SlideShare uma empresa Scribd logo
1 de 13
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, May 2013
DOI : 10.5121/ijcnc.2013.5310 125
A SECURE DATA COMMUNICATION
SYSTEM USING CRYPTOGRAPHY AND
STEGANOGRAPHY
Saleh Saraireh
Department of Communications and Electronic Engineering, Philadelphia University,
Amman,Jordan.
saleh_53@yahoo.com
ABSTRACT
 
The information security has become one of the most significant problems in data communication. So it
becomes an inseparable part of data communication. In order to address this problem, cryptography and
steganography can be combined. This paper proposes a secure communication system. It employs
cryptographic algorithm together with steganography. The jointing of these techniques provides a robust
and strong communication system that able to withstand against attackers. In this paper, the filter bank
cipher is used to encrypt the secret text message, it provide high level of security, scalability and speed.
After that, a discrete wavelet transforms (DWT) based steganography is employed to hide the encrypted
message in the cover image by modifying the wavelet coefficients. The performance of the proposed system
is evaluated using peak signal to noise ratio (PSNR) and histogram analysis. The simulation results show
that, the proposed system provides high level of security.
KEYWORDS
 
Steganography, Cryptography, DWT, Filter bank, PSNR.
 
1. INTRODUCTION
The security of data transmission is a vital problem in communication networks. A
communication system is reliable as long as it provides high level of security. Usually, users
exchange personal sensitive information or important documents. In this case; security, integrity,
authenticity and confidentiality of the exchanged data should be provided over the transmission
medium. Nowadays, internet multimedia is very popular; a significant amount of data is
exchanged every second over a non secured channel, which may not be safe. Therefore, it is
essential to protect the data from attackers. To protect the data; cryptography and steganography
techniques can be used.
Cryptography is the science of keeping the transmitted data secure. It provides data encryption for
secure communication [1]. The encryption process is applied before transmission, and the
decryption process is applied after receiving the encrypted data. Steganography is the science of
writing hidden messages inside a different digital content; it conveys the data by concealing it in
other medium such as image or audio which is called the cover object. The information hiding
process is applied before transmission and the extraction process is applied after receiving.
The main difference between cryptography and steganography based on the existence of the
secret message. Cryptography encrypts the message and transmits it; anyone can view the
encrypted message, but is very difficult to be understood, especially if it has been encrypted with
strong cryptographic algorithm. Steganography conceals the secrete message existence by hiding
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, May 2013
126
 
it in a cover object. The cover object can be classified as Text-based Steganography in which the
secret message is embedded in a text file, audio Steganography to hide the secret message in
audio signal and image steganography in which the secret data is embedded in an image.
Cryptographic algorithms are classified as symmetric key algorithm and public key algorithm.
Symmetric key algorithm uses the same key for encryption and decryption, while public key
algorithm uses different keys for encryption and decryption.
Steganography system can be implemented using two techniques. Firstly, the spatial domain
based steganography, where the least significant bits (LSB) of the cover object is replaced by the
secret message bits. Secondly, the transform domain based steganography; in this case, the secret
message is embedded with the coefficient of the cover object. The most common transform
domains are discrete Fourier transform and discrete wavelet transform.
To improve the reliability of the communication system; cryptography and steganography can be
combined to implement a robust and secure system; in this case, the encryption and hiding are
achieved in the transmitter, while the extraction and decryption are achieved in the receiver.
There are some issued that should be addressed in the designing of a steganography system [2]:
a) Invisibility: This means that the stego image should not be noticed by human.
b) Security: The steganography process should provide high level of security, therefore, the
stego image should be very close to the original cover image, and the attacker could not
detect the hidden information. Peak signal to noise ratio (PSNR) is employed to measure
the difference between the cover image and the stego image. PSNR can be calculated
using:
MES
L
PSNR
2
log10
1
L is the maximum value the samples and MES is the mean error squre.
The remainder of this article is organized as follows. The related work is introduced in section 2.
Section 3 presents the proposed system. The experimental results and discussions are presented in
section 4 and the paper is concluded in section 5.
2. RELATED WORK
In [3] a steganographic scheme was proposed, it uses human vision sensitivity to hide secret bits.
To make this, the secret data firstly are converted into a series of symbols to be embedded in a
notation system with multiple bases. In this case, the particular bases used are determined by the
degree of local variation of the pixel magnitudes in the host image. A modification to the least
significant bit matching (LSBM) steganography was introduced in [4]. This modification provides
the desired choice of a binary function of two cover pixels rather than to be random as in LSBM.
To increase the level of security, a combined data encoding and hiding process was proposed in
[5]. This process was used to overcome the problem of image color changes after the embedding
process. The LSB steganography technique was developed in [6], it based on embedding the
secret message into the sharper edge regions of the image to ensure its resistance against image
steganalysis based on statistical analysis. A novel image steganography was proposed in [7], it is
based on integer wavelet transform [IWT], it is used to embed multiple secret images and keys in
color cover image. A quantization based steganography system presented in [8] embedded the
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, May 2013
127
 
