach of hiding a secret message in an image, by taking advantages of combining cryptography and steganography. Which using the Huffman coding to compress the message and RC4 algorithm to encrypt the secret message then the cipher text embedded in the cover image using Parity checker algorithm using blue layer only. The results showed that the proposed method gives better results of higher PSNR lower MSE.

References

  1. Tasnim M. S., Dipesh. G. K.,"Data Security Enhancement with Crystography – A Combination of Cryptography and Steganography", International Journal of Darshan Institute on Engineering Research and Emerging Technology Vol. 4, No. 1, pp. 01-06, 2015.
  2. Dipalee B.," New robust LSB steganographic technique for increased security", International Journal of Engineering Research and General Science Volume 3, Issue 2, March-April, 2015.
  3. Priyanka H., Gouri S. P.,"A Combined Approach of Steganography and Cryptography Techniques for Information Security: A Survey", International Journal of Engineering Research & Technology (IJERT) Vol. 4, Issue 12, December-2015.
  4. Mitali V. K., Arvind S.," A Survey on Various Cryptography Techniques", International Journal of Emerging Trends & Technology in Computer Science (IJETTCS), Volume 3, Issue 4, July-August 2014.
  5. Abdelmgeid A. A., Al – Hussien S. S.," Enhancing the Security of SMMWB Image Steganography Technique by using the Linked List Structure (Cover Package Method)", International Journal of Computer Applications (0975 – 8887) Volume 90 – No 7, March 2014.
  6. Pardeshi, S. M., Sonawane, I. R., Punjabi, V. D., & Saraf, P. A.," A Survey on compound use of Cryptography and Steganoghaphy for Secure Data Hiding", International Journal of Emerging Technology and Advanced Engineering Website, Volume 3, Issue 10, October 2013.
  7. Pujar, J. H., & Kadlaskar, L. M." A New Lossless Method of Image Compression and Decompression Using Huffman Coding Techniques." Journal of Theoretical & Applied Information Technology, Vol. 15, Issue 1/2, pp.18-23, 2010.
  8. Wa'el Ibrahim A. Al-Mazaydeh," Image Steganography using LSB and LSB+Huffman Code", International Journal of Computer Applications (0975 – 8887) Volume 99-No.5, August 2014.
  9. Varsha, Rajender S.," Data Hiding Using Steganography and Cryptography" International Journal of Computer Science and Mobile Computing, Vol.4 Issue.4, pp. 802-805, April- 2015.
  10. Tahir A. and Amit D." A Novel Approach of LSB Based Steganography Using Parity Checker" International Journal of Advanced Research in Computer Science and Software Engineering, Vol 5, Issue 1, January 2015.
  11. Yamuna D., Preethi. P.," A Secure Image Steganography Based on RSA Algorithm and Random Pixel Selection Technique", International Journal of Research in Engineering Technology and Management Vol. 03 Issue 03, May-2015.
  12. Marwa M. E., Abdelmgeid A. A., Fatma A. O. "A Modified Image Steganography Method based on LSB Technique." International Journal of Computer Applications, Vol. 125, No. 5, September 2015.
  13. Ajit S., Swati M., "Securing Data by Using Cryptography with Steganography", International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 5, May 2013.
  14. Abdelmged A. A., Al-Hussien S. S., Nada H.," A Technique of Image Steganography using ParityChecker and LSBraille." International Journal of Computer Applications (0975 – 8887), Vol. 144 – No.4, June 2016.
  15. Usha, S., Kumar, G. S., Boopathybagan, K. "A secure triple level encryption method using cryptography and steganography." 20II International Conference on Computer Science and Network Technology (ICCSNT), Vol. 2, pp. 1017-1020, December-2011).
  16. Rasha H.A., Sawsan H. J." Hiding Secret Text In Image Using Rc4 And Rijindeal Algorithm."International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367, ISSN 0976 - 6375, Vol. 6, Issue 1, pp. 12-18, January (2015).
  17. Vijaypal D., Ramesh C. P., Yash V. S. “A Novel Algorithm for Image Steganography Based on Effective Channel Selection Technique” International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 3, Issue 8, August 2013.
  18. Kamal D. "Relative Antropy Based Analysis of Image Steganography Techniques". International Journal of P2P Network Trends and Technology (IJPTT). Vol 1, Issue 3 - 2011.
  19. Abdelmged A.A, Shaimaa M.H,"New Image Steganography Method Using Zero Order Hold Zooming" International Journal of Computer Applications (0975 – 8887) Vol. 59–No.15, January 2016.
  20. Abdelmgeid A. A., Al – Hussien S. S.," New Technique for Encoding the Secret Message to Enhance the Performance of MSLDIP Image Steganography Method (MPK Encoding)", International Journal of Computer Applications (0975 – 8887) Vol. 59– No.15, December 2012.

Keywords

Cryptography, Steganography, Cipher text, Huffman Coding, Parity checker.