Performance comparison of steganography techniques

Автор: Rinku Sharma, Reema Ganotra, Sangeeta Dhall, Shailender Gupta

Журнал: International Journal of Computer Network and Information Security @ijcnis

Статья в выпуске: 9 vol.10, 2018 года.

Бесплатный доступ

Confidentiality calls for substantial research and development in network security and data communication. Several techniques have been proposed for the past decades to ensure secure and confidential transmission of data. Steganography is a significant method of hiding data in another media, such that it is physically and virtually invisible. It is used primarily to ensure secure communication in an indiscernible fashion so that the hidden information is not discovered at any stage. The goal is to hide the presence of secret information rather than the contents of information to avoid breaching of data confidentiality. This paper is an effort to bring about a comparison of some of the recent techniques used for steganography on the basis of embedding capacity and Peak signal to noise ratio (PSNR), Universal image quality index (UIQI), Number of pixel change rate (NPCR) and correlation. The performance metrics undertaken are robustness, security analysis and perceptual quality. The techniques were implemented in MATLAB 2013a v 8.1.0.604.

Еще

Steganography, BPCS, PSNR, Entropy

Короткий адрес: https://sciup.org/15015632

IDR: 15015632   |   DOI: 10.5815/ijcnis.2018.09.04

Текст научной статьи Performance comparison of steganography techniques

Published Online September 2018 in MECS DOI: 10.5815/ijcnis.2018.09.04

Good quality network security is an integral part of data communication infrastructure. With the growth in intelligent transmission and communication networks, a breech in security is a matter of concern [1, 2, 3]. The ITRC report gives the number of data breaches which demonstrates that the numbers have taken a great hike over the years. This is shown as in the figure 1:

One primary clause that ensures secure data communication is data confidentially. Steganography produces an efficient mechanism for secure transmission of sensitive data [3, 4, 5]. The data is embedded in a cover media in a fashion such that its existence is not detected by an intruder. The most basic steganography technique uses an image to hide the secretive information .This is demonstrated as in figure 2.

Fig.1. ITRC Report for Number of Data Breaches in years 2005-2017

Fig.2. The Basic Scheme of Steganography

This paper compares most of the popular steganography techniques which have good embedding capacity and robustness. The rest of the paper is organized as follows: Section II explains the techniques implemented. Section III gives simulation set-up parameters. Section IV gives the snapshots. Section V provides the performance metrics on the basis of which results and conclusion are formulated in section VI and VII respectively.

  • II.    Technniques Implemented

The implemented steganography techniques are described in this section.

  • A.    Implementation using BPCS

BPCS stands for Bit Plane Complexity segmentation [14]. The last plane of the cover image is a complex noisy plane which is used for embedding. The First step in BPCS is to segment the cover image into 8 planes. Blocks of 8x8 are formulated of each plane. After block segmentation, canonical gray code conversion is applied on pure binary codes present in each block.

The next step is to divide the data into 8x8 blocks. Complexity is calculated for each data that is to be embedded. The complexity ( α ) is given by

к

м

Where, α should be lie from 0 to 1.

M is the total number of blocks and k is total no. transition changing from white to black or vice versa.

Threshold value is computed by:

th =«* Стах              (2)

Where, Cmax is maximum complexity of Block. This threshold value acts as cut-off for block selection i.e. the blocks having complexity value greater than the threshold value are opted for embedding. Also complexity for data blocks is calculated to check whether it should be embedded without modifications or some needs to be done. If the complexity of the data block is greater than the threshold it is embedded into the image blocks directly. Otherwise, the conjugate of the block is taken to be embedded into the image block as shown in figure 3.

Fig.3. BPCS Steganography

Algorithm: Embedding Block

Input: secret message

Output: Embedding block

Step 1: Take secret message.

Step 2: Make 8x8 window of secret message.

Step 4: Calculate complexity of each Block.

Step 5: Select threshold values on the Base of complexity value

Step 6: Take direct data for embedding whose complexity value greater then to threshold value else take conjugate.

Algorithm: Stego Image

Input: Plain image Im MXN where M, N are height and width of the image, secret message (embedding block).

Output: Stego Image

Step 1: Take plain image (m x n) where M, N are the height and width.

