NED University Journal of Research
ISSN 2304-716X
E-ISSN 2706-5758




SECURE IMAGE STEGANOGRAPHY USING CRYPTOGRAPHY AND IMAGE TRANSPOSITION

Author(s): Khan Muhammad1, Jamil Ahmad2, Muhammad Sajjad3, Muhammad Zubair4
1 PhD student, Digital Contents Research Institute, Sejong University, Seoul, Korea, Ph. +82-010-48312104, Fax: +82-02-3408-4339, Email: khanmuhammad@sju.ac.kr.
2 PhD student, Digital Contents Research Institute, Sejong University, Seoul, Korea, Ph. +82-010-47862016, Fax: +82-02-3408-4339, Email: jamilahmad@sju.ac.kr.
2 Research Associate, Islamia College Peshawar, Pakistan, Ph. +92-333-9319519, Fax: +82-02-3408-4339, Email: Muhammad.sajjad@icp.edu.pk.
3 Lecturer, Department of Computer Science, Islamia College Peshawar, Pakistan, Ph. +92-333-9131479, Fax: +82-02-3408-4339, Email: zubair@icp.edu.pk.

Volume: XII

No. 4

Pages: 81 - 91

Date: September 2015

Abstract:
Information security is one of the most challenging problems in today's technological world. In order to secure the transmission of secret data over the public network (Internet), various schemes have been presented over the last decade. Steganography combined with cryptography, can be one of the best choices for solving this problem. This paper proposes a new steganographic method based on gray-level modification for true colour images using image transposition, secret key and cryptography. Both the secret key and secret information are initially encrypted using multiple encryption algorithms (bitxor operation, bits shuffling, and stego key-based encryption); these are, subsequently, hidden in the host image pixels. In addition, the input image is transposed before data hiding. Image transposition, bits shuffling, bitxoring, stego key-based encryption, and gray-level modification introduce five different security levels to the proposed scheme, making the data recovery extremely difficult for attackers. The proposed technique is evaluated by objective analysis using various image quality assessment metrics, producing promising results in terms of imperceptibility and security. Moreover, the high quality stego images and its minimal histogram changeability, also validate the effectiveness of the proposed approach.

Full Paper | Close Window      X |