secret message in every chrominance of a color image to increase the hiding capacity. DWT
based frequency domain steganographic technique was proposed in [9], the data is hidden in
horizontal, vertical and diagonal components of the sub – image. In [10] a secret data
communication system was presented, it employs RSA with asymmetric keys and AES with
symmetric key to encrypt the data, after that the encrypted data is embedded into the cover image
using smart LSB pixel mapping and data rearrangement method. In [11] and [12] two secure
communication systems were proposed to be used for voice over IP (VOIP) applications. LSB
based steganography was employed to hide the information over an audio cover signal. An
extended version of SHA-1 (Secure Hash Algorithm) was introduced in [13]; this system can be
used to encrypt two dimensional data such as image. It is developed to increase the resistance of
image based steganography against the attackers and hackers. A chaotic signal was employed in
[14] for image steganography, which presents a scattering format for the embedded data through
the cover image. A high capacity and security steganography using discrete wavelet transform
(HCSSD) was developed in [15]; the wavelet coefficients for the cover image and the payload
image were fused to obtain a single image.
3. PROPOSED SYSTEM
The main objective of this paper is to introduce a secure communication system that employs
both cryptography and steganography to encrypt and embed the secret message to be transmitted
over a non secure channel. In this system, the encryption process is achieved using the filter bank
cipher, which presents a high speed and level of security. The embedding process is achieved
using the discrete wavelet transform based steganography. The proposed system consists from
four stages as shown in Figure 1. Note that the main stages are encryption, embedding, extraction
and decryption. The following algorithm describes these stages.
Algorithm
Input: Embed the message.
Output: Message is embedded safely in an image and reconstructed properly.
Begin
1. Message.
2. Encrypting message.
3. Implementing DWT based steganography
4. Embedding data.
5. Stego image.
6. Extraction of embedded message.
7. Encrypted message generation.
8. Decryption.
9. Original Message.
End
3.1 Encryption and Decryption Process
The cryptographic algorithm used in this paper is filter bank cipher over Galois field (GF (28
))
[16]. In this cipher the encryption process consists from two layers. Firstly, the diffusion layer is
represented by the analysis filter bank to introduce a high diffusion rate. Secondly, the
substitution layer which is represented by the lifting scheme over GF (28
) to add the required
nonlinearity to increase the resistivity of the cipher against the differential and linear
cryptanalysis attacks. The lifting scheme is shown in Figure 2, where S is the inverse function
over GF (28
). The filter bank cipher consists from two rounds to improve its security. Figure 3
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, May 2013
128
 
shows one round filter bank cipher. In this stage, the message is encrypted using filter bank
cipher, where its filters coefficients are generated from the key [16].
The decryption process is achieved at the receiver. In this case, the synthesis filter bank and
perfect reconstruction lifting scheme are used to reconstruct the original message. The perfect
reconstruction lifting scheme is shown in Figure 4. And one Round filter bank cipher decryption
System is shown in Figure 5 which satisfies the perfect reconstruction property to recover the
original message properly.
Figure 1. Block Diagram of the proposed system.
Figure 2. Lifting scheme.
Figure 3. One Round Filter Bank Encryption cipher.
Figure 4. Perfect reconstruction lifting scheme.
+
S  S
+
+
S S
+
+
S 
+
S S
+
+
S
Encryption
Process
Secret
Message
Key
Encrypted
Message
Embedding
Process
Cover
Image
Stego
Image
Decryption
Process
Secret
Message
Encrypted
Message
Extraction
Process
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, May 2013
129
 
 
Figure 5. One Round filter bank cipher decryption System.
3.2 Embedding and Extraction Process
DWT based steganography is used to hide the message using Haar wavelet. Wavelet transform
converts a spatial domain into frequency domain. In this case the cover image is decomposed into
four sub-images, namely, approximation coefficients, horizontal detail coefficients, vertical detail
coefficients and diagonal detail coefficients. The embedding process is achieved at the
transmitter to hide the message. In this paper the embedding process based on the following
algorithm.
Algorithm
Input: Cover image and encrypted message.
Output: Stego image.
Begin
1. Normalized the encrypted message.
2. Transform the cover image using Haar wavelet transform
3. Embedding the normalized encrypted image in vertical detail coefficients and diagonal
detail coefficients.
4. Inverse DWT of all the subbands.
5. Denomoralize.
6. Stego image is generated.
End
The extraction process is used to retrieve the original message at the receiver. It processes the
stego image to extract the original message. In this paper the extraction process based on the
following algorithm.
Algorithm
Input: Stego Image.
Output: Encrypted message.
Begin
1. Transform the stego image using Haar wavelet transform.
2. Extracting the normalized encrypted image from the vertical detail coefficients and
diagonal detail coefficients.
3. Normalization.
4. The encrypted message is generated.
End
2
g0(n,k) 
g1(n,k) 2
2
g3(n,k) 
g4(n,k)  2 
 2 
 2
 2   
Perfect
reconstruction
lifting
2
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, May 2013
130
 
Note that, the encryption and embedding processes are achieved in the transmitter to
generate the stego image, while the extraction and decryption processes are achieved in the
receiver to recover the original message.
4. EXPERIMENTAL RESULTS AND DISCUSSIONS
To evaluate the performance of the proposed system in this paper, five cover images
(Cameraman, Lenna, Peppers, House, Baboon and each of size 256×256) were employed to
embed a text encrypted message. In this paper, the message is firstly encrypted, after that it is
hidden to be sent. At the receiver, the hidden message is extracted and then decrypted. This
represents a hybrid system that combines cryptographic and steganographic algorithms together
to improve the security of the information. This combination is tested using PSNR and histogram
analysis.
PSNR is used to compare between the cover image and the stego image. It is measured in decibels
(dB). It is used to assess the quality of the stego image. If PSNR of gray scale image larger than
36 dB then the human cannot distinguish between the cover image and the stego image [17]. The
PSNR of the proposed system using different images were calculated using equation (1), and the
results are summarized in Table 1. The results indicate that, the PSNR values are much greater
than 36 dB; this proves the suitability of the proposed system.
Table 1. PSNR Results
Cover Image PSNR
Cameraman 68.8120
Lenna 62.1071
Peppers 53.1336
House 68.6596
Baboon 59.9863
The histogram analysis can be used to evaluate the efficiency of the embedded algorithm. If the
histogram remains the same after the embedding, then the embedded algorithm is efficient. The
histograms of the cover images before and after the embedding process were plotted as shown in
the Figures 6, 7, 8, 9 and 10. Note that the histograms of the cover images and the stego images
do not have any significant change. The stability of the stego images histograms means that the
proposed system can resist the attacks and statistical changes.
The processing time for embedding and extraction processes using different cover images are
summarized in Table 3 and Table 4 respectively. Basically, the processing time depends on the
specifications of the computer that used to run the program, and the speed of the compiler of the
used programming language which is the Matlab in this paper. Usually the Matlab compiler is
very slow when it compares with the compilers of other programming languages. Even though,
the processing times for embedding and extraction are acceptable.
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, May 2013
131
 