Step 2: Make 8x8 window of entire image.

Step 3: Apply canonical to gray conversion of all windows.

Step 4: Calculate complexity of each Block.

Step 5: Select threshold values on the Base of complexity value

Step 6: Select that block whose complexity value is grater then threshold value.

Step 7: Embed the secret message into blue plane.

Step 8: Take another plane if embedding in blue plain is finished.

  • B.    Implementation using Status Bit

The first step in Status bit Steganography involves the extraction of the R, G and B planes from the cover media. The most significant bits of each plane are taken and their decimal equivalent is computed [10, 11, 12,13, 14, 15] then, the binary values of the pixels in the blue plane are computed. Embedding Decision would be taken on the basis of darker and lighter pixels.

If the MSB bits contains at least two “1” bits, then the pixel is called as lighter pixel. If the MSB bits contains at least two “0” bits, then the pixel is called as lighter pixel . The decimal equivalent (Zn) of the three MSB bits of each RGB pixels is used to decide the position of embedding in blue plane.

Embedding in lighter pixels : - If the bit position ‘Zn’ and message bit is same, then change the LSB bit of the pixels of blue plane into 1 otherwise make it 0.

Embedding in darker pixels: - If the bit position ‘Zn’ and message bit is same, then change the LSB bit of the pixels of blue plane into 1, otherwise make it 0. Here, there is one more condition that if all the MSB bits of pixels are 0, then directly inserts the message in blue plane

Fig.4. LSB Status Steganography

Algorithm: compute the lighter and darker pixels

Input: Plain image Im MXN where M, N are height and width of the image, data.

Output: Stego image

Step 1: Take plain image

Step 2: Make 3x3 windows of plain image.

Step 3: Collect the MSB bits from a pixel {R, G, B} color space.

Step 4 : For darker pixels- if the MSB bits contain at least two bit 1, then the pixels is used for data hiding.

Step 5: For lighter pixels- if the MSB bits contain at least two bit 0, then the pixels is used for data hiding.

Algorithm: Embedding data in darker pixels

Input : Darker pixels of Blue planes

Output : Stego image

Step1 : The decimal representation Z n of three MSB bits of RGB pixels are used for determining the position in blue plane. Now if bit position Zn and message bit is same then change the LSB bits of the pixels of blue plane into1 otherwise 0.

Algorithm: Embedding data in lighter pixels

Input : lighter pixels of Blue planes

Output : stego image

Step 1: The decimal representation Zn of three MSB bits of RGB pixels is used for determining the position in blue planes. If the bit position Zn and message bit is same then change the LSB bits of the pixels of blue plane into 1 otherwise 0.

Step 2 : If all three MSB bits of pixels are 0 then in this situation directly insert the message bit in blue plain.

  • C.    Implementation using LSB Steganography

In the first step of this technique, the binary value of the pixels in the image and that of the message is computed. The LSB of pixel is then compared with the corresponding bit of the message [4, 5, 6, 7, 8, 9]. If the message bit and LSB of pixel are found to be same, no change in the pixels ensues. If they are found to be different, an increment or a decrement in the LSB of corresponding pixel is undertaken for embedding the data.

The whole message length is traversed for comparison with corresponding pixels’ LSB till the end of the message is reached. The rest of the pixels in the image are unchanged. The process is shown in figure 5.

Fig.5. LSB using Steganography

Algorithm: Stego Image

Input: Plain image ImMXN where M, N are height and width of the image, data.

Output : Stego image

Step 1: Take plain image

Step 2: Take the LSBs of all pixels of Plain Image

Step 3: Convert the data, decimal to binary

Step 4: If the LSB of image pixels not equal to msg bit then don’t change the LSB of image pixels.

Step 5: a) If LSB(pixels of plain image)=1,LSB(msg bit)=0 , then decrement LSB(pixels) by 1.

  • b) If LSB (pixels of plain image) =0, LSB (msg bit) =1, then increment LSB (pixels) by 0.

S tep 6: Transmit the stego Image.

  • D.    Implementation using LSB based Image Steganography using Secret Key

To hide the secret information, the cover image is divided into three planes (Red, Green and Blue). After dividing each plane, the secret key is chosen on the basis of user. The secret key is converted into one-dimension array of bit stream [16, 17,18, 19, 20].

