HIGHER LEVEL SECURITY APPROACH FOR DATA COMMUNICATION SYSTEM BASED ON AES CRYPTOGRAPHY AND DWT STEGANOGRAPHY


(Received: 2016-03-27, Revised: 2016-06-23 , Accepted: 2016-06-26)
Cryptography is used for secured data transmission, but the resulting unreadable messages usually attract other’s attention, so steganography is employed to hide the secret information to prevent attackers from discovering the presence of secret data. This paper proposes an improved technique that combines both Advanced Encryption Standard (AES) algorithm for cryptography and steganography and takes the advantages of using the high frequency coefficients of the cover image by applying the Discrete Wavelet Transform (DWT).The proposed technique is employed to study the effect of hiding the encrypted secret message in 24-bit RGB image. The performance of the proposed method is evaluated in terms of the Peak Signal to Noise Ratio (PSNR) analysis, the payload embedding capacity and the histogram distribution analysis. Comparison to other four associated works will be offered. Experimental results reveal that the proposed method gives a secure technique for data hiding and shows robustness against different attacks.

[1] Gurpreet Kaur and Kamaljeet Kumar, "Digital Watermarking and other Data Hiding Techniques," International Journal of Innovation Technology and Exploring Engineering (IJJTEE), vol. 2, no. 5, 2013.

[2] Deepali V. Patil and Shatendra Dubey, "Review Paper on Image Steganography," International Journal of Research in Computer Applications and Robotics, vol. 2, no. 6, pp. 35-40, 2014.

[3] M. A. B. Younes and A. Jantan, "Image Encryption Using Block-based Transformation Algorithm," International Journal of Computer Science, vol. 35, issue 1, pp.15-23, 2008.

[4] Liu Tong and Qiu Zheng-Ding, "A DWT-based Color Image Steganography Scheme," Proceedings of IEEE 6th International Conference on Signal Processing, vol. 2, pp. 1568-1571, 2002.

[5] Anjali A. Shejul and U. L. Kulkarni, "A DWT-based Approach for Steganography Using Biometrics," Proceedings of IEEE 2010 International Conference on Data Storage and Data Engineering (DSDE), pp. 39-43, Feb. 2010.

[6] B. Raja Rao et al., "A Novel Information Security Scheme Using Cryptic Steganography," Indian Journal of Computer Science and Engineering, vol. 1, no. 4, pp. 327-332, 2010.

[7] Lokesh Kumar, "Novel Security Scheme for Image Steganography Using Cryptography Technique," International Journal of Advanced Research in Computer Science and Software Engineering, vol. 2, no. 4, April 2012.

[8] Falesh M. Shelke, Ashwini A. Dongre and Pravin D. Soni, "Comparison of Different Techniques for Steganography in Images," International Journal of Application or Innovation in Engineering and Management (IJAIEM), vol. 3, no. 2, 2014.

[9] Ahmed A. Abdelwahab and Lobha A. Hassan, "A Discrete Wavelet Transform Based Technique for Image Data Hiding," Proceedings of the 2nd National Radio Science Conference, pp. 1-9, Egypt, 2008.

[10] Vladimir Banoci, Gabriel Bugar and Dusan Levicky, "A Novel Method of Image Steganography in DWT Domain," Proceedings of IEEE 21st International Conference on Radioelektronika, pp. 1-4, April 2011.

[11] J. K. Mandal and M. Sengupta, "Authentication Secret Message Transformation through Wavelet Transform-based Sub-band image Coding (WTSIC)," Proceeding of IEEE 2010 International Symposium on Electronic System Design (ISED), pp. 225-229, Dec. 2010.

[12] Souvik Roy and P. Venkateswaran, "Online Payment System Using Steganography and Visual Cryptography," 2014 IEEE Students’ Conference on Electrical, Electronics and Computer Science (SCEECS), pp. 1-5, Mar. 2014.

[13] Pye Pye Aung and Tun Min Naing, "Implementation of Cryptography and Image Steganography with New Security Feature," International Conference on Advances in Engineering and Technology (ICAET'2014), 2014.

[14] F. M. Septimin, Mircea Valdutin and P. Lucian, "Secret Data Communication System using Steganography, AES and RSA," 2011 IEEE 17th International Symposium for Design and Technology in Electronic Packaging (SIITME), pp. 339-344, Oct. 2011.

[15] Kamal and Lovnish Bansal, "Enhancement Key of Cryptography and Steganography Using RSA and Neural Network," International Journal of Advanced Research in Computer Engineering and Technology (IJARCET), vol. 3, no. 5, 2014.

[16] S. K. Muttoo and Sushil Kumar, "A Multilayered Secure, Robust and High-Capacity Image Steganographic Algorithm," World of Computer Science and Information Technology Journal (WCSIT), vol. 1, no. 6, pp. 239-246, 2011.

[17] Adnan Gutub, Mahmoud Ankeer, Muhammad Abu-Ghalioun, Abdulrahman Shaheen and Aleem Alvi, "Pixel Indicator High-Capacity Technique for RGB Image based Steganography," IEEE International Workshop on Signal Processing and Its Applications, University of Sharjah, Sharjah, U.A.E., 2008.

[18] Ruchi R. Vairagade, Shubhangini Ugale and Prachi Pendke, "Review on 128-Bit Advanced Encryption Standard Algorithm with Fault Detection," International Journal of Advanced Information and Communication Technology (IJAICT), vol. 1, no. 7, 2014.

[19] Mohammad Abdullatif, Othman O. Khalifa, R. F. Olanrewaju and Akram M. Zeki, "Robust Image Watermarking Scheme by Discret Wavelet Transform," Proceedings of IEEE 5th International Conference on Computer and Communication Engineering (ICCCE), pp. 316-319, Sept. 2014.

[20] Swapnali Zagade and Smita Bhosale, "Secret Data Hiding in Images by Using DWT Techniques," International Journal of Engineering and Advanced Technology (IJEAT), vol. 3, no. 5, 2014.

[21] Yazan Abdallah and H. Seidan, Enhancement of a Steganographic Algorithm for Hiding Text Messages in Images, M. Sc. Thesis, Middle East University, 2013.

[22] Saleh Saraireh, "A Secure Data Communication System Using Cryptography and Steganography," International Journal of Computer Networks and Communications (IJCNC), vol. 5, no. 3, 2013.

[23] S. K. Ghosal, "A New Pairwise Bit-based Data Hiding Approach on 24-Bit Color Image Using Steganographic Technique," Greater Kolkata College of Engineering & Management, Kolkata, India, 2011.

[24] T. Vanitha, Anjalin D'Souza, B. Rashmi and Sweeta D'Souza, "A Review on Steganography – Least Significant Bit Algorithm and Discrete Wavelet Transform Algorithm," International Journal of Innovative Research in Computer and Communication Engineering, vol. 2, special issue 5, 2014.

[25] Amitava Nag, Sushanta Biswas, Debasree Sarkar and Partha Pratim Sarkar, "A Novel Technique for Image Steganography Based on DWT and Huffman Encoding," International Journal of Computer Science and Security (IJCSS), vol. 4, no. 6, 2011.

[26] R. Chandramouli and N. D. Memon, "Steganography Capacity: A Steganalysis Perspective," Proc. SPIE Security and Watermarking of Multimedia Contents, Special Session on Steganalysis, 2003.