Table 2. Embedding Process Time
Cover Image Embedding Time
(Second)
Cameraman 1.0462
Lenna 0.9986
Peppers 1.1033
House 1.0651
Baboon 0.9965
Table 3. Extraction Process time
Cover Image Extraction Time
(Second)
Cameraman 1.1322
Lenna 1.0192
Peppers 1.1321
House 1.1151
Baboon 1.0795
(a) (b)
(c) (d)
Figure 6. a) Cameraman cover image. b) Stego image. c) Histogram of Camerman image. d) Histogram of
stego image.
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, May 2013
132
 
(a) (b)
(c) (d)
Figure 7. a) Lenna cover image. b) Stego image. c) Histogram of Lenna image. d) Histogram of stego
image.
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, May 2013
133
 
(a) (b)
(c) (d)
Figure 8. a) Peppers cover image. b) Stego image. c) Histogram of Peppers image. d) Histogram of stego
image.
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, May 2013
134
 
    
(a) (b)
(c) (d)
Figure 9. a) Baboon cover image. b) Stego image. c) Histogram of Baboon image. d) Histogram of stego
image.
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, May 2013
135
 
                               
(a) (b)
       
(c) (d)
Figure 10. a) House cover image. b) Stego image. c) Histogram of House image. d) Histogram of stego
image.
5. CONCLUSION
In this paper a high security model uses both cryptography and Steganography has been
developed. Filter bank cipher is used for encryption the data. Filter bank cipher is a symmetric
block cipher; it provides high level of security, scalability and speed. The encrypted data is
embedded in a cover image using discrete wavelet transform. The performance of the proposed
algorithm has been evaluated using PSNR and histogram. The results showed that, the PSNR of
the proposed system are high, which ensure the invisibility of the hidden message through the
cover image. Also, the histograms of the stego and cover images are very close to each other,
which ensure the resistivity of the proposed system against the attacks.
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, May 2013
136
 
REFERENCES
[1 ] Obaida Mohammad Awad Al-Hazaimeh, (2013) "A New Approach for Complex Encrypting and
Decrypting Data" International Journal of Computer Networks & Communications (IJCNC) Vol.5,
No.2.
[2] Katzenbeisser, S. and Petitcolas, F.A.P. 2000, Information Hiding Techniques for Steganography
and Digital Watermarking. Artech House, Inc., Boston, London.
[3] Xinpeng Zhang and Shuozhong Wang, (2005), "Steganography Using MultipleBase Notational
System and Human Vision Sensitivity", IEEE signal processing letters, Vol. 12, No. 1.
[4] Jarno Mielikainen, (2006), "LSB Matching Revisited", IEEE signal processing letters, Vol. 13,
No. 5.
[5] Piyush Marwaha, Paresh Marwaha, (2010), "Visual Cryptographic Steganography in images",
IEEE, 2nd International conference on Computing, Communication and Networking
Technologies.
[6] G.Karthigai Seivi, Leon Mariadhasan and K. L. Shunmuganathan, (2012), " Steganography Using
Edge Adaptive Image " IEEE, International Conference on Computing, Electronics and Electrical
Technologies.
[7] Hemalatha S, U Dinesh Acharya, Renuka A and Priya R. Kamath, (2012), " A Secure and High
Capacity Image Steganography Technique", Signal & Image Processing : An International Journal
(SIPIJ) Vol.4, No.1.
[8] Tong L.and Zheng-ding, Q, (2002), "DWT-based color Images Steganography Scheme", IEEE
International Conference on Signal Processing, 2:1568-1571.
[9] Mandal J.K. and Sengupta M., (2010), “Authentication/Secret Message Transformation Through
Wavelet Transform based Subband Image Coding (WTSIC).”, Proceedings of International
Symposium on Electronic System Design, IEEE Conference Publications, pp 225 – 229.
[10] Septimiu F. M., Mircea Vladutiu and Lucian P., (2011),"Secret data communication system using
Steganography, AES and RSA", IEEE 17th International Symposium for Design and Technology
in Electronic Packaging.
[11] H. Tian, K. Zhou, Y. Huang, D. Feng, J. Liu, (2008), "A Covert Communication Model Based on
Least Significant Bits Steganography in Voice over IP", IEEE The 9th International Conference
for Young Computer Scientists, pp. 647-652.
[12] Y. Huang, B. Xiao, H. Xiao, (2008), "Implementation of Covert Communication Based on
Steganography", IEEE International Conference on Intelligent Information Hiding and Multimedia
Signal Processing, pp. 1512-1515.
[13] Cheddad, A, Condell, Joan, Curran, K and McKevitt, Paul,(2008), "Securing Information Content
using New Encryption Method and Steganography", IEEE Third International Conference on
Digital Information Management.
[14] Rasul E., Saed F. and Hossein S, (2009), " Using the Chaotic Map in Image Steganography",
IEEE, International Conference on Signal Processing Systems.
[15] Majunatha R. H. S. and Raja K B, (2010), "High Capacity and Security Steganography using
Discrete Wavelet Transform", International Journal of Computer Science and Security (IJCSS),
Vol. 3: Issue (6) pp 462-472.
[16] Saraireh S. and Benaissa M., (2009), “A Scalable Block Cipher Design using Filter Banks and
Lifting over Finite Fields” In IEEE International Conference on Communications (ICC), Dresden,
Germany.
[17] El Safy, R.O, Zayed. H. H, El Dessouki. A, (2009), “An adaptive steganography technique based
on integer wavelet transform,” ICNM International Conference on Networking and Media
Convergence, pp 111-117.
International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, May 2013
137
 
