0% found this document useful (0 votes)
10 views9 pages

Ecosystem Services

The document discusses steganography and cryptography techniques for hiding information. It describes steganography methods like LSB, text, image, audio and network steganography. It also discusses the AES encryption algorithm for cryptography.

Uploaded by

Praneeta Ahire
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views9 pages

Ecosystem Services

The document discusses steganography and cryptography techniques for hiding information. It describes steganography methods like LSB, text, image, audio and network steganography. It also discusses the AES encryption algorithm for cryptography.

Uploaded by

Praneeta Ahire
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/371379024

Review on Steganography and Cryptography

Article in Ecosystem Services · June 2023


DOI: 10.5281/zenodo.7943637

CITATIONS READS

0 229

2 authors:

Nilofar Mulla Deepali A. Godse


Bharati Vidyapeeth Deemed University Bharati Vidyapeeth Deemed University
15 PUBLICATIONS 63 CITATIONS 15 PUBLICATIONS 103 CITATIONS

SEE PROFILE SEE PROFILE

All content following this page was uploaded by Deepali A. Godse on 09 June 2023.

The user has requested enhancement of the downloaded file.


Nilofar Mulla et al. Ecosystem Services | ISSN: 2212-0416 | 25 : 1 (2023)
ECOSER-D-23-00487

Full Length Article


Review on Steganography and Cryptography
Nilofar Mulla*a, Dr. Deepali Godseb, Aysha Sayyedc, Ishwari Shelked,
Sonakshi Shendee, Priti Shindef, Bhagyashri Pawarg
a-gDepartment of Information Technology, Bharati Vidyapeeth’s College of Engineering for Women, Pune, India
[email protected]

[email protected]

[email protected]

[email protected]

[email protected]

[email protected]

ARTICLE INFO ABSTRACT

Keywords: Information security is a very useful term when it comes to the transmission of

Information Hiding secret data or information between two objects or devices. Generally,
cryptography is used for hiding information and sending messages in textual form.
Audio Steganography
There are many techniques and algorithms that have come into the picture when
Image Steganography
it comes to hiding information. One of the most famous and widely used
Video Steganography techniques is steganography. Steganography is basically a method used for hiding
DNA Steganography secret information or data which are in the form of texts, digital images, audio or

Network Steganography voice representatives, and video files. LSB Steganography is one of the most
simplest and efficient methods of Steganography. LSB ensures that there is no
significant change in the input image and the stego-image, which makes it almost
impossible for hackers to determine the difference between the original data and
output data with a secret message. One of the frequently used encryption or
cryptographic technique is Advanced Encryption Standard (AES). AES
encryption is a method that converts plain text into cipher text. AES algorithm is
much more efficient than the DES algorithm, which is why we will be making use

* Corresponding Author.
Email address: [email protected]
https://doi.org/10.5281/zenodo.7943637
Received in revised form 22 April 2023; Accepted 03 May 2023
Available online 17 May 2023
2212-0416/© 2023 The Author(s). Published by Elsevier B.V. This is an open access article under the CC BY-NC-ND
license (http://creativecommons.org/licenses/by- nc-nd/4.0/).

281
Ecosystem Services | ISSN: 2212-0416 | 25 : 1 (2023) Nilofar Mulla et al.
ECOSER-D-23-00487

of AES encryption. This method does not allow third party to access original
information or to convert it in its original format.

