0% found this document useful (0 votes)
30 views5 pages

Enhanced Digital Image and Text Data Security Using Hybrid Model of LSB Steganography and AES Cryptography Technique

The document presents a hybrid model combining LSB steganography and AES cryptography techniques to enhance the security of digital images and text data. It discusses the challenges of data protection in digital communication and details the methodology for embedding secret information within images while ensuring robust encryption. The proposed method achieves high security levels, evidenced by low MSE and high PSNR values, making unauthorized access extremely difficult.

Uploaded by

hellouniversx1
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
30 views5 pages

Enhanced Digital Image and Text Data Security Using Hybrid Model of LSB Steganography and AES Cryptography Technique

The document presents a hybrid model combining LSB steganography and AES cryptography techniques to enhance the security of digital images and text data. It discusses the challenges of data protection in digital communication and details the methodology for embedding secret information within images while ensuring robust encryption. The proposed method achieves high security levels, evidenced by low MSE and high PSNR values, making unauthorized access extremely difficult.

Uploaded by

hellouniversx1
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

Proceedings of the Second International Conference on Artificial Intelligence and Smart Energy (ICAIS-2022)

IEEE Xplore Part Number: CFP22OAB-ART; ISBN: 978-1-6654-0052-7

Enhanced Digital Image and Text Data Security


Using Hybrid Model of LSB Steganography and AES
Cryptography Technique
2022 Second International Conference on Artificial Intelligence and Smart Energy (ICAIS) | 978-1-6654-0052-7/22/$31.00 ©2022 IEEE | DOI: 10.1109/ICAIS53314.2022.9742942

Dr. Manish Kumar


Aman Soni
Department of CSE
Arya Institute of Engineering & Technology, Department of CSE
Jaipur, Rajasthan, India Arya College of Engineering and Research Centre,
[email protected] Jaipur, Rajasthan, India
[email protected]

Ajay Raj Singh Shekhawat Akash Rawat


Department of CSE Department of CSE
Arya College of Engineering and Research Centre, Arya College of Engineering and Research Centre,
Jaipur, Rajasthan, India Jaipur, Rajasthan, India
[email protected] [email protected]

Abstract: In the present innovation, for the trading of network security [3]. Here, utilizing the technique, the
information, the internet is the most well-known and significant original digital data is changed over to encrypted data that is
medium. With the progression of the web and data innovation, totally differing then the original data. For the purpose of the
computerized media has become perhaps the most famous and encryption different types of the algorithms and encryption
notable data transfer tools. This advanced information techniques are used.
incorporates text, pictures, sound, video etc moved over the
public organization. The majority of these advanced media The image is that the commonest mode of communication
appear as pictures and are a significant part in different utilized in numerous fields like medical, research, industry,
applications, for example, chat, talk, news, website, web-based military zone, etc. an oversized image transfer can occur in
business, email, and digital books. The content is still facing an unsecure web network. Therefore, an applicable lock is
various challenges in which including the issues of protection of needed for the image to forestall unauthorized access to big
copyright, modification, authentication. Cryptography, data. The advantage of the photo is that it covers additional
steganography, embedding techniques is widely used to secure information of the multimedia device and has to be covered
the digital data. In this present the hybrid model of LSB [4]. Secret writing can be a reasonable safety method for an
steganography and Advanced Encryption Standard (AES) image, provides protection through transferring and storing
cryptography techniques to enhanced the security of the digital the digital data over the Internet.
image and text that is undeniably challenging to break by the
unapproved person. The security level of the secret information II. LITERATURE SURVEY
is estimated in the term of MSE and PSNR for better hiding
required the low MSE and high PSNR values. in [1] different kind of the data hiding methos are
presented which provide the security to the digital data using
Keywords : Steganography, Cryptography, Hiding, Stego the different steganography techniques. In [2] present a
Image, Encrypted Image, Decrypted Image. hybrid model of LSB hiding and genetic algorithm encryption
technique to provide the security to digital information. For
I. INTRODUCTION security of the digital data combination of steganography and
In the time of data innovation, the internet is the main cryptography is used [3-4, 6]. MSE and PSNR Value is get
piece of data trade or most well-known way for transferring the 0.055199 and 60.7115, 0.12489 and 57.1654 respectively
or sharing the information data [1]. This advanced in [4] and [6]. RSA is one of the best asymmetric algorithms
information incorporates text, pictures, sound, video etc to that are very difficult to creak by the unauthorized person, it
move over the public organization. The greater part of these is mainly used for provide the security to the digital data by
advanced media appears as pictures and are a significant part encryption decryption operations [5]. In [7] present the CNN
in different applications, for example, talk, news, sites, online based watermarking technique for image security that
business, email, digital books etc [2]. This digital content provide the robustness security to the digital image.
really faces different troubles, including confirmation, III. OVERVIEW OF CRYPTOGRAPHY
copyright protection issues and more. Various procedures
like encryption, hiding, embedding etc can be used to get this In the cryptography mainly two operations are done at the
advanced information or data. For computerized sender end encryption and at the receiver end decryption.
correspondence applications the image encryption is a Encryption is the process in which the original data are
significant examination point in the area of cryptography and changed into the totally differ from the original data and in
decryption process get the original data from the encrypted