Author
Saleh Saraireh has been an assistant Professor at Philadelphia university in Jordan –
Amman since 2009. I am PhD holder from the university of Sheffield, UK ,in
communication engineering. Also I hold a Master degree in Communication Engineering,
and a Bachelor degree in electrical engineering from Mutah university, Jordan. My
research area related to wireless communication, digital signal processing
and cryptography.

Mais conteúdo relacionado

Mais procurados

5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...
5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...
5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...INFOGAIN PUBLICATION
 
RSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
RSA and RC4 Cryptosystem Performance Evaluation Using Image and TextRSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
RSA and RC4 Cryptosystem Performance Evaluation Using Image and TextYekini Nureni
 
Image Cryptography using RSA Algorithm
Image Cryptography using RSA AlgorithmImage Cryptography using RSA Algorithm
Image Cryptography using RSA Algorithmijtsrd
 
A-SURVEY SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORK
A-SURVEY SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKA-SURVEY SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORK
A-SURVEY SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKEditor IJMTER
 
Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..Jayanth Dwijesh H P
 
Review and Performance Comparison of Distributed Wireless Reprogramming Proto...
Review and Performance Comparison of Distributed Wireless Reprogramming Proto...Review and Performance Comparison of Distributed Wireless Reprogramming Proto...
Review and Performance Comparison of Distributed Wireless Reprogramming Proto...IOSR Journals
 
File transfer with multiple security mechanism
File transfer with multiple security mechanismFile transfer with multiple security mechanism
File transfer with multiple security mechanismShubham Patil
 
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...caijjournal
 
Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingSecure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingIRJET Journal
 
Review on Encrypted Image with Hidden Data Using AES Algorithm
Review on Encrypted Image with Hidden Data Using AES AlgorithmReview on Encrypted Image with Hidden Data Using AES Algorithm
Review on Encrypted Image with Hidden Data Using AES AlgorithmEECJOURNAL
 
Cryptography and Network Lecture Notes
Cryptography and Network Lecture NotesCryptography and Network Lecture Notes
Cryptography and Network Lecture NotesFellowBuddy.com
 
Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...IJECEIAES
 
Literature Survey: Secure transmitting of data using RSA public key implement...
Literature Survey: Secure transmitting of data using RSA public key implement...Literature Survey: Secure transmitting of data using RSA public key implement...
Literature Survey: Secure transmitting of data using RSA public key implement...Editor IJCATR
 
IRJET- Data Transmission using RSA Algorithm
IRJET-  	  Data Transmission using RSA AlgorithmIRJET-  	  Data Transmission using RSA Algorithm
IRJET- Data Transmission using RSA AlgorithmIRJET Journal
 

Mais procurados (20)

50120140507006
5012014050700650120140507006
50120140507006
 
5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...
5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...
5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...
 
[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...
[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...
[IJCT-V3I2P18] Authors: O. Sheela, T. Samraj Lawrence, V. Perathu Selvi, P. J...
 
RSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
RSA and RC4 Cryptosystem Performance Evaluation Using Image and TextRSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
RSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
 
Image Cryptography using RSA Algorithm
Image Cryptography using RSA AlgorithmImage Cryptography using RSA Algorithm
Image Cryptography using RSA Algorithm
 
A-SURVEY SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORK
A-SURVEY SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKA-SURVEY SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORK
A-SURVEY SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORK
 
Ew25914917
Ew25914917Ew25914917
Ew25914917
 
Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..
 
Review and Performance Comparison of Distributed Wireless Reprogramming Proto...
Review and Performance Comparison of Distributed Wireless Reprogramming Proto...Review and Performance Comparison of Distributed Wireless Reprogramming Proto...
Review and Performance Comparison of Distributed Wireless Reprogramming Proto...
 
MIMO Wireless based Cryptosystem using Electronic Key Generation Unit
MIMO Wireless based Cryptosystem using Electronic Key Generation UnitMIMO Wireless based Cryptosystem using Electronic Key Generation Unit
MIMO Wireless based Cryptosystem using Electronic Key Generation Unit
 
File transfer with multiple security mechanism
File transfer with multiple security mechanismFile transfer with multiple security mechanism
File transfer with multiple security mechanism
 
Final report
Final reportFinal report
Final report
 
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...
 
Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingSecure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy Preserving
 
Review on Encrypted Image with Hidden Data Using AES Algorithm
Review on Encrypted Image with Hidden Data Using AES AlgorithmReview on Encrypted Image with Hidden Data Using AES Algorithm
Review on Encrypted Image with Hidden Data Using AES Algorithm
 
Cryptography and Network Lecture Notes
Cryptography and Network Lecture NotesCryptography and Network Lecture Notes
Cryptography and Network Lecture Notes
 
Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...
 
