ISSN ONLINE(2320-9801) PRINT (2320-9798)

All submissions of the EM system will be redirected to Online Manuscript Submission System. Authors are requested to submit articles directly to Online Manuscript Submission System of respective journal.

A Survey: A Hybrid Approach to Secure Transmitted Message by Combining Steganography and Asymmetric Cryptography

Pooja Singh1, Hardik Upadhyay2, Mitesh Thakor3, Krunal Suthar4
  1. M. Tech Student, Department of Computer Engineering, MEC, Basna, India
  2. Assistant Professor, Department of Computer Engineering, GPERI, Mahesana, India
  3. Assistant Professor, Department of Computer Engineering, MEC, Basna, India
  4. Assistant Professor, Department of Computer Engineering, SPCE, Visnagar, India
Related article at Pubmed, Scholar Google

Visit for more related articles at International Journal of Innovative Research in Computer and Communication Engineering

Abstract

Steganography is a technique allows a user to securely hide messages in a cover media and to extract hidden message from the same media. It can also be defined as the study of invisible communication that usually deals with the ways of hiding the existence of the communicated message. There is a large variety of steganography techniques some are more complex than others and all of them have respective strong and weak points. We would propose the combined concept of Cryptography and steganography with the use ECC(Elliptic Curve Cryptography).This is the hybrid approach to hide the data in encrypted form. The main focus of research is to encrypt the data with Asymmetric Cryptography and apply the steganography technique to hide encrypted data. Existing hybrid approach which uses RSA with steganography is suffering from big performance hit. Proposed approach would expected to achieve batter result mainly in terms of performance as compare to existing schemes.

Keywords

Steganography, Cryptography, Asymmetric encryption, Elliptic curve cryptography

INTRODUCTION

Information technology is continually changing, discoveries are made every other day. In the current trends of the world, the technologies have advanced so much that most of the individuals prefer using the internet as the primary medium to transfer data from one end to another across the world. There are many possible ways to transmit data: via e-mails, chats, etc. The data transition is made very simple, fast and accurate. However, one of the main problems with sending data over the internet is the “security threat” it poses i.e. the personal or confidential data can be stolen or hacked in many ways. Therefore it becomes very important to take data security into consideration, as it is one of the most essential factors that need attention during the process of data transferring.
Data security basically means protection of data from unauthorised users or hackers and providing high security to prevent data modification. This area of data security has gained more attention over the recent period of time due to the massive increase in data transfer rate.
In order to improve the security features in data transfers, many techniques have been developed like: Cryptography, Steganography, etc. While Cryptography is a method to conceal information by encrypting it to “cipher texts” and transmitting it to the intended receiver using an unknown key, Steganography provides further security by hiding the cipher text into a seemingly invisible image or other formats.
“Steganography” and “Cryptography” are closely related constructs. The hidden or embedded image, audio or a video files act as carriers to send the private messages to the destination without any security breach. Steganography techniques can be implemented on various file formats such as audio (“.mp3”, “.wmv.”, etc.), video (“.mpeg”, „.dat?, etc.) and images (“.jpeg”, “.bmp”, etc.). However, the images are the most preferred file format for this technique. At present, there are a lot of algorithms that help in executing the Steganography Techniques. The aim of this paper is to describe a method for using together cryptography and steganography through some media such as image, audio, video, etc.
The rest of the paper is organized as follows. Section II gives details about related work. Section III Describe detailed comparative study about various available schemes followed by conclusion in Section IV. Last section contains list of references used.

SURVEY ON VARIOUS SECURITY PROPOSALS OF DATA BY ENCRYPTION AND EMBEDDED METHOD

Various researchers give different schemes and views for data security by using hybrid approach of steganogarphy and cryptography.
Authors at [1] presented a method that can be used to increase the security on web based applications. The user will be asked to provide the secret key and the password can be compared from image files using the key. It can be used as advancement over the existing option to input the security phrase in various web based applications. In the case of a secret message being transferred the information can be kept inside a multimedia data which will be the normal cipher which had to be transferred.
This multimedia data can be transferred in the normal way. Video files and image streams can also be used to transmit data. In case of image streams part of message can be sent in each image. This will increase the security of the system, however the time consumption will increase in this case. The researchers of[2] proposed the scheme based on two levels of data encryption . This technique combines the features of both cryptography and steganography which will provide a higher level of security. It is better than either of the technique used separately. The length of the plain text is also encrypted and sent which provides greater advantage for receiver in order to check the correctness of the decrypted data. Two levels of data encryption provide increased strength. In transferring secret message, two keys are used: One for the purpose of data encryption. Second key is obtained from the matrix based on the property derived out of the image itself. This method is also proved to be secure.

COMPARATIVE STUDY

The table-I shows above gives detailed comparison about the various schemes proposed by a researcher. The table gives the description about the basic technique used with the benefits that researcher gets as well as the limitations found in schemes.

CONCLUSION

In this paper, we studied various research proposals on data security, using steganography and cryptography to increase the security level of the data while transmitting data over network. We also made a comparative table which can be used by layman to have handy information about the proposals. Some of the proposals are based on public key encryption and some adopt private key techniques. We believe that data security is an area packed of challenges and of vital significance, and many research problems are yet to be identified.

Tables at a glance

Table icon
Table 1

References