Enhancement of System Security by Using LSB and RSA Algorithms
PDF

How to Cite

Enhancement of System Security by Using LSB and RSA Algorithms. (2022). Al-Khwarizmi Engineering Journal, 18(1), 26-37. https://doi.org/10.22153/kej.2022.03.001

Abstract

A steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.

PDF

References

M. Gajalakshmi and R. Vidya, “A Review on- Data Hiding using Cryptography and Steganography,” International Journal of Computing Algorithm, vol. 07, Issue: 01, pp. 24-28, June 2018.

Mustafa S. T., Mohd S.M.R., Sameer L., Mohammed M.H., Hassanain M. A., “Combination of Steganography and Cryptography: A short Survey,” 2nd International Conference on Sustainable Engineering Techniques (ICSET), doi:10.1088/1757-899X/518/5/052003, 2019.

Manoj K. R., Dinesh G. and Naveen H., “Data Hiding In Image Using Cryptography And Steganography: An Investigation,” International Journal of Advanced Research in Computer Science, vol. 8, no. 7, pp. 953-956, July – August 2017.

Dheyab Salman Ibrahim, “Enhancing Cloud Computing Security using Cryptography & Steganography,” Iraqi Journal of Information Technology, vol. 9, no. 3, 2019.

Marwa E. Saleh, Abdelmgeid A. Aly, Fatma A. Omara, “Data Security Using Cryptography and Steganography Techniques,” (IJACSA) International Journal of Advanced Computer Science and Applications, vol. 7, no. 6, pp. 390-397, 2016.

Shambhavi U. Burge, Nitin A. Sawant, Swapnil D. Choudhari, Priyanka A. Sonkusare, “Secure Data Hiding using Cryptography and LSB Techniques,” International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), vol. 4, Issue 10, pp. 3863-3870, Oct. 2015.

Ameer H. Morad, Hatem Nahi Mohaisen, “Secret Message Hiding Randomly In Video,” International Journal of Advancements in Computing Technology (IJACT), vol. 8, no. 3, June 2016.

Hatem Nahi Mohaisen, Ameer H. Morad, “Secure Information Using Steganography and Watermarking,” Iraqi Journal of Science, vol. Special Issue Part-A, pp. 112-128, 2016.

Mustafa S. Taha, et al, “Combination of Steganography and Cryptography: A short Survey,” 2nd International Conference on Sustainable Engineering Techniques (ICSET), appear in IOP Conf. Series: Materials Science and Engineering 518, 2019.

Shireen Nisha, Mohammed Farik, “RSA Public Key Cryptography Algorithm – A Review,” International Journal of Scientific & Technology Research, vol. 6, issue 07, pp. 187-191, July 2017.

Dindayal Mahto, Dilip Kumar Yadav, “Performance Analysis of RSA and Elliptic Curve Cryptography,” International Journal of Network Security, vol. 20, no. 4, pp. 625-635, July 2018.

Divya.A1, S.Thenmozhi, “Steganography: Various Techniques In Spatial and Transform Domain,” International Journal of Advanced Scientific Research and Management, vol. 1, issue 3, March 2016.

Ammar Awad, “A Survey of Spatial Domain Techniques in Image Steganography,” Journal of Education College Wasit University, vol. 26, Jan. 2018.

Marwa M. Emam, Abdelmgeid A. Aly, andFatma A. Omara, “An Improved Image Steganography Method Based on LSB Technique with Random Pixel Selection,” (IJACSA) International Journal of Advanced Computer Science and Applications, vol. 7, no. 3, pp. 361-366, 2016

Harpreet Kaur and Jyoti Rani, “A Survey on different techniques of steganography,” MATEC Web of Conferences, doi: 10.1051/ 57, 02003, 2016.

S. Udhayavene∗, Aathira T. Dev and K. Chandrasekaran, “New Data Hiding Technique in Encrypted Image: DKL Algorithm (Differing Key Length),” Procedia Computer Science 54, pp. 790 – 798, 2015.

Yifeng Sun, Fenlin Liu, “Selecting Cover for Image Steganography by Correlation Coefficient,” 2010 Second International Workshop on Education Technology and Computer Science, 2010.

Anita Pradhan, et al., “Performance evaluation parameters of image steganography techniques,” International Conference Research Advances in Integrated Navigation Systems (RAINS), 2016.

S. Tanako, K. Tanaka and T. Sugimura, “Data Hiding via Steganographic Image Transformation,” IEICE Trans. Fundamentals, vol. E83-A, pp. 311-319, Feb. 2000.

Haripriya Rout, Brojo Kishore Mishra, “Pros and Cons of Cryptography, Steganography and Perturbation techniques,” IOSR Journal of Electronics and Communication Engineering (IOSR-JECE), e-ISSN: 2278-2834, p.p. 76-81.

Copyright: Open Access authors retain the copyrights of their papers, and all open access articles are distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution and reproduction in any medium, provided that the original work is properly cited. The use of general descriptive names, trade names, trademarks, and so forth in this publication, even if not specifically identified, does not imply that these names are not protected by the relevant laws and regulations. While the advice and information in this journal are believed to be true and accurate on the date of its going to press, neither the authors, the editors, nor the publisher can accept any legal responsibility for any errors or omissions that may be made. The publisher makes no warranty, express or implied, with respect to the material contained herein.