Secret key and red plane are used only for decision making to hide the information into either Green plane or Blue plane. Each bit of secret key is ex-ored with the LSB of red plane. The obtained ex-or results decide that the information will be embedded in either Green plane or Blue plane.

Fig.6. LSB based Image Steganography using Secret Key

Table 1. Simulation Setup Parameters

Parameter

Values

Data size

16X16 (color image)

Image size

256 x 256

512 x 512

1024 x 1024

Image category

Color image (.bmp format)

Programing language tool

MATLB 2013a v 8.1.064

Simulation implemented

64 bit MATLAB

Processor

1.4 Ghz dual core Intel i5

Memory size

4 GB/1TB of1600 Mhz LPDDR3

  • IV.    Snapshots

Relationship of original image and stego image obtained by implementation of steganography techniques is described in table 2.

Algorithm: Stego Image

Input: Plain image Im MXN where M, N are height and width of the image, secret key data.

Output : Stego image

Step 1: Take plain image

Step 2 : Divide image into three planes (R, G, and B).

Step 3: Convert the secret key into binary, if it is then keep it as such.

Step 4: Convert the secret key into one dimension array.

Step 5: Ex-or each bit of secret key with LSB of Red plane.

Step 6: Change the LSB of Green plane pixel if Ex-or result is 1 else, embed the data in LSB of Blue plane pixel. Step.7: Transmit the stego image.

NOTE: Decryption process of each technique is just reverse as like encryption.

III. Simulation Setup Parameters

Hardware and software requirement for simulation and implementation of intended steganography techniques are given in table 1.

Table 3. Comparison of Histogram for 256 x 256 Images

Table 2. Comparison of stego Image

  • A.    Histogram Analysis for 256 x 256 Image

Relationship of original image and stego image histogram analysis found by implementation of steganography techniques is described in table 3.

  • B.    Histogram Analysis for 512 x 512 Image

Table 4. Comparison of Histogram for 512 x 512 Images

Techniq ue

Red Plane(:,:,1)

Green

Plane(:,:,2)

Blue Plain(:,:,3)

Original Image

0------------------ 0    100   200   300

(a)

p

%    100   200   300

(b)

™Пi J 100

%    100   200   300

(C)

BPCS

%    100   200   300

(d)

%    100   200   300

(e)

%    100   200   300

(f)

LSB Steg.

0     100    200    300

(g)

___и

0    100   200   300

(h)

%   100 МО ж

(i)

Status bit

3

2

%    100   200   300

(j)

%    100   200   300

(k)

%    100 MO 300

(l)

C. Histogram Analysis for 1024 x 1024 Image

Table 5. Comparison of Histogram for 1024 x 1024 Images

Technique

Red Plane(:,:,1)

Green Plane(:,:,2)

Blue Plain(:,:,3)

Original Image

%    100   2 00   300

(a)

200

o'----

0     100    200    300

(b)`

100    200    300

(c)

BPCS

0     100    200    300

(d)

' ll

%    100   200   300

(e)

100   200    300

(f)

LSB Steg.

%    100   200 SOO

(g)

%          200   300

(h)

21-------------------------- 1.5

0    100   200   300

(i)

Status bit

°C     100    200    300

(j)

%   100  200 Ж

(k)

%   100  200 Ж

(l)

LSB

Secret Key

1.5                             ■

0     100    200    300

(m)

100    200    300

(n)

%    100   200 MO

(o)

(a) Shows the histograms of Red plane of original image (b) Shows the histograms of Green plane of original image (c) Shows the histograms of Blue plane of original image (d) Shows the histograms of Red plane using BPCS Technique (e) Shows the histograms of Green plane using BPCS Technique (f) Shows the histograms of Blue plane using BPCS Technique (g) Shows the histograms of Red plane using LSB Steganography Technique (h) Shows the histograms of Green plane using LSB Steganography Technique (i) Shows the histograms of Blue plane using LSB Steganography Technique (j) Shows the histograms of Red plane using status bit Steganography Technique (k) Shows the histograms of Green plane using status bit Steganography Technique (l)Shows the histograms of Blue plane using status bit Steganography Technique (m) Shows the histograms of Red plane using LSB Secret key Steganography Technique (n) Shows the histograms of Green plane using LSB Secret key Steganography Technique (o) Shows the histograms of Blue plane using LSB Secret key Steganography Technique.

