FOREX Press I. J. of Electrical & Electronics Research
Support Open Access

Research Article |

Design of an Efficient & Secure Steganographic Model using Modified LSB & Encryption Process

Author(s): Ekta* and Ajit Singh

Publisher : FOREX Publication

Published : 05 February 2024

e-ISSN : 2347-470X

Page(s) : 60-65




Ekta*, Department of Computer Science and Engineering, Bhagat Phool Singh Mahila Vidyalaya, India; Email: ektayadav956@gmail.com

Ajit Singh, Department of Computer Science and Engineering, Bhagat Phool Singh Mahila Vidyalaya, India; Email: bpsmv.ajit@gmail.com

    [1] R. Meng, Q. Cui, Z. Zhou, Z. Li, Q. M. J. Wu and X. Sun, "High-Capacity Steganography Using Object Addition-Based Cover Enhancement for Secure Communication in Networks," in IEEE Transactions on Network Science and Engineering, vol. 9, no. 2, pp. 848-862, 1 March-April 2022, doi: 10.1109/TNSE.2021.3137829. [CrossRef]
    [2] M. Sharifzadeh, M. Aloraini and D. Schonfeld, "Adaptive Batch Size Image Merging Steganography and Quantized Gaussian Image Steganography," in IEEE Transactions on Information Forensics and Security, vol. 15, pp. 867-879, 2020, doi: 10.1109/TIFS.2019.2929441. [CrossRef]
    [3] R. Cogranne, Q. Giboulot and P. Bas, "Efficient Steganography in JPEG Images by Minimizing Performance of Optimal Detector," in IEEE Transactions on Information Forensics and Security, vol. 17, pp. 1328-1343, 2022, doi: 10.1109/TIFS.2021.3111713. [CrossRef]
    [4] W. Pan, Y. Yin, X. Wang, Y. Jing and M. Song, "Seek-and-Hide: Adversarial Steganography via Deep Reinforcement Learning," in IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 44, no. 11, pp. 7871-7884, 1 Nov. 2022, doi: 10.1109/TPAMI.2021.3114555. [CrossRef]
    [5] J. Zhang, X. Zhao, X. He and H. Zhang, "Improving the Robustness of JPEG Steganography with Robustness Cost," in IEEE Signal Processing Letters, vol. 29, pp. 164-168, 2022, doi: 10.1109/LSP.2021.3129419. [CrossRef]
    [6] A. A. Lopez-Hernandez, R. F. Martinez-Gonzalez, J. A. Hernandez-Reyes, L. Palacios-Luengas and R. Vazquez-Medina, "A Steganography Method Using Neural Networks," in IEEE Latin America Transactions, vol. 18, no. 03, pp. 495-506, March 2020, doi: 10.1109/TLA.2020.9082720. [CrossRef]
    [7] S. Banerjee and G. K. Singh, "A Robust Bio-Signal Steganography with Lost-Data Recovery Architecture Using Deep Learning," in IEEE Transactions on Instrumentation and Measurement, vol. 71, pp. 1-10, 2022, Art no. 4007410, doi: 10.1109/TIM.2022.3197781. [CrossRef]
    [8] M. Aloraini, M. Sharifzadeh and D. Schonfeld, "Quantized Gaussian JPEG Steganography and Pool Steganalysis," in IEEE Access, vol. 10, pp. 38031-38044, 2022, doi: 10.1109/ACCESS.2022.3165031. [CrossRef]
    [9] M. M. Mahmoud and H. T. Elshoush, "Enhancing LSB Using Binary Message Size Encoding for High Capacity, Transparent and Secure Audio Steganography–An Innovative Approach," in IEEE Access, vol. 10, pp. 29954-29971, 2022, doi: 10.1109/ACCESS.2022.3155146. [CrossRef]
    [10] R. Gurunath, M. F. J. Klaib, D. Samanta and M. Z. Khan, "Social Media and Steganography: Use, Risks and Current Status," in IEEE Access, vol. 9, pp. 153656-153665, 2021, doi: 10.1109/ACCESS.2021.3125128. [CrossRef]
    [11] J. Tan, X. Liao, J. Liu, Y. Cao and H. Jiang, "Channel Attention Image Steganography with Generative Adversarial Networks," in IEEE Transactions on Network Science and Engineering, vol. 9, no. 2, pp. 888-903, 1 March-April 2022, doi: 10.1109/TNSE.2021.3139671. [CrossRef]
    [12] Y. -Q. Zhang, K. Zhong and X. -Y. Wang, "High-Capacity Image Steganography Based on Discrete Hadamard Transform," in IEEE Access, vol. 10, pp. 65141-65155, 2022, doi: 10.1109/ACCESS.2022.3181179. [CrossRef]
    [13] Z. Zhang, G. Fu, R. Ni, J. Liu and X. Yang, "A generative method for steganography by cover synthesis with auxiliary semantics," in Tsinghua Science and Technology, vol. 25, no. 4, pp. 516-527, Aug. 2020, doi: 10.26599/TST.2019.9010027. [CrossRef]
    [14] Z. Zhang, G. Fu, R. Ni, J. Liu and X. Yang, "A generative method for steganography by cover synthesis with auxiliary semantics," in Tsinghua Science and Technology, vol. 25, no. 4, pp. 516-527, Aug. 2020, doi: 10.26599/TST.2019.9010027. [CrossRef]
    [15] H. Tian, J. Wu, H. Quan and C. -C. Chang, "Detecting Multiple Steganography Methods in Speech Streams Using Multi-Encoder Network," in IEEE Signal Processing Letters, vol. 29, pp. 2462-2466, 2022, doi: 10.1109/LSP.2022.3226126. [CrossRef]

Ekta and Ajit Singh (2024), Design of an Efficient & Secure Steganographic Model using Modified LSB & Encryption Process. IJEER 12(1), 60-65. DOI: 10.37391/IJEER.120110.