Literature Survey: Secure transmitting of data using RSA public key implement...
Literature Survey: Secure transmitting of data using RSA public key implement...Literature Survey: Secure transmitting of data using RSA public key implement...
Literature Survey: Secure transmitting of data using RSA public key implement...
 
82 86
82 8682 86
82 86
 
IRJET- Data Transmission using RSA Algorithm
IRJET-  	  Data Transmission using RSA AlgorithmIRJET-  	  Data Transmission using RSA Algorithm
IRJET- Data Transmission using RSA Algorithm
 

Destaque

Exact network reconstruction from consensus signals and one eigen value
Exact network reconstruction from consensus signals and one eigen valueExact network reconstruction from consensus signals and one eigen value
Exact network reconstruction from consensus signals and one eigen valueIJCNCJournal
 
ON THE OPTIMIZATION OF BITTORRENT-LIKE PROTOCOLS FOR INTERACTIVE ON-DEMAND ST...
ON THE OPTIMIZATION OF BITTORRENT-LIKE PROTOCOLS FOR INTERACTIVE ON-DEMAND ST...ON THE OPTIMIZATION OF BITTORRENT-LIKE PROTOCOLS FOR INTERACTIVE ON-DEMAND ST...
ON THE OPTIMIZATION OF BITTORRENT-LIKE PROTOCOLS FOR INTERACTIVE ON-DEMAND ST...IJCNCJournal
 
Comparative performance analysis of different modulation techniques for papr ...
Comparative performance analysis of different modulation techniques for papr ...Comparative performance analysis of different modulation techniques for papr ...
Comparative performance analysis of different modulation techniques for papr ...IJCNCJournal
 
Analysis of wifi and wimax and wireless network coexistence
Analysis of wifi and wimax and wireless network coexistenceAnalysis of wifi and wimax and wireless network coexistence
Analysis of wifi and wimax and wireless network coexistenceIJCNCJournal
 
Performance comparison of mobile ad hoc network routing protocols
Performance comparison of mobile ad hoc network routing protocolsPerformance comparison of mobile ad hoc network routing protocols
Performance comparison of mobile ad hoc network routing protocolsIJCNCJournal
 
In network aggregation using efficient routing techniques for event driven se...
In network aggregation using efficient routing techniques for event driven se...In network aggregation using efficient routing techniques for event driven se...
In network aggregation using efficient routing techniques for event driven se...IJCNCJournal
 
Network coding combined with onion routing for anonymous and secure communica...
Network coding combined with onion routing for anonymous and secure communica...Network coding combined with onion routing for anonymous and secure communica...
Network coding combined with onion routing for anonymous and secure communica...IJCNCJournal
 
Healthy Nutrition Under Asp-Prolog
Healthy Nutrition Under Asp-PrologHealthy Nutrition Under Asp-Prolog
Healthy Nutrition Under Asp-PrologIJCNCJournal
 
HONEYPOTLABSAC: A VIRTUAL HONEYPOT FRAMEWORK FOR ANDROID
HONEYPOTLABSAC: A VIRTUAL HONEYPOT FRAMEWORK FOR ANDROIDHONEYPOTLABSAC: A VIRTUAL HONEYPOT FRAMEWORK FOR ANDROID
HONEYPOTLABSAC: A VIRTUAL HONEYPOT FRAMEWORK FOR ANDROIDIJCNCJournal
 
AN EFFICIENT SPECTRUM SHARING METHOD BASED ON GENETIC ALGORITHM IN HETEROGENE...
AN EFFICIENT SPECTRUM SHARING METHOD BASED ON GENETIC ALGORITHM IN HETEROGENE...AN EFFICIENT SPECTRUM SHARING METHOD BASED ON GENETIC ALGORITHM IN HETEROGENE...
AN EFFICIENT SPECTRUM SHARING METHOD BASED ON GENETIC ALGORITHM IN HETEROGENE...IJCNCJournal
 
EFFECTS OF FILTERS ON DVB-T RECEIVER PERFORMANCE UNDER AWGN, RAYLEIGH, AND RI...
EFFECTS OF FILTERS ON DVB-T RECEIVER PERFORMANCE UNDER AWGN, RAYLEIGH, AND RI...EFFECTS OF FILTERS ON DVB-T RECEIVER PERFORMANCE UNDER AWGN, RAYLEIGH, AND RI...
EFFECTS OF FILTERS ON DVB-T RECEIVER PERFORMANCE UNDER AWGN, RAYLEIGH, AND RI...IJCNCJournal
 
Comparative analyisis on some possible partnership schemes of global ip excha...
Comparative analyisis on some possible partnership schemes of global ip excha...Comparative analyisis on some possible partnership schemes of global ip excha...
Comparative analyisis on some possible partnership schemes of global ip excha...IJCNCJournal
 
AN ADAPTIVE PSEUDORANDOM STEGO-CRYPTO TECHNIQUE FOR DATA COMMUNICATION
AN ADAPTIVE PSEUDORANDOM STEGO-CRYPTO TECHNIQUE FOR DATA COMMUNICATIONAN ADAPTIVE PSEUDORANDOM STEGO-CRYPTO TECHNIQUE FOR DATA COMMUNICATION
AN ADAPTIVE PSEUDORANDOM STEGO-CRYPTO TECHNIQUE FOR DATA COMMUNICATIONIJCNCJournal
 