  • V.    Performance Metrics

For thorough exploration of the techniques, three analyses were performed that are explained in the subsequent section.

  • A.    Security Analysis

For security analysis, histograms of original image and encrypted-image are matched. A technique is said to be secure when the difference in the histograms is negligible which means the parameter values lie close to its ideal values. The parameters which are used for security analysis are listed below:

  •    Jaccard Index:

The Jaccard index, also known as the Jaccard similarity coefficient is used for comparing similarity between the original image and the encrypted-image. The jaccard index is mathematically given by the formula

J(x,Y) =

X П Y

XUY

Where, X is the original image and Y is the encrypted-image

J (X, Y) is the jaccard index between image matrices X and Y

X П Y is the intersection of matrices X and Y

X U Y is the union of matrices X and Y

The value of Jaccard index lies between 0 and 1. 1 signifies perfect matching and 0 signifies total mismatch.

  •    Correlation Coefficient:

The correlation coefficient is a measure of the linear correlation (dependence) between two images X and Y , giving a value between +1 and -1 inclusive, where 1 signifies perfect match and -1 signifies total mismatch. The correlation coefficient is given by the formula

° X ° Y

Where, X is the original image and Y is the stego-image

p(X,Y") is the correlation coefficient between image matrices X and Y cov (X , Y) is the covariance between matrices X and Y ox is the standard deviation of X oY is the standard deviation of Y

  •    Intersection Coefficient:

Intersection coefficient of histograms counts the common number of pixels of same value between two histograms (histograms of cover image and stego-image). The intersection coefficient is given by the formula:

N

I(X,Y)=^

1=1

min(X(i), Y(i))

Where, X is the original image and Y is the stego-image

I(X,Y) is the intersection coefficient between image matrices X and Y

X and Y are the probability distributions of images A and B respectively

If value of intersection coefficient is 1 it signifies perfect match and if the value is 0 it signifies total mismatch.

  •    Bhattacharyya Coefficient:

The Bhattacharyya coefficient measures the similarity between two images by using their probability distributions. The formula for Bhattacharyya coefficient is given by:

N

1=1

Where, A is the original image and B is the stego-

C(X,Y) =

2^ x ^ y

Ox2 + Oy2

S(X,Y) -

2oxy

Ox + O y

Where, X is the original image and Y is the stego-image

Bx is the mean of matrixX

By is the mean of matrix Y ox is the standard deviation of matrixX oy is the standard deviation of matrix Y oxy is the covariance between matricesX and Y

  • B.    Robustness Analysis

Robustness analysis is performed to measure the quality of image after implementation of particular technique. The parameters used for analysis of robustness are given below:

  •    Mean Square Error (MSE):

This parameter is a quantitative representation of the error that occurs in the final stego-image with respect to the original image. For a colour image MSE is given by:

"«-T^kiZcfZr^Z.Ull'-'X-Y)-FC~(X, Y)]л2

Where, M x N is the size of image (height and width respectively)

C=1 to 3 denotes the Red, Green and Blue colour plane respectively

Fc (X, Y)=value of pixel at position (X, Y) in c colour plane of cover image

Fc~(X, Y)=value of pixel at position (X, Y) in c colour plane of stego-image image

BC (A, B) is the Bhattacharyya coefficient between image matrices A and B

X and Y are the probability distributions of images A and B respectively

If value of Bhattacharyya coefficient is 1 it signifies perfect match and if the value is 0 it signifies total mismatch.

  •    Universal Image Quality Index(UIQI):

UIQI is used to measure the changes in stego-image with respect to the cover-image. In this measure the comparison of the images is broken down into three comparisons: luminance (L), contrast (C) and structural comparison (S).