978-1-6654-0052-7/22/$31.00 ©2022 IEEE 1453


Authorized licensed use limited to: R V College of Engineering. Downloaded on April 19,2025 at 04:51:06 UTC from IEEE Xplore. Restrictions apply.
Proceedings of the Second International Conference on Artificial Intelligence and Smart Energy (ICAIS-2022)
IEEE Xplore Part Number: CFP22OAB-ART; ISBN: 978-1-6654-0052-7

data. For encryption and decryption purpose different types V. LEAST SIGNIFICANT BIT (LSB) TECHNIQUE
of the algorithm are used like Advanced Encryption Standard There are various methodologies of performing
algorithm, Genetic algorithm, Choas Mathematical Steganography, but the most frequently used is the LSB
algorithm, RSA algorithm and more [5]. These cryptography algorithm. This method alters the LSB of dissimilar bytes
algorithms and techniques are categorized into symmetric with a bit from the message that will be concealed. The main
and asymmetric. advantage of using LSB is its easy implementation and it also
A. Symmetric Key Cryptography permits high perceptual transparency. The message-hiding
ability of the LSB technique is highly secure [9-10].
Between the sender and receiver only one key is used for
digital data encryption and decryption purpose in symmetric LSB is the most acceptable and simple approach used in
key cryptography. steganography. This technique makes use of LSB of the
original cover image’s pixels. The LSB steganography
technique uses the LSB substitution procedure. The resulting
image is termed as “Stego Image” which is similar to the
original image having hidden data into it.

1 0 0 1 0 1 0 1

Binary data contain LSB and MSB bits. Least significant


bits (LSB) are the one which is present at the rightmost side
of the binary data and the most significant bits (MSB) are the
one which is present at the leftmost side of binary data.
Fig. 1.Symmetric Key Cryptography
The reason behind using the LSB technique is that if we
B. Asymmetric Key Cryptography change the LSB bit it will have less impact on the final result.
In contract, if we flip the MSB bit it will have a large impact
Between the sender and receiver different key are used for
on the final image.
digital data encryption and decryption purpose in asymmetric
key cryptography. These key are called public and private VI. AES CRYPTOGRAPHY TECHNIQUE
key.
AES has been adopted by the US Government and is
currently used worldwide. It replaces the information
encoding normal, revealed in 1977. The rule represented by
AES may be a bilaterally symmetrical key technique, which
implies that identical secret's accustomed write in code and
rewrite the information.
In the US, on Gregorian calendar month twenty six, 2001,
government agency proclaimed the name America FIPS tap
house 197 (FIPS 197) within the us. This announcement
followed a five-year standardization method throughout that
the chosen Rijndael Fig was obtained because the most
Fig. 2.Asymmetric Key Cryptography applicable.
Each tour includes many process steps, together with
IV. OVERVIEW OF STEGANOGRAPHY those supported constant secret writing key. A group of
From the two Greek words the word Steganography reverse tours is applied to convert the encoded text back to
comes that words are stego and graphic. The word stego unformatted native text victimization constant secret writing
means cover and the word graphic means meaningful writing. key.
So it means that the meaningful writing hidden in the cover
Symmetric AES writing in cluster, there are 3 varieties of key
is called Steganography [6]. Basically Text, image, audio and
length during this committal to writing method: 128 bit, 196
video these four types of steganography is categorized [8].
bit and 256 bit, packet size is 128 bit, and the algorithmic rule
has smart flexibility. This is often why it's wide employed in
the program. The length of 3 keys of the AES algorithmic
rule, 128 bits. Key length is often used. In key length, ten
times recurrent calculation within the internal algorithmic
rule. Till the ultimate spherical, every spherical consists of 5
parts: S-Box, Shift Rows, Shift Column, and therefore the
main addition stage [6, 11].

