Google scholar arxiv informatics ads IJAIS publications are indexed with Google Scholar, NASA ADS, Informatics et. al.

Call for Paper

-

July Edition 2021

International Journal of Applied Information Systems solicits high quality original research papers for the July 2021 Edition of the journal. The last date of research paper submission is June 15, 2021.

A Lookup XOR Cryptography for High Capacity Least Significant Bit Steganography

William W.F., Osofisan A.O., Asanbe M.O.. Published in Image Processing

International Journal of Applied Information Systems
Year of Publication: 2016
Publisher: Foundation of Computer Science (FCS), NY, USA
Authors: William W.F., Osofisan A.O., Asanbe M.O.
10.5120/ijais2016451525
Download full text
  1. William W.F., Osofisan A.O. and Asanbe M.O.. Article: A Lookup XOR Cryptography for High Capacity Least Significant Bit Steganography. International Journal of Applied Information Systems 10(7):16-22, March 2016. BibTeX

    @article{key:article,
    	author = "William W.F. and Osofisan A.O. and Asanbe M.O.",
    	title = "Article: A Lookup XOR Cryptography for High Capacity Least Significant Bit Steganography",
    	journal = "International Journal of Applied Information Systems",
    	year = 2016,
    	volume = 10,
    	number = 7,
    	pages = "16-22",
    	month = "March",
    	note = "Published by Foundation of Computer Science (FCS), NY, USA"
    }
    

Abstract

Security of information and optimal bandwidth utility has become major problem with growth in data communication over computer networks. Steganography and cryptography are two different data hiding techniques employed to solve this problem. Steganography hides messages inside some other digital media. Cryptography, on the other hand obscures the content of the message. This work proposes a high capacity data security approach by the combination of Steganography and cryptography techniques. In the process a message is first encrypted using a newly developed symmetric key Lookup XOR cryptographic algorithm and thereafter the encrypted message is embedded inside an image file using lease significant bit (LSB) insertion method used in [2] and [5]. This combinational methodology satisfies requirements such as capacity, security and robustness for secure data transmission over the network better than Data Encryption Standard (DES) because it provides a strong encryption scheme with minimized cipher text using a one-to-one mapping through the aid of a look-up table.

Reference

  1. Manoj R, Naveen H and Anil K S, Secured Steganography Approach Using AES Vol. 3, Issue 3, Aug 2013, 185-192
  2. Himanshu G, Ritesh K, Soni C. Enhanced Data Hiding Using LSB-Based Image Steganography Method. International Journal of Emerging Technology and Advanced Engineering. Volume 3, Issue 6, June 2013, pp 212-214.
  3. Komal P, Sumit U and Hitesh G, “Information Hiding using Least Significant Bit Steganography and Blowfish Algorithm” International Journal of Computer Applications (0975 – 8887) Volume 63– No.13, February 2013
  4. Abikoye O C, Adewole K S. and Oladipupo A J. “Efficient Data Hiding System using Cryptography and Steganography” , International Journal of Applied Information Systems (IJAIS) , Volume 4– No.11, December 2012.
  5. Shamim A L and Kattamanchi H, High Capacity data hiding using LSB Steganography and Encryption, International Journal of Database Management Systems ( IJDMS ) Vol.4, No.6, December 2012.
  6. M. Wu and B. Liu, Multimedia Data Hiding. New York: Springer-Verlag, 2003. Steganography and Digital Watermarking Techniques for Protection of Intellectual Property. Hershey, PA: Idea Group Publishing, 2004.
  7. B. Furht and D. Kirovski, Multimedia Security Handbook, Part III and IV. Boca Raton, FL: CRC, 2005.
  8. Valarmathi R,M, Kadhar G. M, Nawaz M.C.A Information Hiding Using Audio Steganography with Encrypted Data. International Journal of Advanced Research in Computer and Communication Engineering Vol. 3, Issue 1, January 2014
  9. Ayushi. “A Symmetric Key Cryptographic Algorithm” International Journal of Computer Applications , pp. 0975 – 8887, Volume 1 – No. 15, 2010
  10. Ms. Hemlata Sharma,Ms. MithleshArya and Mr. Dinesh Goyal “Secure Image Hiding Algorithm using Cryptography and Steganography” IOSR Journal of Computer Engineering (IOSR-JCE) Volume 13, Issue 5 (Jul. - Aug. 2013), PP 01-06
  11. Barnali Gupta Banik and Prof. Samir K. Bandyopadhyay, “A DWT Method for Image Steganography” International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 6, June 2013
  12. Komal Patel, Sumit Utareja and Hitesh Gupta, “Information Hiding using Least Significant Bit Steganography and Blowfish Algorithm” International Journal of Computer Applications (0975 – 8887) Volume 63– No.13, February 2013
  13. Chandranath Adak “Robust Steganography Using LSB-XOR and Image Sharing".

Keywords

Cryptography, Stenography, Lookup, XOR, one-to-one, mapping, Data Security, LSB, Data Encryption Standard (DES)