L(X,Y) =

2 B x B y

Bx2 + By2

  •    Mean Absolute Error (MAE):

MAE is the average of absolute errors between the cover image and the stego-image. For a colour image the formula for MSE is given by:

MAE = ^^ 3 У N У M /6s [ fc ( x,y ) -

Mx«x3 c = 1 У - 1 X = 1 fc~(x,y)]2

Where, M x N is the size of image (height and width respectively)

C=1 to 3 denotes the Red, Green and Blue colour plane respectively

Fc (X, Y)=value of pixel at position (X, Y) in c colour plane of cover image

Fc ~ (X, Y)=value of pixel at position (X, Y) in c colour plane of stego-image

  •    Peak Signal to Noise Ratio (PSNR):

PSNR is the most commonly used parameter to measure the quality of image after embedding. Higher the PSNR value, higher the robustness of the stego-image. PSNR value is most commonly defined in terms of MSE. The formula for PSNR is given as:

PSNR = lOlog io (^L)

Where MAX is the maximum value of a pixel in the image. It is 255 for colour image of 8 bits.

  • VI. Results

  • A. Robustness

Robustness of a steganography technique can be measured by calculating the PSNR, MSE and entropy of stego image with respect to original image.

  •    PSNR

Peak signal to noise ratio shows the changes of original message with respect to the stego Image. As per result observation the best results shows by LSB and LSB Secret Key Steganography Techniques. This is shown in figure 7.

PSNR

Image Size

key based encryption stegaonography lsb based stegaonography

status bit stegaonography

BPCS steganography

Fig.7. Comparison of PSNR

MSE

Image Size

key based encryption stegaonography lsb based stegaonography

status bit stegaonography

BPCS steganography

  •    MSE

MSE shows the quantitative representation of the error that occurs in the final stego-image with respect to the original image. This is shown in figure 8.

  •    Entropy

Entropy is important factor in terms of robustness. It shows that the probability of occurrence of pixels in encrypted image should be equal to the original plain image. So the maximum value of entropy is provided by the Status bit. This is shown in figure 9.

ENTROPY

Image Size

Fig.9. Comparison of Entropy

  •    Correlation Coefficient

  • 0.9999995 0.999999 0.9999985 0.999998 0.9999975 0.999997

This parameter is used to find the linear correlation between two images. Its value must lie between (-1, 1). In this scheme the best results are shown by the LSB and Status bit Steganography technique. This is shown in figure 10.

Correlation

1.0000005

256 x 512 x 1024 x

256   512   1024

key based encryption stegaonography lsb based stegaonography status bit stegaonography

BPCS steganography

Image Size

Fig.10. Comparison of Correlation Coefficient

  •    Intersection Coefficient

Intersection coefficient of histogram of original and stego image is used to calculate the common number of pixels of same value between two images. The best results are shown by the BPCS and Status bit Steganography techniques. This is shown in figure 11.

Fig.8. Comparison of MSE

Intersection Coefficient

Imaze Size

key based encryption stegaonography lsb based stegaonography

status bit stegaonography

BPCS steganography

Fig.11. Comparison of Intersection Coefficient

  •    Jaccard Index

This factor is used to find the similarity between cover image and Stego Image. Its value also must lie in between (-1, 1). So the best results are provided by the LSB and BPCS Steganography techniques. This is shown in figure 12.

  • VII.    Overall Comparison

  • A.    PSNR:-

  • Table 6 shows the comparison of PSNR values of all techniques.

Table 6. Comparison of PSNR

Image size

BPCS

Steganogra phy

Status bit Steganogra phy

LSB

Steganogra phy

LSB Secret Key Steganogra phy

256 X 256

68.8033945

70.3607312

70.4184932

70.4297298

90476415

22298767

64726976

68198535

512 X 512

75.1284188

75.5753674

76.5797522

76.2956029

51299998

94174571

6306192

14916088

1024 X 1024

81.2582633

81.8087767

82.6508746

82.1633040

8168936

27900437

99263284

02255515

  • B.    MSE:-

  • Table 7 shows the comparison of MSE values of all techniques.
  • 0.99998 0.99996 0.99994 0.99992 0.9999 0.99988

Jaccard Index

1.00002

256 x 512 x 1024 x

256    512    1024

  •    key based encryption stegaonography

  •    lsb based stegaonography

status bit stegaonography

  •    BPCS steganography

Image Size

Fig.12. Comparison of Jaccard Index

Table 7. Comparison of MSE

Imag e size

BPCS Steganograp hy

Status bit Steganograp hy

LSB Steganograp hy

LSB Secret Key Steganogra phy

256 X 256

0.85652669

0.59842156

0.59051513

0.58898925

270833337

921659362

671875

78125

512 X 512

0.19963582

0.18011239

0.14292399

0.15258789

356770834

925675135

088541669

0625

1024 X 1024

0.48669179

0.42874857

0.35317738

0.39513905

280598956

347686596

850911456

843098956

  • UIQI

This parameter is used to measure the modifications in stego image with respect to the cover image. The best results shown by the Bpcs steganography and status bit steganography as shown in below.