Peak detection using wavelet transform
Peak detection using wavelet transformPeak detection using wavelet transform
Peak detection using wavelet transformIJCNCJournal
 
A preliminary evaluation of bandwidth allocation model dynamic switching
A preliminary evaluation of bandwidth allocation model dynamic switchingA preliminary evaluation of bandwidth allocation model dynamic switching
A preliminary evaluation of bandwidth allocation model dynamic switchingIJCNCJournal
 

Destaque (19)

Exact network reconstruction from consensus signals and one eigen value
Exact network reconstruction from consensus signals and one eigen valueExact network reconstruction from consensus signals and one eigen value
Exact network reconstruction from consensus signals and one eigen value
 
ON THE OPTIMIZATION OF BITTORRENT-LIKE PROTOCOLS FOR INTERACTIVE ON-DEMAND ST...
ON THE OPTIMIZATION OF BITTORRENT-LIKE PROTOCOLS FOR INTERACTIVE ON-DEMAND ST...ON THE OPTIMIZATION OF BITTORRENT-LIKE PROTOCOLS FOR INTERACTIVE ON-DEMAND ST...
ON THE OPTIMIZATION OF BITTORRENT-LIKE PROTOCOLS FOR INTERACTIVE ON-DEMAND ST...
 
Comparative performance analysis of different modulation techniques for papr ...
Comparative performance analysis of different modulation techniques for papr ...Comparative performance analysis of different modulation techniques for papr ...
Comparative performance analysis of different modulation techniques for papr ...
 
Analysis of wifi and wimax and wireless network coexistence
Analysis of wifi and wimax and wireless network coexistenceAnalysis of wifi and wimax and wireless network coexistence
Analysis of wifi and wimax and wireless network coexistence
 
Performance comparison of mobile ad hoc network routing protocols
Performance comparison of mobile ad hoc network routing protocolsPerformance comparison of mobile ad hoc network routing protocols
Performance comparison of mobile ad hoc network routing protocols
 
In network aggregation using efficient routing techniques for event driven se...
In network aggregation using efficient routing techniques for event driven se...In network aggregation using efficient routing techniques for event driven se...
In network aggregation using efficient routing techniques for event driven se...
 
Network coding combined with onion routing for anonymous and secure communica...
Network coding combined with onion routing for anonymous and secure communica...Network coding combined with onion routing for anonymous and secure communica...
Network coding combined with onion routing for anonymous and secure communica...
 
Ijcnc050210
Ijcnc050210Ijcnc050210
Ijcnc050210
 
Healthy Nutrition Under Asp-Prolog
Healthy Nutrition Under Asp-PrologHealthy Nutrition Under Asp-Prolog
Healthy Nutrition Under Asp-Prolog
 
HONEYPOTLABSAC: A VIRTUAL HONEYPOT FRAMEWORK FOR ANDROID
HONEYPOTLABSAC: A VIRTUAL HONEYPOT FRAMEWORK FOR ANDROIDHONEYPOTLABSAC: A VIRTUAL HONEYPOT FRAMEWORK FOR ANDROID
HONEYPOTLABSAC: A VIRTUAL HONEYPOT FRAMEWORK FOR ANDROID
 
Ijcnc050215
Ijcnc050215Ijcnc050215
Ijcnc050215
 
AN EFFICIENT SPECTRUM SHARING METHOD BASED ON GENETIC ALGORITHM IN HETEROGENE...
AN EFFICIENT SPECTRUM SHARING METHOD BASED ON GENETIC ALGORITHM IN HETEROGENE...AN EFFICIENT SPECTRUM SHARING METHOD BASED ON GENETIC ALGORITHM IN HETEROGENE...
AN EFFICIENT SPECTRUM SHARING METHOD BASED ON GENETIC ALGORITHM IN HETEROGENE...
 
EFFECTS OF FILTERS ON DVB-T RECEIVER PERFORMANCE UNDER AWGN, RAYLEIGH, AND RI...
EFFECTS OF FILTERS ON DVB-T RECEIVER PERFORMANCE UNDER AWGN, RAYLEIGH, AND RI...EFFECTS OF FILTERS ON DVB-T RECEIVER PERFORMANCE UNDER AWGN, RAYLEIGH, AND RI...
EFFECTS OF FILTERS ON DVB-T RECEIVER PERFORMANCE UNDER AWGN, RAYLEIGH, AND RI...
 
Comparative analyisis on some possible partnership schemes of global ip excha...
Comparative analyisis on some possible partnership schemes of global ip excha...Comparative analyisis on some possible partnership schemes of global ip excha...
Comparative analyisis on some possible partnership schemes of global ip excha...
 
Ijcnc050202
Ijcnc050202Ijcnc050202
Ijcnc050202
 
AN ADAPTIVE PSEUDORANDOM STEGO-CRYPTO TECHNIQUE FOR DATA COMMUNICATION
AN ADAPTIVE PSEUDORANDOM STEGO-CRYPTO TECHNIQUE FOR DATA COMMUNICATIONAN ADAPTIVE PSEUDORANDOM STEGO-CRYPTO TECHNIQUE FOR DATA COMMUNICATION
AN ADAPTIVE PSEUDORANDOM STEGO-CRYPTO TECHNIQUE FOR DATA COMMUNICATION
 
Ijcnc050212
Ijcnc050212Ijcnc050212
Ijcnc050212
 
Peak detection using wavelet transform
Peak detection using wavelet transformPeak detection using wavelet transform
Peak detection using wavelet transform
 