INTRODUCTION STEGANOGRAPHY

Data hiding in Information Security means the hiding Steganography is a method of hiding information
of any kind of information into a cover media so that inside a cover image, text, audio, or video. [5]
no unintended observer or person will be aware that Steganography is divided into six types: Text
there is any hidden message. One of the most famous steganography, Image steganography, Video
and widely used methods of hiding data is steganography, Audio steganography, DNA
Steganography. Steganography has Greece originated steganography and Network steganography.
words, ‘Stego’- covering and ‘Graphia’- writing, and
A. Text Steganography [5][11]: Text
combination of both means ‘overed writing’ which
steganography terms the use of text
resembles to hiding information. The simplest way to
documents or files as the cover for secret
implement this process is by inserting the confidential
data; this process may involve things like
data bits in the LSB positions of the original image.
changing the format of existing text,
Steganography is a method that hides plain text in
generating random character sequences or
digital media. In this process, the hacker or unintended
using context-free grammars to generate
observer will not be able to detect cipher text convert
readable texts, changing words within a text
from original text because it has been concealed in
[5]. Numerous techniques used to hide the
another media. The trespasser or observer cannot
information in the text are: Format Based
suspect if there is any confidential data that is existing.
Method, Random & Statistical Generation,
For better security of the data over the network, the
and Linguistic Method.
steganography technique comes into the picture.
B. Image Steganography [5][11]: In this type
Cryptography is also a type of encryption , the process
of steganography, secret data is hidden in the
by which symmetric key is used to convert plain text
image as a cover object. Images are used in
into cipher text. The main function performed by
this process as a cover source due to the
cryptography is that the plaintext can be known and
number of pixel bits in the images’ digital
will be converted into the cipher text, which is visible
representation[5]. Common methods
but we cannot be read or understood by the human.
include: Insertion using Least Significant Bit
During transmitting secret information between two
, Masking and Filtering, also Encrypt and
networks Information Security is an important factor.
Scatter.
C. Audio Steganography [12][16][11]: Hiding
the secret text or message inside the audio is
audio steganography. The technique is used
to secure transmission of secret information
and cover the existence of secret message. It
also provides confidential channel for secret
message that is been encrypted. Hiding of
secret data in digital sound is more complex
process. Different techniques used for audio
Fig, 1: Classification of security systems

282
Nilofar Mulla et al. Ecosystem Services | ISSN: 2212-0416 | 25 : 1 (2023)
ECOSER-D-23-00487

steganography include: Encoding using security of secret data transmission. This is


Least Significant Bit, Spread Spectrum, etc. done using random coding technology
D. Video Steganography [12][16][11]: In because it can simulate usual traffic better
Video Steganography deals with hiding data and overcome the problems of the present
which embed secret message in cover solutions.
contents. This procedure is favourable due F. DNA Steganography [5]: This approach
to the probable outcomes of hiding a huge uses DNA sequences as carriers to enable
useful data or secret information in a video safe transmission of the critical data. DNA-
file. A video file is a flowing track of sounds based technique for transmitting data hidden
and images [12]. So, video steganography can within a video file [5]. The first step is the
be seen as a hybridization of image and audio conversion of the video footage into image
steganography. The advantage is that the frames. Then, using the LSB substitution
large amount of information can be hidden approach, random frames are selected for
inside and the fact that the flowing stream of data embedment at random positions. “The
images and sounds. You can think of this stenographic video file demonstrated low
as the combination of Image steganography degradation but achieved poor data hiding
and Audio steganography. Two main capacity and payload that was not equal to
domains of Video Steganography are: Data steganography, and random DNA
embedding in raw uncompressed video and encryption to create a system with three
later compressing it, and second is data levels of guaranteed security. The strategy
embedding directly into the compressed data was discovered to increase the quality of the
stream. stenographic system and decoding the codes,
E. Network Steganography [5]: Network which was considerably more onerous when
Steganography is a technique that uses compared to other approaches.”
common network protocols (the header
field, the payload field or both) to hide a
TYPES OF LSB
secret message [5]. It is the technique of
embedding information within network A. Image Steganography using LSB and
control protocols used in data transmission triple XOR on MSB [14]: In this technique,
such TCP, UDP, etc. You can use the XOR operation has to be done thrice to
steganography in some covert channels that encrypt the message before it is embedded
you can be found in OSI network model. For into LSB. In the process of encryption and
Example, TCP/IP packet are used to hide decryption of the message bits, in XOR
information in their header. In this method, operation three different MSB bits are used
some data packets are first sent by the as keys.
sender. The secret data is sent with the data The steps for hiding data are:
packet length because of the randomness of Step 1 : Scan cover image and substitute the
the packet length distribution. Multiple IP pixel value into binary form.
addresses are then sent through the router. Step 2 : Perform the XOR operations on the
Some fake packets are also introduced to 7th and 6th bits of the binary number. XOR
confuse the monitor and enhance the (7, 6).

