An Enhanced Method for Encrypting Image and Text Data Simultaneously using AES Algorithm and LSB-Based Steganography

Md. Simul Hasan Talukder, M. Hasan, Rafi Ibn Sultan, Mahabubur Rahman, A. K. Sarkar, Sharmin Akter
{"title":"An Enhanced Method for Encrypting Image and Text Data Simultaneously using AES Algorithm and LSB-Based Steganography","authors":"Md. Simul Hasan Talukder, M. Hasan, Rafi Ibn Sultan, Mahabubur Rahman, A. K. Sarkar, Sharmin Akter","doi":"10.1109/icaeee54957.2022.9836589","DOIUrl":null,"url":null,"abstract":"Secure data transmission in the virtual world is becoming increasingly difficult due to the activities of hackers on confidential and sensitive information. To avoid hacking at various levels, there exists a significant number of techniques for data transmission. Data security issues have led to developing a stronger algorithm in cryptography and steganography which have also led us to develop a secure data transmission model by concealing both image and text data simultaneously through the Advanced Encryption Standard (AES) algorithm and LSB-based image steganography. To develop a robust and effective model we have followed four steps in both sender and receiver end for enhancing the data security. On the sender side, first, the targeted image is encrypted using AES then the targeted text data is concealed within the AES encrypted image based on the LSB algorithm. The data security is increased further by masking this blended text image with a cover image using LSB-based image steganography. Finally, the Stego image is split and indexed for secure data transmission from the sender end. Since decryption is the reverse mathematical process of encryption, at the receiving end, inverse steps are performed sequentially to retrieve the image and text of interest. Histogram analysis at a different stage has shown a better realization of the effect of encryption and decryption whereas various comparison indexes such as SSIM, PSNR, MS-SSIM, MSE between the original and retrieved image provide acceptable data integrity after decryption of the input data.","PeriodicalId":383872,"journal":{"name":"2022 International Conference on Advancement in Electrical and Electronic Engineering (ICAEEE)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Conference on Advancement in Electrical and Electronic Engineering (ICAEEE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/icaeee54957.2022.9836589","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Secure data transmission in the virtual world is becoming increasingly difficult due to the activities of hackers on confidential and sensitive information. To avoid hacking at various levels, there exists a significant number of techniques for data transmission. Data security issues have led to developing a stronger algorithm in cryptography and steganography which have also led us to develop a secure data transmission model by concealing both image and text data simultaneously through the Advanced Encryption Standard (AES) algorithm and LSB-based image steganography. To develop a robust and effective model we have followed four steps in both sender and receiver end for enhancing the data security. On the sender side, first, the targeted image is encrypted using AES then the targeted text data is concealed within the AES encrypted image based on the LSB algorithm. The data security is increased further by masking this blended text image with a cover image using LSB-based image steganography. Finally, the Stego image is split and indexed for secure data transmission from the sender end. Since decryption is the reverse mathematical process of encryption, at the receiving end, inverse steps are performed sequentially to retrieve the image and text of interest. Histogram analysis at a different stage has shown a better realization of the effect of encryption and decryption whereas various comparison indexes such as SSIM, PSNR, MS-SSIM, MSE between the original and retrieved image provide acceptable data integrity after decryption of the input data.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
由于黑客对机密和敏感信息的攻击,虚拟世界中的安全数据传输变得越来越困难。为了避免不同级别的黑客攻击,存在大量的数据传输技术。数据安全问题促使我们在密码学和隐写术中开发出更强大的算法,这也促使我们通过高级加密标准(AES)算法和基于lsb的图像隐写术来同时隐藏图像和文本数据,从而开发出安全的数据传输模型。为了建立一个稳健有效的模型,我们在发送端和接收端都采取了四个步骤来加强数据的安全性。在发送端,首先使用AES对目标图像进行加密,然后将目标文本数据隐藏在基于LSB算法的AES加密图像中。通过使用基于lsb的图像隐写技术将混合文本图像与封面图像掩盖,进一步提高了数据安全性。最后,对Stego图像进行分割和索引,以便从发送端安全传输数据。由于解密是加密的反向数学过程,因此在接收端,依次执行反向步骤以检索感兴趣的图像和文本。不同阶段的直方图分析较好地实现了加解密的效果,而对输入数据进行解密后,原始图像与检索图像之间的SSIM、PSNR、MS-SSIM、MSE等各种比较指标提供了可接受的数据完整性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Design of a Multi-band Sierpinski Carpet Fractal Antenna With Modified Ground Plane Effect of Number of Modes of EMD in Respiratory Rate Estimation from PPG Signal An User Interest and Payment-aware Automated Car Parking System for the Bangladeshi People Using Android Application An Improved Load Frequency Control Strategy for Single & Multi-Area Power System Wall Shear Stress Assessment of Aorta with Varying Low-density Lipoprotein Concentration
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1