Design and Implementation of Spatial Domain Technique in Steganography using RSA Encryption with Genetic Algorithm
DOI:
https://doi.org/10.17010/ijcs/2017/v2/i5/118806Keywords:
Cryptography
, Data Security, SteganographyManuscript received August 15
, 2017, revised August 20, accepted August 21, 2017. Date of publication September 6, 2017.Abstract
The usage of internet is increasing day by day and network security is becoming more important to us as the volume of data being exchanged is increasing. The data (i.e. secret data) transmitted by the sender can be detected, altered or modified in the network. In this paper, to prevent the data from being detected, we used modified Least Significant bit technique for hiding the data into bits of the image pixel and to prevent the data from being modified or altered, RSA encryption technique combined with Genetic algorithm was used as it would be very hard to break. We changed the least significant bit (LSB) to the nearest pixel according to the secret data bit so that it would be hard to find out the original message. In the present work, modified least significant bit embedding technique was used with genetic algorithm and encryption technique to get enhanced results or to get better results in terms of better security, image quality, PSNR ratio, and robustness. Encryption technique uses the concept of both public and private key to enhance the security level of the proposed work.Â
Downloads
Downloads
Published
How to Cite
Issue
Section
References
R. Jain and N. Kumar, "Efficient data hiding scheme using lossless data compression and image Steganography," Int. J. of Eng. Sci. and Technol., vol. 4, no. 8, pp. 283-241, 2012.
D. Bloisi and L. Iocchi, "Image based Steganography and cryptography," Comput. Vision Theory and Appl., vol. 1, pp. 127-134, 2014.
F. M. Shelke, A. A. Dongre, and P. D. Soni, “Comparison of different techn. for Steganography in images,†Int. J. of Application or Innovation in Eng. & Manage., vol. 3, no. 2, pp.171-176, 2014.
C. A. Oluwakemi, S. A. Kayode, and J. O. Ayotunde, "Efficient data hiding system using cryptography and Steganography," Int. J. of Appl. Inform. Syst., vol. 4, no. 11, pp. 6-11, 2012.
A. Kumar and R. Sharma, "A secure image Steganography based on RSA Algorithm and Hash-LSB technique," Int. J. of Advanced Res. in Comput. Sci. and Software Eng., vol. 3, no. 7, pp. 1448-1454, 2013.
C. I. Mary and P. R. Mol, "An effective approach for hiding encrypted messages with neural key using LSB image Steganography," Int. J. of Innovative Technol. and Res., vol. 4, no. 2, pp. 2832–2835, 2016.
S. Dhall, B. Bhushan, and S. Gupta, "An in-depth anal. of various Steganography techn.," Int. J. of Security and its Appl., vol. 9, no. 8, pp. 67-94, 2015.