CFP last date
15 January 2025
Reseach Article

Efficient Data Hiding System using Cryptography and Steganography

by Abikoye Oluwakemi C., Adewole Kayode S., Oladipupo Ayotunde J.
International Journal of Applied Information Systems
Foundation of Computer Science (FCS), NY, USA
Volume 4 - Number 11
Year of Publication: 2012
Authors: Abikoye Oluwakemi C., Adewole Kayode S., Oladipupo Ayotunde J.
10.5120/ijais12-450763

Abikoye Oluwakemi C., Adewole Kayode S., Oladipupo Ayotunde J. . Efficient Data Hiding System using Cryptography and Steganography. International Journal of Applied Information Systems. 4, 11 ( December 2012), 6-11. DOI=10.5120/ijais12-450763

@article{ 10.5120/ijais12-450763,
author = { Abikoye Oluwakemi C., Adewole Kayode S., Oladipupo Ayotunde J. },
title = { Efficient Data Hiding System using Cryptography and Steganography },
journal = { International Journal of Applied Information Systems },
issue_date = { December 2012 },
volume = { 4 },
number = { 11 },
month = { December },
year = { 2012 },
issn = { 2249-0868 },
pages = { 6-11 },
numpages = {9},
url = { https://www.ijais.org/archives/volume4/number11/400-0763/ },
doi = { 10.5120/ijais12-450763 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2023-07-05T10:48:13.447311+05:30
%A Abikoye Oluwakemi C.
%A Adewole Kayode S.
%A Oladipupo Ayotunde J.
%T Efficient Data Hiding System using Cryptography and Steganography
%J International Journal of Applied Information Systems
%@ 2249-0868
%V 4
%N 11
%P 6-11
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Increase in the number of attack recorded during electronic exchange of information between the source and intended destination has indeed called for a more robust method for securing data transfer. Cryptography and steganography are well known and widely used techniques that manipulate information in order to cipher or hide their existence. These two techniques share the common goals and services of protecting the confidentiality, integrity and availability of information from unauthorized access. In this paper, a data hiding system that is based on audio steganography and cryptography is proposed to secure data transfer between the source and destination. Audio medium is used for the steganography and a LSB (Least Significant Bit) algorithm is employed to encode the message inside the audio file. The proposed system was evaluated for effectiveness and the result shows that, the encryption and decryption methods used for developing the system make the security of the proposed system more efficient in securing data from unauthorized access. The system is therefore, recommended to be used by the Internet users for establishing a more secure communication.

References
  1. Dipti, K. S. and Neha, B. 2010. Proposed System for Data Hiding Using Cryptography and Steganography. International Journal of Computer Applications. 8(9), pp. 7-10. Retrieved 14th August, 2012 from http://www. ijcaonline. org/volume8/number9/pxc3871714. pdf.
  2. Jayaram, P. , Ranganatha, H. R. and Anupama, H. S. 2011. Information Hiding Using Audio Steganography – A Survey. International Journal of Multimedia and Its Application, 3(3), pp. 86-96.
  3. Mark D. G. 2003. Chameleon Image Steganography- Technical Paper. Retrieved 14th July, 2012 from http://faculty. ksu. edu. sa/ghazy/Steg/References/ref13. pdf.
  4. Niels, P. and Peter, H 2003. Hide and Seek: An Introduction to Steganography. IEEE Computer Society. IEEE Security and Privacy, pp. 32-44.
  5. Raphael, A. J. , and Sundaram, V. 2011. Cryptography and Steganography - A Survey. International Journal of Computer Technology Application, 2(3), ISSN: 2229-6093, pp. 626-630.
  6. Simon, B. , Steve M. , and Ray, F. 2005. Object-Oriented Systems Analysis and Design Using UML, (3rd ed. ), McGraw Hill.
  7. Sridevi, R. , Damodaram, A. , and Narasimham, S. 2009. Efficient Method of Audio Steganography By Modified LSB Algorithm and Strong Encryption Key with Enhanced Security. Journal of Theoretical and Applied Information Technology, pp. 768-771. Retrieved 21st August, 2012 from http://www. jatit. org.
  8. Vivek, J. , Lokesh, K. , Madhur, M. S. , Mohd, S. , and Kshitiz Rastogi 2012. Public-Key Steganography Based on Modified LSB Method. Journal of Global Research in Computer Science, 3(4). ISSN: 2229-371X, pp. 26-29.
  9. Domenico, B. and Luca, L. year. Image Based Steganography and Cryptography.
  10. Mohammad, A. A. , and Abdelfatah, A. Y. 2010. Public-Key Steganography Based on Matching Method. European Journal of Scientific Research, 40(2). ISSN: 1450-216X. EuroJournals Publishing, Inc. , pp. 223-231. Retrieved 21st August, 2012 from http://www. eurojournals. com/ejsr. htm.
  11. Sujay, N. and Gaurav, P. 2010. Two New Approaches for Secured Image Steganography Using Cryptographic Techniques and Type Conversions. Signal & Image Processing: An International Journal (SIPIJ), 1(2), pp 60-73.
Index Terms

Computer Science
Information Sciences

Keywords

Electronic exchange cryptography steganography Least Significant Bit algorithm