283
Ecosystem Services | ISSN: 2212-0416 | 25 : 1 (2023) Nilofar Mulla et al.
ECOSER-D-23-00487

Step 3 : Perform the XOR operation on the


8th bit with the above. XOR (XOR (7,6))
Step 4 : Perform the XOR operation on the
LSB with the previous three bits (XOR
(XOR (7, 6)), LSB).
B. LSB Replacement [15][24]: One of the
famous technique used in image
steganography’s spatial domain is LSB
replacement. It is very simpler to hide the
data and implementing this algorithm. This is
done by simply replacing the least valued bit
of a carrying image in exchange to message
bit. Below given is an good example of how
this works:
Three pixels of the image converted into
binary form are:
P1 = [11011011], P2 = [00101010], P3 =
[11101100]
The message to be inserted in binary form is:
M = [110]
Fig.2: LSB Replacement
After implementing LSB replacement we get:
P1 = [11011011], P2 = [00101011], P3 =
CRYPTOGRAPHY
[11101101]
The practice of safe transmission and communication
The LSB encoding is used to hide
in which only the intended person can understand and
confidential information inside the image; so
process the given set of information in its authentic
that no one can see that information or file.
form. The role of cryptography comes into play when
This technique requires images and messages
to produce a secure channel for secret transmission.
in any form (text and image) for
The various mathematical concepts and rules are used
implementation.
to “crypt” the given information, which means hide
C. 2-bit replacement using DES [1]: In the
the data. These set of rules based calculations also
following procedure, each pixel’s every bit of
called algorithms are used to generate cryptographic
last two bit is exchanged with the message bit
key, signing digital documents, verification for
which has been converted into cipher text
protecting privacy of data, browsing the internet and
using DES.
confidential transactions which convert the original
Bit of Image file: 11101100 10001011
text into a format which is very difficult to decode.
10100010 01011101
Message Bit: 01101100 In the below section we would explore the related
Bit of Stego Image: 11101100 10001011 topics as follows:
10100011 01011100
a) Advance Encryption Standard (AES)

b) Data Encryption Standard (DES)

284
Nilofar Mulla et al. Ecosystem Services | ISSN: 2212-0416 | 25 : 1 (2023)
ECOSER-D-23-00487

c) RSA Algorithm those values in our 4x4 matrix to


get the output.
d) DSA Algorithm
4. Shift Rows: In this step we shift
each row circularly on the left side
A) AES (Advanced Encryption Standard):
according to its row number.
Two very common techniques known as
5. Mix Columns: In this step, we take
substitution and permutation network
a predefined constant 4x4 matrix
(SPN) are piled up to encrypt and decrypt
input. We multiply each column of
data or information in AES. AES algorithm
our input with the constant matrix
has strength to accomodate with 128 bits (16
to get 4x1 output. This way we get
bytes) as plaintext fixed block size [4]. The
4x4 matrix again.
4x4 matrix is representative of 16 bytes and
These, steps are repeated in all rounds, but,
on a matrix of bytes AES is performed.
last round will not have Mix Column
Additional efficient feature of AES is that of
round.
number of rounds. The length of key
depends on the number of rounds. For After the completion of all rounds we get
encryption and decryption in AES three our cipher text as output.
different key sizes are used such as (128, 192
or 256 bits) and these key sizes are
responsible for deciding the number of
rounds, for example:- AES uses 10 rounds
for 128 bit keys, 12 rounds for 192-bit keys
similarly 14 rounds 256-bit keys.
AES algorithm can be implemented in
following steps:
1. Plain text is considers in the form
of matrix(4x4) = 128 bits = 4
words.
2. Add Round Key: a key(4x4) is
added and XOR operation is
performed with the plain text.
Each column of plain text input
performs XOR operation with
each column of the round key.
Fig. 3: AES algorithm
3. Substitute Bytes: In this step we
consider a S-box which is a 16x16
matrix. We divide each cell into B) Data Encryption Standard (DES): DES

binary form, divide it and find the standing for Data Encryption Standard is an

decimal number. The first half algorithm performing ncryption of data with

appear for the row and second half lower volume. In DES we encrypt and

of it represent the column of S- decrypt data in blocks and convert it into

box matrix and then we substitute cipher, key used here are of 64 bits.