A preliminary evaluation of bandwidth allocation model dynamic switching
A preliminary evaluation of bandwidth allocation model dynamic switchingA preliminary evaluation of bandwidth allocation model dynamic switching
A preliminary evaluation of bandwidth allocation model dynamic switching
 

Semelhante a A Secure Data Communication System Using Cryptography and Steganography

Blind Key Steganography Based on Multilevel Wavelet and CSF
Blind Key Steganography Based on Multilevel Wavelet and CSF Blind Key Steganography Based on Multilevel Wavelet and CSF
Blind Key Steganography Based on Multilevel Wavelet and CSF irjes
 
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITION
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITIONDUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITION
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITIONIJNSA Journal
 
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITION
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITIONDUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITION
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITIONIJNSA Journal
 
RSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT ApproachRSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT ApproachIJERA Editor
 
QUATERNİON SECURİTY USİNG MODİFYİNG VERNAM CİPHER WİTH İMAGE STEGANOGRAPHY
QUATERNİON SECURİTY USİNG MODİFYİNG VERNAM CİPHER WİTH İMAGE STEGANOGRAPHYQUATERNİON SECURİTY USİNG MODİFYİNG VERNAM CİPHER WİTH İMAGE STEGANOGRAPHY
QUATERNİON SECURİTY USİNG MODİFYİNG VERNAM CİPHER WİTH İMAGE STEGANOGRAPHYijma
 
Review paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and SteganographyReview paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and Steganographyvivatechijri
 
A Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography TechniquesA Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography TechniquesRick Vogel
 
Hiding Text within Image Using LSB Replacement
Hiding Text within Image Using LSB ReplacementHiding Text within Image Using LSB Replacement
Hiding Text within Image Using LSB ReplacementIOSR Journals
 
High Capacity and Security Steganography Using Discrete Wavelet Transform
High Capacity and Security Steganography Using Discrete Wavelet TransformHigh Capacity and Security Steganography Using Discrete Wavelet Transform
High Capacity and Security Steganography Using Discrete Wavelet TransformCSCJournals
 
Conditional entrench spatial domain steganography
Conditional entrench spatial domain steganographyConditional entrench spatial domain steganography
Conditional entrench spatial domain steganographysipij
 
Iaetsd design of image steganography using haar dwt
Iaetsd design of image steganography using haar dwtIaetsd design of image steganography using haar dwt
Iaetsd design of image steganography using haar dwtIaetsd Iaetsd
 
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMA SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMijcisjournal
 
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMA SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMijcisjournal
 
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHYA SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHYcsandit
 
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...iosrjce
 
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...IJNSA Journal
 
Hybrid information security system via combination of compression, cryptogra...
Hybrid information security system via combination of  compression, cryptogra...Hybrid information security system via combination of  compression, cryptogra...
Hybrid information security system via combination of compression, cryptogra...IJECEIAES
 
Image Steganography With Encryption
Image Steganography With EncryptionImage Steganography With Encryption
Image Steganography With Encryptionvaishali kataria
 
Image Steganography With Encryption
Image Steganography With EncryptionImage Steganography With Encryption
Image Steganography With Encryptionvaishali kataria
 

Semelhante a A Secure Data Communication System Using Cryptography and Steganography (20)

Blind Key Steganography Based on Multilevel Wavelet and CSF
Blind Key Steganography Based on Multilevel Wavelet and CSF Blind Key Steganography Based on Multilevel Wavelet and CSF
Blind Key Steganography Based on Multilevel Wavelet and CSF
 
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITION
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITIONDUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITION
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITION
 
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITION
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITIONDUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITION
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITION
 
RSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT ApproachRSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT Approach
 
QUATERNİON SECURİTY USİNG MODİFYİNG VERNAM CİPHER WİTH İMAGE STEGANOGRAPHY
QUATERNİON SECURİTY USİNG MODİFYİNG VERNAM CİPHER WİTH İMAGE STEGANOGRAPHYQUATERNİON SECURİTY USİNG MODİFYİNG VERNAM CİPHER WİTH İMAGE STEGANOGRAPHY
QUATERNİON SECURİTY USİNG MODİFYİNG VERNAM CİPHER WİTH İMAGE STEGANOGRAPHY
 
Review paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and SteganographyReview paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and Steganography
 
A Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography TechniquesA Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography Techniques
 
Hiding Text within Image Using LSB Replacement
Hiding Text within Image Using LSB ReplacementHiding Text within Image Using LSB Replacement
Hiding Text within Image Using LSB Replacement
 
High Capacity and Security Steganography Using Discrete Wavelet Transform
High Capacity and Security Steganography Using Discrete Wavelet TransformHigh Capacity and Security Steganography Using Discrete Wavelet Transform
High Capacity and Security Steganography Using Discrete Wavelet Transform
 
Conditional entrench spatial domain steganography
Conditional entrench spatial domain steganographyConditional entrench spatial domain steganography
Conditional entrench spatial domain steganography
 
Iaetsd design of image steganography using haar dwt
Iaetsd design of image steganography using haar dwtIaetsd design of image steganography using haar dwt
Iaetsd design of image steganography using haar dwt
 
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMA SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
 
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMA SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
 
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHYA SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
 
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
 
H017255560
H017255560H017255560
H017255560
 
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
 
Hybrid information security system via combination of compression, cryptogra...
Hybrid information security system via combination of  compression, cryptogra...Hybrid information security system via combination of  compression, cryptogra...
Hybrid information security system via combination of compression, cryptogra...
 