  • C.    Entropy:-

  • Table 8 shows the comparison of Entropy values of all techniques

UIQI

  •    key based encryption stegaonography

  •    lsb based stegaonography

status bit stegaonography

  •    BPCS steganography

Image Size

Fig.13. Comparison of UIQI

Table 8. Comparison of Entropy

Image size

BPCS Steganogra phy

Status bit Steganograp hy

LSB Steganograp hy

LSB

Secret Key

Steganogra phy

256 X 256

5.6819561

5.70831778

5.684018599

5.6837178

067912518

47660442

9671187

965130013

512 X 512

5.7351863

5.74952317

5.736882404

5.7372235

467407274

40143229

4255113

001117264

1024 X 1024

5.7665946

5.78113672

5.767116194

5.7672020

878979781

38206337

0310984

404465014

  • D.    Correlation Coefficient:-

  • Table 9 shows the comparison of Correlation Coefficient values of all techniques.

Table 9. Comparison of Correlation

Image size

BPCS Steganogra phy

Status bit Steganograp hy

LSB

Steganogra phy

LSB Secret Key Steganogra phy

256 X 256

0.99999810

0.999998381

0.99999819

0.99999813

116155885

85416845

285453684

045791908

512 X 512

0.99999951

0.999999532

0.99999955

0.99999953

298750989

35229688

973976529

53833081

1024 X 1024

0.99999987

0.999999884

0.99999988

0.99999987

80502577

73720525

509118853

16463776

  • E.    Intersection Coefficient:-

  • Table 10 shows the comparison of Intersection Coefficient values of all techniques.

Table 10. Comparison of Intersection Coefficient

Image size

BPCS Steganogra phy

Status bit Steganograp hy

LSB Steganogra phy

LSB Secret Key Steganogra phy

256 X 256

0.24835840

0.23154428

0.24835603

0.24835348

680893925

191046689

495373784

610465022

512 X 512

0.99388411

0.97536470

0.99388273

0.99388165

257678544

775934314

850978004

801008865

1024 X 1024

0.39675645

0.38939569

0.39675627

0.39675606

302009649

632666965

452248408

75920393

  • F.    Jaccard Index

Table 11 shows the comparison of Jaccard Index values of all techniques.

Table 11. Comparison of Jaccard Index

Imag e size

BPCS Steganogra phy

Status bit Steganograp hy

LSB

Steganogra phy

LSB Secret Key Steganogra phy

256 X 256

0.99992834

0.999927879

0.99993178

0.99992940

898345062

38723726

394441506

831655186

512 X 512

0.99998164

0.999981582

0.99998340

0.99998248

163912162

79648375

156047349

335717332

1024 X 1024

0.99999537

0.999995438

0.99999564

0.99999513

926377824

16509651

578961153

630288095

  • G.    UIQI

Table 12 shows the comparison of UIQI values of all techniques.

Table 12. Comparison of UIQI

Imag e size

BPCS Steganogra phy

Status bit Steganograp hy

LSB Steganogra phy

LSB Secret Key Steganogra phy

256 X 256

0.99992834

0.999927879

0.99993178

0.99992940

898345062

38723726

394441506

831655186

512 X 512

0.99998164

0.999981582

0.99998340

0.99998248

163912162

79648375

156047349

335717332

1024 X 1024

0.99999537

0.999995438

0.99999564

0.99999513

926377824

16509651

578961153

630288095

  • VIII.    Conclusions

In this paper various steganography techniques has been implemented for confidentiality and security purpose. The human perceptibility of blue plane is known to be very low as compared to any other plane. So, the data hidden in blue plane is considered to be much secure. Therefore, in BPCS technique all the data was embedded in complex noisy blue plane. The embedding capacity of BPCS techniques and LSB techniques is high. On comparison, it is found that the LSB steganography and LSB using secret key perform the best on the basis of PSNR. According to entropy and correlation point of view, the best results are shown by the status bit and BPCS steganography techniques.