285
Ecosystem Services | ISSN: 2212-0416 | 25 : 1 (2023) Nilofar Mulla et al.
ECOSER-D-23-00487

DES is performed by two fundamentals of g) The outcome of the


cryptographic techniques which are above RPT and old (RPT)
to LPT, this is known to
a). Substitution (confusion) and
be swapping.
b). Transposition (diffusion) h) This RPT is send to
consecutive round to
consisting 16 round using keys at position
perform 15 more rounds.
discarding bits at [8,16,24,32,40,48, 56,64]
4) All the 16 rounds are completed and then
position.
final permutation is calculated.
The algorithm is as follows:-

1) Initially in first step, plain text block


of first 64 bits is given to IP(known
as Initial Permutation).
2) This has now produces two halves
of block being permuted in above
step which are LPT(left plain text)
and RPT(right plain text).
3) Both LPT and RPT undergoes 16
rounds of process where they are
encrypted, and follow
a) Key transformation
generates a different 48-
bit sub-key from 56-bit
key.
b) Right plain text is Fig. 4: DES algorithm
expanded from 32-bit to
48 bit using expansion C) RSA (Rivest-Shamir-Adleman): One of
permutation. the asymmetric key cryptographic technique
c) Now we perform XOR is RSA which stands for Rivest Shamir
with 48-bit key and 48-bit Adleman’s algorithm which is Public Key
LPT. Cryptography (PKC), having two keys public
d) S-box substitution now key for encryption and Private key for
generate 32-bit key to 48- decryption.
bit key. The implementation of the algorithm is
e) P-Box permutation is mostly fir text files which needs data security.
now used to permute 32- Algorithm:
bits 1) Select two different prime numbers a
f) Again performing XOR and b.
operation of output of P- 2) Now n= ab
Box permutated 32 bits 3) Φ(ab) = (a-1)(b-1) [ϕ is totient
and LPT’s 32 bits. function]

286
Nilofar Mulla et al. Ecosystem Services | ISSN: 2212-0416 | 25 : 1 (2023)
ECOSER-D-23-00487

4) Get an integer e conditioned c) The encrypted result is sent to the


1<e<ϕ(ab) and both limits having no receiver for decryption. Decryption
common divisor other than 1. can be done by sender’s public key.
5) Find d which satisfies( d is secret private d) The message is decrypted and
key exponent) such that ed equivalent to passed to same hash function (H#).
1(mod ϕ).
E) Comparison is done with newly
generated hash and resulted hash in
step b along with the message. If
the compared value matches it
verifies data integrity.

Fig. 5: RSA algorithm

D) DSA (Digital Signature Algorithm):


Based on modular exponentiation and
Logarithm Cryptography DSA is formed
which uses Public-key Cryptosystem. It is
being authorized by FIPS which is Federal Fig. 6: DSA algorithm
Information processing standard for digital
signatures. From all the analysis, we can say that AES algorithm
Digital signatures are the marks to is the most secure cryptography technique as
authenticate the documents and verify them compared to others [2].
for no more tampering or digital
modification during transfers of these CONCLUSION
official documents. Here it is Reverse of RSA In this paper, we have studied the various types of
that we use private key to encrypt the digital information security systems, i.e., Cryptography and
signatures and decrypted using public key. Steganography, and how they differ from each other.
The keys are linked to each other and at We have, also studied the various types of
decoding stage the public key verifies if Steganography namely text, image, audio, video,
proper private key was used while signing the networks, and DNA Steganography. We have studied
document. various methods to implement LSB (Least Significant
Bit) image steganography. We also studied the types of
The following steps are followed for
Encryption,i.e., RSA, DSA, AES, and DES, and which
authentication of documents:-
one of them is the best and most secure cryptography
a) To create digest of the message M technique.[2][4][16] We come to the conclusion that
which is original message is send to AES is the best cryptography technique amongst them
Hash function(H#). all as it is a symmetric cryptography technique, and
b) The message is combined together uses only one key. But, we need to figure out a way to
with h(hash digest) and encrypt the pass on the key used for encryption to the receiver for
result with private key of sender. decryption.

