CFP last date
16 December 2024
Reseach Article

A Lookup XOR Cryptography for High Capacity Least Significant Bit Steganography

by William W.F., Osofisan A.O., Asanbe M.O.
International Journal of Applied Information Systems
Foundation of Computer Science (FCS), NY, USA
Volume 10 - Number 7
Year of Publication: 2016
Authors: William W.F., Osofisan A.O., Asanbe M.O.
10.5120/ijais2016451525

William W.F., Osofisan A.O., Asanbe M.O. . A Lookup XOR Cryptography for High Capacity Least Significant Bit Steganography. International Journal of Applied Information Systems. 10, 7 ( March 2016), 16-22. DOI=10.5120/ijais2016451525

@article{ 10.5120/ijais2016451525,
author = { William W.F., Osofisan A.O., Asanbe M.O. },
title = { A Lookup XOR Cryptography for High Capacity Least Significant Bit Steganography },
journal = { International Journal of Applied Information Systems },
issue_date = { March 2016 },
volume = { 10 },
number = { 7 },
month = { March },
year = { 2016 },
issn = { 2249-0868 },
pages = { 16-22 },
numpages = {9},
url = { https://www.ijais.org/archives/volume10/number7/876-2016451525/ },
doi = { 10.5120/ijais2016451525 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2023-07-05T19:01:55.845864+05:30
%A William W.F.
%A Osofisan A.O.
%A Asanbe M.O.
%T A Lookup XOR Cryptography for High Capacity Least Significant Bit Steganography
%J International Journal of Applied Information Systems
%@ 2249-0868
%V 10
%N 7
%P 16-22
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Security of information and optimal bandwidth utility has become major problem with growth in data communication over computer networks. Steganography and cryptography are two different data hiding techniques employed to solve this problem. Steganography hides messages inside some other digital media. Cryptography, on the other hand obscures the content of the message. This work proposes a high capacity data security approach by the combination of Steganography and cryptography techniques. In the process a message is first encrypted using a newly developed symmetric key Lookup XOR cryptographic algorithm and thereafter the encrypted message is embedded inside an image file using lease significant bit (LSB) insertion method used in [2] and [5]. This combinational methodology satisfies requirements such as capacity, security and robustness for secure data transmission over the network better than Data Encryption Standard (DES) because it provides a strong encryption scheme with minimized cipher text using a one-to-one mapping through the aid of a look-up table.

References
  1. Manoj R, Naveen H and Anil K S, Secured Steganography Approach Using AES Vol. 3, Issue 3, Aug 2013, 185-192
  2. Himanshu G, Ritesh K, Soni C. Enhanced Data Hiding Using LSB-Based Image Steganography Method. International Journal of Emerging Technology and Advanced Engineering. Volume 3, Issue 6, June 2013, pp 212-214.
  3. Komal P, Sumit U and Hitesh G, “Information Hiding using Least Significant Bit Steganography and Blowfish Algorithm” International Journal of Computer Applications (0975 – 8887) Volume 63– No.13, February 2013
  4. Abikoye O C, Adewole K S. and Oladipupo A J. “Efficient Data Hiding System using Cryptography and Steganography” , International Journal of Applied Information Systems (IJAIS) , Volume 4– No.11, December 2012.
  5. Shamim A L and Kattamanchi H, High Capacity data hiding using LSB Steganography and Encryption, International Journal of Database Management Systems ( IJDMS ) Vol.4, No.6, December 2012.
  6. M. Wu and B. Liu, Multimedia Data Hiding. New York: Springer-Verlag, 2003. Steganography and Digital Watermarking Techniques for Protection of Intellectual Property. Hershey, PA: Idea Group Publishing, 2004.
  7. B. Furht and D. Kirovski, Multimedia Security Handbook, Part III and IV. Boca Raton, FL: CRC, 2005.
  8. Valarmathi R,M, Kadhar G. M, Nawaz M.C.A Information Hiding Using Audio Steganography with Encrypted Data. International Journal of Advanced Research in Computer and Communication Engineering Vol. 3, Issue 1, January 2014
  9. Ayushi. “A Symmetric Key Cryptographic Algorithm” International Journal of Computer Applications , pp. 0975 – 8887, Volume 1 – No. 15, 2010
  10. Ms. Hemlata Sharma,Ms. MithleshArya and Mr. Dinesh Goyal “Secure Image Hiding Algorithm using Cryptography and Steganography” IOSR Journal of Computer Engineering (IOSR-JCE) Volume 13, Issue 5 (Jul. - Aug. 2013), PP 01-06
  11. Barnali Gupta Banik and Prof. Samir K. Bandyopadhyay, “A DWT Method for Image Steganography” International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 6, June 2013
  12. Komal Patel, Sumit Utareja and Hitesh Gupta, “Information Hiding using Least Significant Bit Steganography and Blowfish Algorithm” International Journal of Computer Applications (0975 – 8887) Volume 63– No.13, February 2013
  13. Chandranath Adak “Robust Steganography Using LSB-XOR and Image Sharing".
Index Terms

Computer Science
Information Sciences

Keywords

Cryptography Stenography Lookup XOR one-to-one mapping Data Security LSB Data Encryption Standard (DES)