Список литературы Performance comparison of steganography techniques

  • Piyush Marwah (2010) Visual Cryptography Steganography in images. In processing of second International conference on Computing, Communication and networking Technologies, pp. 1-6.
  • Gokul M, Umeshbabu R, Vasudevan SK (2012) Hybrid Steganography using Visual cryptography and LSB encryption method. Int J computes Appl 59 5-8.
  • S.M. Masud Karim, Rahman MS (2011) A new approach for LSB based Image steganography using secret key. In proceedings of 14th international conference on computer and information Technology, pp. 286-291.
  • Shailender Gupta, Ankur Goyal, Bharat Bhushan (2012) Information hiding using least significant steganography and cryptography. In I.J. Modern Education and Computer Science 6: 27-34.
  • Chaudhary D, Gupta S, Kumari M (2016) A novel hybrid security mechanism for data communication networks. International Journal of information privacy, Security and integrity 2(3):2166-231.
  • Ritesh B, Shailender Sharma G (2016) An innovative image encryption scheme based on chaotic map and vigenere scheme. Multimedia Tools and Application 1-34. doi:10.1007/s11042-016-3926-9.
  • Chaudhary D, Gupta S, Sweety Deswal (2015) origin of Hybrid security mechanism and ways of improvement. In international journal of Big Data security Intelligence doi:10.21742/ijbdsi.2015.2.2.01 pp. 1-22.
  • Nivedhita R. and meyyappan T. (2012) Image security using Steganography and Cryptography Techniques. In international journal of Engineering trends and Technology, Vol. 3, pp.366-371.
  • Mohammad A, Yahya A (2010) public- Key steganography based on matching method. Eur j Sci Res 40(2):223-231.
  • Ramakrishna Mathe, Atukuri V, and Devireddy SK, (2012) securing Information Cryptography and steganography. In International Journal of Computer Science and Information Technologies, Vol.3, pp 4251-4255.
  • Islam MR, Siddiqa A, Uddin MP(2014) An efficient filtering based approach improving LSB image Steganography using status bit along with AES cryptography. In proceedings of 3rd International Conference on informatics, Electronics and vision, pp 1-6.
  • Shingote Parshuram N, Syed A (2014) Advanced security using Cryptography and LSB matching Steganography. International journal of comp. and Elec. Research 3(2):52-55.
  • S. Gupta, A Goyal, B Bhushan (2012) Information hiding using least significant bit steganography and Cryptography. In I.j. Modern Education and comp. Science 6:27-34.
  • Tayal N., Bansal R., Dhal S., Gupta S (2016) A novel hybrid security mechanisms for data Communication networks. Doi: 10.1007/s11042-016-4111-x.
  • Singh, A., Malik (2013) securing data by using cryptography with steganography. In international journal of advanced research in comp. science and software Eng. pp. 404-409, ISSN: 2277-128X.
  • Nivedhitha R, DT Meyyappan, Phil M (2012) Image security using steganography and cryptographic techniques. In international journal of engineering trends and technology, vol. 3, pp. 366-371.
  • Shamir A (1979) How to share a secret comm. ACM 22(11): 612-613.
  • V. Padmavathi, B.V. Vardhan, A. V. N Krishna (2016) Quantum Cryptography and Quantum Key Distribution Protocols: A Survey. 2016 IEEE 6th international conference on Advanced Computing DOI:10.1109/IACC.2016.109.
  • Ahmed A. Abd EI-Latif, Li Li, Ning wang, Qi Han, Xiamu Niu (2012) A new approach to chaotic image encryption based on Quantum Chaotic System, exploiting Color spaces. Doi: 10.1016/j.sigpro.2013.03.031.
  • Alvarez G., S. Li, (2006) some basic cryptography requirement for chaos-based cryptosystem, international journal of bifurcation and chaos 16.2129-2151.
Еще
Статья научная