Fig. 3.Types of Steganography

978-1-6654-0052-7/22/$31.00 ©2022 IEEE 1454


Authorized licensed use limited to: R V College of Engineering. Downloaded on April 19,2025 at 04:51:06 UTC from IEEE Xplore. Restrictions apply.
Proceedings of the Second International Conference on Artificial Intelligence and Smart Energy (ICAIS-2022)
IEEE Xplore Part Number: CFP22OAB-ART; ISBN: 978-1-6654-0052-7

In the Fig 5 displayed the proposed used technique


flowchart.

Fig. 5.Flowchart of Propsoed Technique

VIII. RESULT OF PROPOSED TECHNIQUE


In the fig 5 showed the flowchart of the proposed plan
method for picture and text data security. Presently first select
the cover picture of nature view (displayed in the Fig 6) and
in Fig 7 displayed the secret text data.

Fig. 4.Flowchart of Propsoed Technique

VII. PROPOSED TECHNIQUE


In this proposed work hybrid model of steganography and
cryptography is used to enhanced the security to the digital
data which mean that it provides multi layers of protection
which is very difficult to crack by the unauthorized person.
In proposed work first hide the secret text data into the
cover picture using the LSB steganography technique and
resultant obtained the stego picture. The stego picture showed
same as the cover picture however it comprises of the secret
text data moreover. Presently in the wake of getting the stego
picture ascertain the worth of MSE and PSNR values where
low MSE and high PSNR values esteem is required for better
hiding. Now apply the cryptographic techniques in the stego
picture and get the encrypted or scrambled picture. For
encryption purpose AES algorithm is used. By using this
proposed technique achieve the very high level and robust
security of secret text and image that is extremely challenging
to break by the unapproved person. Fig. 6.Cover Image of Nature View

978-1-6654-0052-7/22/$31.00 ©2022 IEEE 1455


Authorized licensed use limited to: R V College of Engineering. Downloaded on April 19,2025 at 04:51:06 UTC from IEEE Xplore. Restrictions apply.
Proceedings of the Second International Conference on Artificial Intelligence and Smart Energy (ICAIS-2022)
IEEE Xplore Part Number: CFP22OAB-ART; ISBN: 978-1-6654-0052-7

Now apply the AES algorithm on the stego image and get
the encrypted or scrambled picture that is thoroughly vary
then cover image and stego image. The encrypted image is
displayed in the fig 10.

Fig. 7.Secret Text

Now apply the LSB Steganography algorithm on Secret


Text and Cover image. In the wake of applying LSB
steganography method gets the stego picture that is shown
same as the cover picture yet it additionally comprises of the
secret text. The Stego Image is shown in the Fig 8.

Fig. 10.Encrypted Image

These all the process done at the sender end, in which the
secret text data and cover image are send to the one person to
another person securely. At, the receiver end done the reverse
of this process in which get the decrypted cover image, and
decoded secret text data. In Fig 11 displayed the decrypted
cover image and in fig 12 displayed the secret text data
(Nature).

Fig. 8.Stego Image

When get the stego image calculate the MSE and PSNR
value which is displayed in Fig 9. Using proposed technique
got the MSE value is 0.0019922 and PSNR value is 75.1375.

Fig. 9.Obtained MSE and PSNR Value Fig. 11.Decrypted Image

978-1-6654-0052-7/22/$31.00 ©2022 IEEE 1456


Authorized licensed use limited to: R V College of Engineering. Downloaded on April 19,2025 at 04:51:06 UTC from IEEE Xplore. Restrictions apply.
Proceedings of the Second International Conference on Artificial Intelligence and Smart Energy (ICAIS-2022)
IEEE Xplore Part Number: CFP22OAB-ART; ISBN: 978-1-6654-0052-7

