An Improved Hybrid Mechanism for Secure Data Communication

Full Text (PDF, 1260KB), PP.67-78

Views: 0 Downloads: 0

Author(s)

Sangeeta Dhall 1,* Bharat Bhushan 1 Shailender Gupta 1

1. YMCA University of Science and Technology, Faridabad, India

* Corresponding author.

DOI: https://doi.org/10.5815/ijcnis.2016.06.08

Received: 21 Jul. 2015 / Revised: 15 Oct. 2015 / Accepted: 4 Feb. 2016 / Published: 8 Jun. 2016

Index Terms

Security, cryptography, steganography, compression technique, performance metrics

Abstract

The In today’s era with increase in the use of internet and networking devices, there is an increase in demand for more secure data communication. This problem has led to development of hybrid security mechanisms. Various techniques are available in literature that makes use of different steganography and cryptographic mechanisms which has certain pros and cons. In this paper, we propose a new hybrid security mechanism that tries to choose the best cryptographic and steganography mechanism. In addition, to increase the embedding capacity of the proposed mechanism, Huffman encoding scheme is used. The proposed strategy is implemented in MATLAB-09. In order to check the efficacy of the proposed technique three types of analysis were performed named as: security, robustness and efficiency analysis. It is found from the simulation and results that the proposed scheme outperforms other techniques in literature in every aspect.

Cite This Paper

Sangeeta Dhall, Bharat Bhushan, Shailender Gupta, "An Improved Hybrid Mechanism for Secure Data Communication", International Journal of Computer Network and Information Security(IJCNIS), Vol.8, No.6, pp.67-78, 2016. DOI:10.5815/ijcnis.2016.06.08

