Research Article

A Lookup XOR Cryptography for High Capacity Least Significant Bit Steganography

by  William W.F., Osofisan A.O., Asanbe M.O.
journal cover
International Journal of Applied Information Systems
Foundation of Computer Science (FCS), NY, USA
Volume 10 - Issue 7
Published: March 2016
Authors: William W.F., Osofisan A.O., Asanbe M.O.
10.5120/ijais2016451525
PDF

William W.F., Osofisan A.O., Asanbe M.O. . A Lookup XOR Cryptography for High Capacity Least Significant Bit Steganography. International Journal of Applied Information Systems. 10, 7 (March 2016), 16-22. DOI=10.5120/ijais2016451525

                        @article{ 10.5120/ijais2016451525,
                        author  = { William W.F.,Osofisan A.O.,Asanbe M.O. },
                        title   = { A Lookup XOR Cryptography for High Capacity Least Significant Bit Steganography },
                        journal = { International Journal of Applied Information Systems },
                        year    = { 2016 },
                        volume  = { 10 },
                        number  = { 7 },
                        pages   = { 16-22 },
                        doi     = { 10.5120/ijais2016451525 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2016
                        %A William W.F.
                        %A Osofisan A.O.
                        %A Asanbe M.O.
                        %T A Lookup XOR Cryptography for High Capacity Least Significant Bit Steganography%T 
                        %J International Journal of Applied Information Systems
                        %V 10
                        %N 7
                        %P 16-22
                        %R 10.5120/ijais2016451525
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

Security of information and optimal bandwidth utility has become major problem with growth in data communication over computer networks. Steganography and cryptography are two different data hiding techniques employed to solve this problem. Steganography hides messages inside some other digital media. Cryptography, on the other hand obscures the content of the message. This work proposes a high capacity data security approach by the combination of Steganography and cryptography techniques. In the process a message is first encrypted using a newly developed symmetric key Lookup XOR cryptographic algorithm and thereafter the encrypted message is embedded inside an image file using lease significant bit (LSB) insertion method used in [2] and [5]. This combinational methodology satisfies requirements such as capacity, security and robustness for secure data transmission over the network better than Data Encryption Standard (DES) because it provides a strong encryption scheme with minimized cipher text using a one-to-one mapping through the aid of a look-up table.

References
  • Manoj R, Naveen H and Anil K S, Secured Steganography Approach Using AES Vol. 3, Issue 3, Aug 2013, 185-192
  • Himanshu G, Ritesh K, Soni C. Enhanced Data Hiding Using LSB-Based Image Steganography Method. International Journal of Emerging Technology and Advanced Engineering. Volume 3, Issue 6, June 2013, pp 212-214.
  • Komal P, Sumit U and Hitesh G, “Information Hiding using Least Significant Bit Steganography and Blowfish Algorithm” International Journal of Computer Applications (0975 – 8887) Volume 63– No.13, February 2013
  • Abikoye O C, Adewole K S. and Oladipupo A J. “Efficient Data Hiding System using Cryptography and Steganography” , International Journal of Applied Information Systems (IJAIS) , Volume 4– No.11, December 2012.
  • Shamim A L and Kattamanchi H, High Capacity data hiding using LSB Steganography and Encryption, International Journal of Database Management Systems ( IJDMS ) Vol.4, No.6, December 2012.
  • M. Wu and B. Liu, Multimedia Data Hiding. New York: Springer-Verlag, 2003. Steganography and Digital Watermarking Techniques for Protection of Intellectual Property. Hershey, PA: Idea Group Publishing, 2004.
  • B. Furht and D. Kirovski, Multimedia Security Handbook, Part III and IV. Boca Raton, FL: CRC, 2005.
  • Valarmathi R,M, Kadhar G. M, Nawaz M.C.A Information Hiding Using Audio Steganography with Encrypted Data. International Journal of Advanced Research in Computer and Communication Engineering Vol. 3, Issue 1, January 2014
  • Ayushi. “A Symmetric Key Cryptographic Algorithm” International Journal of Computer Applications , pp. 0975 – 8887, Volume 1 – No. 15, 2010
  • Ms. Hemlata Sharma,Ms. MithleshArya and Mr. Dinesh Goyal “Secure Image Hiding Algorithm using Cryptography and Steganography” IOSR Journal of Computer Engineering (IOSR-JCE) Volume 13, Issue 5 (Jul. - Aug. 2013), PP 01-06
  • Barnali Gupta Banik and Prof. Samir K. Bandyopadhyay, “A DWT Method for Image Steganography” International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 6, June 2013
  • Komal Patel, Sumit Utareja and Hitesh Gupta, “Information Hiding using Least Significant Bit Steganography and Blowfish Algorithm” International Journal of Computer Applications (0975 – 8887) Volume 63– No.13, February 2013
  • Chandranath Adak “Robust Steganography Using LSB-XOR and Image Sharing".
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Cryptography Stenography Lookup XOR one-to-one mapping Data Security LSB Data Encryption Standard (DES)

Powered by PhDFocusTM