Stenography and Embedding Techniques”, Design Engineering, Issue-


7, pp-8592- 8599, 2021.
[5] Gaurav Kumar Soni, Himanshu Arora and Bhavesh Jain, "A Novel
Image Encryption Technique Using Arnold Transform and
Asymmetric RSA Algorithm", Springer International Conference on
Artificial Intelligence: Advances and Applications 2019 Algorithm for
Intelligence System, pp. 83-90, 2020.
Fig. 12.Decoded Secrt Text Data [6] Matted S., Shankar G., Jain B.B., “Enhanced Image Security Using
Stenography and Cryptography”, Springer Computer Networks and
IX. CONCLUSION Inventive Communication Technologies. Lecture Notes on Data
Engineering and Communications Technologies, vol 58, 2021.
In the proposed work the crossover model of the [7] Dhaya, R. "Light Weight CNN based Robust Image Watermarking
steganography and cryptography is utilized to give greater Scheme for Security", Journal of Information Technology and Digital
security to the digital data which imply that it gives multi- World 3, no. 2, pp. 118-132, 2021.
facets of assurance which is truly challenging to break by the [8] Manish Choubisa and Gaurav Kumar Soni Vipin Singh, "Enhanced
unauthorized person. For stegnography purpose LSB Image Steganography Technique for Hiding Multiple Images in an
technique is used and for cryptography purpose AES Image Using LSB Technique", TEST Engineering & Management,
algorithm used. Using proposed technique got the MSE value Vol-83, May-June 2020.
is 0.0019922 and PSNR value is 75.1375. For better hidding [9] Areesha Anjum and Saiful Islam, "LSB Steganalysis Using Modified
low MSE and high PSNR parameters value is required. In this Weighted Steno Image Method", IEEE 3rd International Conference
proposed work acquired higher MSE and lower PSNR value on Signal Processing and Integrated Networks (SPIN), PP-630-635,
then the past work done and displayed it in Table 1. So 2016.
enhance the security of the secret text data by using the [10] Swati Bhargava and Manish Mukhija, “Hide Image And Text Using
proposed technique. In proposed work provide the two layer Lsb, Dwt And Rsa Based On Image Steganography”, ICTACT Journal
security to the secret text data using hiding and encryption. On Image And Video Processing, Volume: 09, Issue: 03, pp. 1940-
By using this proposed technique achieve the very high level 1946, Feb 2019.
and robust security of secret text and digital image that is [11] Qi Zhang and Qunding, “Digital Image Encryption Based On
extremely challenging to break by the unapproved person. Advanced Encryption Standard (AES) Algorithm”, IEEE Fifth
International Conference on Instrumentation and Measurement,
TABLE 1. COMPARATIVE ANALYSIS OF MSE AND PSNR WITH PREVIOUS Computer, Communication and Control, pp-1219-1221, 2015.
WORK AND PROPOSED WORK [12] Supriadi Rustad, De Rosal Ignatius Moses Setiadi, Abdul Syukur and
Pulung Nurtantio Andono, "Inverted LSB image steganography using
Ref Used MSE PSNR adaptive pattern to improve imperceptibility", Journal of King Saud
Year
No. Algorithm/Technique Value Value University –Computer and Information Sciences, PP-1-10, 2021.
[13] Manish Kumar, Dr. Sunil Kumar and Dr. Harish Nagar, "Enhanced
4 2021 DCT, LSB 0.055199 60.7115 Text and Image Security Using Combination of DCT Steganography,
XOR Embedding and Arnold Transform", Design Engineering, pp. 732
12 2021 LSB 0.176664 56.053304 - 739, 2021.

13 2021 DCT, XOR, Arnold 0.074 59.47

6 2020 LSB 0.12489 57.1654

Proposed
LSB, AES 0.0019922 75.1375
Work

REFERENCES
[1] Dr. Harish Nagar Manish Kumar, Dr.Sunil Kumar,"Comparative
Analysis of Different Steganography Technique for image or Data
Security", International Journal of Advanced Science & Technology
(IJAST), Vol.-29, Issue-4, 2020.
[2] Soni G.K., Rawat A., Jain S., Sharma S.K., “A Pixel-Based Digital
Medical Images Protection Using Genetic Algorithm with LSB
Watermark Technique”, Smart Systems and IoT: Innovations in
Computing. Smart Innovation, Systems and Technologies, vol 141,
2020.
[3] H. Arora, G. K. Soni, R. K. Kushwaha and P. Prasoon, "Digital Image
Security Based on the Hybrid Model of Image Hiding and Encryption,"
2021 6th International Conference on Communication and Electronics
Systems (ICCES), pp. 1153-1157, 2021.
[4] Arpita Tiwari, Gori Shankar and Dr. Bharat Bhusan Jain, “Digital
Image and Text Data Security Improvement Using the Combination of

978-1-6654-0052-7/22/$31.00 ©2022 IEEE 1457


Authorized licensed use limited to: R V College of Engineering. Downloaded on April 19,2025 at 04:51:06 UTC from IEEE Xplore. Restrictions apply.

You might also like