Reference

[1]R.Nivedhitha, Dr.T.Meyyappan, “Image Security Using Steganography and Cryptographic Techniques” in International Journal of Engineering and Technology Vol. 3, Issue 3, pp 366-371, 2012.
[2]Shingote Parshuram N., Syed Akhter Hussain and Bhujbal Pallavi M., “Advanced Security Using Cryptography and LSB Matching Steganography” in International Journal of Computer and Electronics Research Vol. 3, Issue 2, pp 52-55, 2014.
[3]Moumita Pramanaik, Kalpana Sharma, “Analysis of Visual Cryptography, Steganography Schemes and its Hybrid Approach for Security of Images” in International Journal of Emerging Technology and Advanced Engineering, Vol.6, Issue 2, pp 174-178, 2014.
[4]Md. Rashedul Islam, AyashaSiddiqa, Md. Palash Uddin, Ashis Kumar Mandal and Md. Delowar Hossain, “An Efficient Filtering Based Approach Improving LSB Image Steganography using Status Bit along with AES Cryptography” in proceedings of 3rd International Conference On Informatics, Electronics & Vision, pp 1-6, 2014.
[5]Abdul-Gabbar Tarish Al-Tamimi, Abdulmalek Abduljabbar Aloqobaty, “Image Steganography Using Least Significant Bits (LSBs): A Noval Algorithm” in International Journal of Computer Science and Information Security, Vol. 13, No. 1, pp 1-5, 2015.
[6]K.P.Uday Kanth, D.Vidyasagar, “An Effective Implementation of LSB Steganography Using DWT Techniques” in proceedings of 10th IRF International Conference, Chennai, pp 1-3, 2014.
[7]Pye Pye Aung, Tun Min Naing, “A Noval Secure Combination Technique of Steganography and Cryptography” in International Journal of Information Technology, Modelling and Computing, Vol. 2, No. 1, pp 55-62, 2014.
[8]Surbhi Singhania, Shailender Gupta, Bharat Bhushan and Ajay Nain, “A Novel Crypt-Stego Technique for Information Security in Communication Networks” in International Journal of Signal Processing, Image Processing and Pattern Recognition, Vol. 6,No. 2, pp 87-102, 2013.
[9]Pratishtha Gupta, G.N Purohit and Varsha Bansal, “A Survey on Image Compression Techniques” in International Journal of Advanced Research in Computer and Communication Engineering, Vol. 3, Issue 8, pp 7762-7768, 2014.
[10]Quist-Aphetsi Kester, “A cryptosystem based on Vigenère cipher with varying key” in International Journal of Advanced Research in Computer Engineering & Technology, Vol. 1, Issue 10, pp 108-113, 2012.
[11]Gokul.M, Umeshbabu R, Shriram K Vasudevan and Deepak Karthik, “Hybrid Steganography Using Visual Cryptography and LSB Encryption Method” in International Journal of Computer Applications, Vol. 59, No. 14, pp 5-8, 2012.
[12]Shailender Gupta, Ankur Goyal and Bharat Bhushan, “Information Hiding using Least Significant Bit Steganography and Cryptography” in I.J. Modern Education and Computer Science, Vol. 6, pp 27-34, 2012.
[13]S. M. Masud Karim, Md. Saifur Rahman, Md. Ismail Hossain, “A New Approach for LSB Based Image Steganography using Secret Key” in Proceedings of 14th International Conference on Computer and Information Technology, pp 22-24, 2011.
[14]Sujay Narayan, Gaurav Prasad., “Two New Approaches for Secured Image Steganography Using Cryptographic Techniques and Type Conversions” in Signal & Image Processing: An International Journal, Vol. 1, No. 2, pp 60-73, 2010.
[15]Piyush Marwaha, Paresh Marwaha, “Visual Cryptographic Steganography in Images” in proceedings of Second International conference on Computing, Communication and Networking Technologies, pp 1-6, 2010.
[16]Zaidoon Kh.Al-Ani, A.A.Zaidan, B.B.Zaidan and Hamdan.O.Alanazi, “Overview: Main Fundamentals for Steganography” in Journal of Computing, Vol. 2, Issue 3, pp 158-165, 2010.
[17]XIE Qing, XIE Jianquan and XIAO Yunhua, “A High Capacity Information Algorithm In Color Image” in IEEE, 2010.
[18]A.Joseph Raphael, V.Sundaram, “Cryptography and Steganography - A Survey” in International Journal of Computer Technology Application, Vol. 2, Issue 3, pp 626-630, 2011.
[19]“Cryptography and Network Security: principles and practices”, William Stallings, Pearson education, first Indian reprint 2003.
[20]Zhou Wang, Alan C. Bovik, “A Universal Image Quality Index” IEEE Signal Processing Letters, Vol. 9, No. 3, pp. 81-84, 2002.
[21]Md. Jakir Hossain, “Information-Hiding Using Image Steganography With Pseudorandom Permutation” in Bangladesh Research Publications Journal, Vol. 9, Issue 3, pp 215-225, 2014.
[22]S Usha, G A Satish Kumar and K Boopathybagan, “A Secure Triple Level Encryption Method Using Cryptography and Steganography” in proceedings of International Conference on Computer Science and Network Technology, pp 1017-1020, 2011.
[23]Ramakrishna Mathe, Veera RaghavRao Atukuri and Srinivasa Kumar Devireddy, “Securing Information: Cryptography and Steganography” in International Journal of Computer Science and Information Technologies, Vol. 3, Issue 3, pp 4251-4255, 2012.
[24]Lokesh Kumar, “Novel Security Scheme for Image Steganography using Cryptography Technique” in International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 2, Issue 4, pp143-146, 2012.
[25]Zhi Zhou, Ghonzalo R. Arce, Giovanni Di Crescenzo, “Halftone Visual Cryptography” in IEEE Transactions on Image Processing, Vol.15, No. 8, pp 2441-2453, 2006.
[26]Hossein Sheisi, Jafar Mesgarian and Mostafa Rashmani, “Steganography: DCT Coefficient Replacement Method and Compare With JSteg Algorithm” in International Journal of Computer and Electrical Engineering, Vol. 4, No. 4, pp 458-462, 2012.
[27]V.Asha, P.Nagabhushan, N.U.Bhajantri, “Similarity measures for Automatic defect detection on patterned textures”, International journal of Image processing and vision sciences, Vol. 1, Issue 1, pp 18-24, 2012.
[28]Mohammad, A. A., and Abdel Fatah, “Public-Key Steganography Based on Matching Method” in European Journal of Scientific Research, pp 223-231, 2012.