Research Article |
Design of an Efficient & Secure Steganographic Model using Modified LSB & Encryption Process
Author(s): Ekta* and Ajit Singh
Published In : International Journal of Electrical and Electronics Research (IJEER) Volume 12, Issue 1
Publisher : FOREX Publication
Published : 05 February 2024
e-ISSN : 2347-470X
Page(s) : 60-65
Abstract
This paper introduces a novel steganographic model for robust multimodal data security, seamlessly integrating a modified Least Significant Bit (LSB) technique with encryption, making it applicable to diverse data types such as images, audio, video, and text. Overcoming challenges posed by existing complex models and communication delays, our approach employs a modified LSB technique to encode similar sized data samples, followed by dynamic bioinspired elliptic curve cryptography (BECC) utilizing a Mayfly Optimization (MO) Model. This adaptive strategy optimizes curve types and prime key sets, significantly enhancing data security while minimizing delays and complexities across diverse data sizes. The proposed model achieves an 8.3% reduction in encryption and steganographic process delays, while simultaneously maintaining superior Peak Signal to Noise Ratio (PSNR) and lower Mean Squared Error (MSE) levels compared to existing methods when applied to the same data samples. This highlights its effectiveness in securing dynamic datasets without compromising efficiency.
Keywords: Multimodal
, Security
, Data
, Samples
, PSNR (Peak Signal to Noise Ratio)
, MSE (Mean Squared Error)
, BECC (bioinspired elliptic curve cryptography)
, LSB (Least Significant Bit)
, MO (Mayfly Optimization)
.
Ekta*, Department of Computer Science and Engineering, Bhagat Phool Singh Mahila Vidyalaya, India; Email: ektayadav956@gmail.com
Ajit Singh, Department of Computer Science and Engineering, Bhagat Phool Singh Mahila Vidyalaya, India; Email: bpsmv.ajit@gmail.com
-
[1] R. Meng, Q. Cui, Z. Zhou, Z. Li, Q. M. J. Wu and X. Sun, "High-Capacity Steganography Using Object Addition-Based Cover Enhancement for Secure Communication in Networks," in IEEE Transactions on Network Science and Engineering, vol. 9, no. 2, pp. 848-862, 1 March-April 2022, doi: 10.1109/TNSE.2021.3137829. [CrossRef]
-
[2] M. Sharifzadeh, M. Aloraini and D. Schonfeld, "Adaptive Batch Size Image Merging Steganography and Quantized Gaussian Image Steganography," in IEEE Transactions on Information Forensics and Security, vol. 15, pp. 867-879, 2020, doi: 10.1109/TIFS.2019.2929441. [CrossRef]
-
[3] R. Cogranne, Q. Giboulot and P. Bas, "Efficient Steganography in JPEG Images by Minimizing Performance of Optimal Detector," in IEEE Transactions on Information Forensics and Security, vol. 17, pp. 1328-1343, 2022, doi: 10.1109/TIFS.2021.3111713. [CrossRef]
-
[4] W. Pan, Y. Yin, X. Wang, Y. Jing and M. Song, "Seek-and-Hide: Adversarial Steganography via Deep Reinforcement Learning," in IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 44, no. 11, pp. 7871-7884, 1 Nov. 2022, doi: 10.1109/TPAMI.2021.3114555. [CrossRef]
-
[5] J. Zhang, X. Zhao, X. He and H. Zhang, "Improving the Robustness of JPEG Steganography with Robustness Cost," in IEEE Signal Processing Letters, vol. 29, pp. 164-168, 2022, doi: 10.1109/LSP.2021.3129419. [CrossRef]
-
[6] A. A. Lopez-Hernandez, R. F. Martinez-Gonzalez, J. A. Hernandez-Reyes, L. Palacios-Luengas and R. Vazquez-Medina, "A Steganography Method Using Neural Networks," in IEEE Latin America Transactions, vol. 18, no. 03, pp. 495-506, March 2020, doi: 10.1109/TLA.2020.9082720. [CrossRef]
-
[7] S. Banerjee and G. K. Singh, "A Robust Bio-Signal Steganography with Lost-Data Recovery Architecture Using Deep Learning," in IEEE Transactions on Instrumentation and Measurement, vol. 71, pp. 1-10, 2022, Art no. 4007410, doi: 10.1109/TIM.2022.3197781. [CrossRef]
-
[8] M. Aloraini, M. Sharifzadeh and D. Schonfeld, "Quantized Gaussian JPEG Steganography and Pool Steganalysis," in IEEE Access, vol. 10, pp. 38031-38044, 2022, doi: 10.1109/ACCESS.2022.3165031. [CrossRef]
-
[9] M. M. Mahmoud and H. T. Elshoush, "Enhancing LSB Using Binary Message Size Encoding for High Capacity, Transparent and Secure Audio Steganography–An Innovative Approach," in IEEE Access, vol. 10, pp. 29954-29971, 2022, doi: 10.1109/ACCESS.2022.3155146. [CrossRef]
-
[10] R. Gurunath, M. F. J. Klaib, D. Samanta and M. Z. Khan, "Social Media and Steganography: Use, Risks and Current Status," in IEEE Access, vol. 9, pp. 153656-153665, 2021, doi: 10.1109/ACCESS.2021.3125128. [CrossRef]
-
[11] J. Tan, X. Liao, J. Liu, Y. Cao and H. Jiang, "Channel Attention Image Steganography with Generative Adversarial Networks," in IEEE Transactions on Network Science and Engineering, vol. 9, no. 2, pp. 888-903, 1 March-April 2022, doi: 10.1109/TNSE.2021.3139671. [CrossRef]
-
[12] Y. -Q. Zhang, K. Zhong and X. -Y. Wang, "High-Capacity Image Steganography Based on Discrete Hadamard Transform," in IEEE Access, vol. 10, pp. 65141-65155, 2022, doi: 10.1109/ACCESS.2022.3181179. [CrossRef]
-
[13] Z. Zhang, G. Fu, R. Ni, J. Liu and X. Yang, "A generative method for steganography by cover synthesis with auxiliary semantics," in Tsinghua Science and Technology, vol. 25, no. 4, pp. 516-527, Aug. 2020, doi: 10.26599/TST.2019.9010027. [CrossRef]
-
[14] Z. Zhang, G. Fu, R. Ni, J. Liu and X. Yang, "A generative method for steganography by cover synthesis with auxiliary semantics," in Tsinghua Science and Technology, vol. 25, no. 4, pp. 516-527, Aug. 2020, doi: 10.26599/TST.2019.9010027. [CrossRef]
-
[15] H. Tian, J. Wu, H. Quan and C. -C. Chang, "Detecting Multiple Steganography Methods in Speech Streams Using Multi-Encoder Network," in IEEE Signal Processing Letters, vol. 29, pp. 2462-2466, 2022, doi: 10.1109/LSP.2022.3226126. [CrossRef]