287
Ecosystem Services | ISSN: 2212-0416 | 25 : 1 (2023) Nilofar Mulla et al.
ECOSER-D-23-00487

REFERENCES steganography using adaptive pattern to


improve imperceptibility”, 2021.
[1] Sabyasachi Pramanik, Debabrata Samanta,
[12] Touhid Bhuiyan, Afjal H. Sarower, Md
Soumi Dutta, Ramkrishna Ghosh, Mangesh
Rashed Karim and Md Maruf Hassan, “An
Ghonge, and Digvijay Pande,
Image Steganography Algorithm using LSB
“Steganography using Improved LSB
Replacement through XOR Substitution”,
Approach and Asymmetric Cryptography”,
2019.
2020.
[13] Dr. Amarendra K. , Venkata Naresh
[2] Sana Fatima, Tanazzah Rehman, Muskan
Mandhala, B. Chetan Gupta, Geetha
Fatima, Shahmeer Khan and Mir Arshan Ali,
Sudheshna, Venkata Anusha, “Image
“Comparative Analysis of Aes and Rsa
Steganography Using LSB”, 2019.
Algorithms for Data Security in Cloud
Computing”, 2022.
[14] Mustafa Sabah Taha, Mohd Shafry Mohd
[3] Snehal Kundlik Waybhase and Prashant
Rahim, “Combination of Steganography and
Adakane, “Data Security using Advanced
Cryptography: A short Survey”, 2019.
Encryption Standard(AES)”, 2022.
[15] Mohammed Abdul and Majeed Almayyah,
[4] Mustafa Muneeb Taaher, Siti Salasiah Mokri,
“A Review on Text Steganography
Rana Sami Hameed, and ABD Rahim Bin HJ
Techniques”, 2021.
Ahmad, “A Literature review of Various
[16] Ankita Patil, Shubham Mulik, Punit Pathak,
Steganography Methods”, 2022.
Karishma Raut, “Review paper on Data
[5] Swarthi, Supriya AV, Saundarya Patgar,
Security using Cryptography and
“Audio and Video steganography for secure
Steganography”, 2021.
data hiding”, 2021.
[17] Abhishek Das Japsimar Singh Wahi Mansi
[6] Mohamad Tarik Barakat, Ziad alqadi,
Anand, “Multi-Image Steganography Using
“Highly secure method for secret data
Deep Neural Networks”, 2021.
transmission”, 2022.
[18] Krishna Chaitanya Nunna, Ramakalavathi
[7] Vikas Sagar, Krishan Kumar, “Autoencoder
Marapareddy, “Secure data transfer through
Artificial Neural Network Public Key
internet using cryptography and image
Cryptography in Unsecure Public channel
steganography”, 2020.
Communication”, 2019.
[19] Sachin Dhawan, Rashmi Gupta, “Analysis of
[8] Kutub Thakur, Meikang Qiu, Keke Gai, “An
various data security techniques of
investigation on cyber security threats and
steganography: A survey”, 2021.
cyber security models”, 2022.
[20] Marc Chaumont, “Deep learning in
[9] Priya Paresh Bandekar and Suguna G C,
steganography and steganalysis”, 2020.
“LSB based text and image steganography
[21] Pratap Chandra Mandal, Imon Mukherjee,
using AES algorithm”, 2018.
Goutam Paul, BN Chatterji, “Digital image
[10] Zainab N. Sultani , Ban N. Dhannoon,
steganography: A literature survey”, 2022.
“Image and audio steganography based on
indirect LSB”, 2021.
[11] S. Rustad, De Rosal Ignatius Moses Setiadi,
A. Syukur et al., “Inverted LSB image

288

View publication stats

You might also like