Image Steganography With Encryption
Image Steganography With EncryptionImage Steganography With Encryption
Image Steganography With Encryption
 
Image Steganography With Encryption
Image Steganography With EncryptionImage Steganography With Encryption
Image Steganography With Encryption
 

Mais de IJCNCJournal

Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
 
April 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsApril 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
 
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficIJCNCJournal
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficIJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
 
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...IJCNCJournal
 
March 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsMarch 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
 
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...IJCNCJournal
 
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...IJCNCJournal
 

Mais de IJCNCJournal (20)

Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
 
April 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsApril 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & Communications
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
 
March 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsMarch 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & Communications
 
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
 
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
 

Último

A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 

Último (20)

A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

A Secure Data Communication System Using Cryptography and Steganography

  • 1. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, May 2013 DOI : 10.5121/ijcnc.2013.5310 125 A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY Saleh Saraireh Department of Communications and Electronic Engineering, Philadelphia University, Amman,Jordan. saleh_53@yahoo.com ABSTRACT   The information security has become one of the most significant problems in data communication. So it becomes an inseparable part of data communication. In order to address this problem, cryptography and steganography can be combined. This paper proposes a secure communication system. It employs cryptographic algorithm together with steganography. The jointing of these techniques provides a robust and strong communication system that able to withstand against attackers. In this paper, the filter bank cipher is used to encrypt the secret text message, it provide high level of security, scalability and speed. After that, a discrete wavelet transforms (DWT) based steganography is employed to hide the encrypted message in the cover image by modifying the wavelet coefficients. The performance of the proposed system is evaluated using peak signal to noise ratio (PSNR) and histogram analysis. The simulation results show that, the proposed system provides high level of security. KEYWORDS   Steganography, Cryptography, DWT, Filter bank, PSNR.   1. INTRODUCTION The security of data transmission is a vital problem in communication networks. A communication system is reliable as long as it provides high level of security. Usually, users exchange personal sensitive information or important documents. In this case; security, integrity, authenticity and confidentiality of the exchanged data should be provided over the transmission medium. Nowadays, internet multimedia is very popular; a significant amount of data is exchanged every second over a non secured channel, which may not be safe. Therefore, it is essential to protect the data from attackers. To protect the data; cryptography and steganography techniques can be used. Cryptography is the science of keeping the transmitted data secure. It provides data encryption for secure communication [1]. The encryption process is applied before transmission, and the decryption process is applied after receiving the encrypted data. Steganography is the science of writing hidden messages inside a different digital content; it conveys the data by concealing it in other medium such as image or audio which is called the cover object. The information hiding process is applied before transmission and the extraction process is applied after receiving. The main difference between cryptography and steganography based on the existence of the secret message. Cryptography encrypts the message and transmits it; anyone can view the encrypted message, but is very difficult to be understood, especially if it has been encrypted with strong cryptographic algorithm. Steganography conceals the secrete message existence by hiding
  • 2. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, May 2013 126   it in a cover object. The cover object can be classified as Text-based Steganography in which the secret message is embedded in a text file, audio Steganography to hide the secret message in audio signal and image steganography in which the secret data is embedded in an image. Cryptographic algorithms are classified as symmetric key algorithm and public key algorithm. Symmetric key algorithm uses the same key for encryption and decryption, while public key algorithm uses different keys for encryption and decryption. Steganography system can be implemented using two techniques. Firstly, the spatial domain based steganography, where the least significant bits (LSB) of the cover object is replaced by the secret message bits. Secondly, the transform domain based steganography; in this case, the secret message is embedded with the coefficient of the cover object. The most common transform domains are discrete Fourier transform and discrete wavelet transform. To improve the reliability of the communication system; cryptography and steganography can be combined to implement a robust and secure system; in this case, the encryption and hiding are achieved in the transmitter, while the extraction and decryption are achieved in the receiver. There are some issued that should be addressed in the designing of a steganography system [2]: a) Invisibility: This means that the stego image should not be noticed by human. b) Security: The steganography process should provide high level of security, therefore, the stego image should be very close to the original cover image, and the attacker could not detect the hidden information. Peak signal to noise ratio (PSNR) is employed to measure the difference between the cover image and the stego image. PSNR can be calculated using: MES L PSNR 2 log10 1 L is the maximum value the samples and MES is the mean error squre. The remainder of this article is organized as follows. The related work is introduced in section 2. Section 3 presents the proposed system. The experimental results and discussions are presented in section 4 and the paper is concluded in section 5. 2. RELATED WORK In [3] a steganographic scheme was proposed, it uses human vision sensitivity to hide secret bits. To make this, the secret data firstly are converted into a series of symbols to be embedded in a notation system with multiple bases. In this case, the particular bases used are determined by the degree of local variation of the pixel magnitudes in the host image. A modification to the least significant bit matching (LSBM) steganography was introduced in [4]. This modification provides the desired choice of a binary function of two cover pixels rather than to be random as in LSBM. To increase the level of security, a combined data encoding and hiding process was proposed in [5]. This process was used to overcome the problem of image color changes after the embedding process. The LSB steganography technique was developed in [6], it based on embedding the secret message into the sharper edge regions of the image to ensure its resistance against image steganalysis based on statistical analysis. A novel image steganography was proposed in [7], it is based on integer wavelet transform [IWT], it is used to embed multiple secret images and keys in color cover image. A quantization based steganography system presented in [8] embedded the
  • 3. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, May 2013 127   secret message in every chrominance of a color image to increase the hiding capacity. DWT based frequency domain steganographic technique was proposed in [9], the data is hidden in horizontal, vertical and diagonal components of the sub – image. In [10] a secret data communication system was presented, it employs RSA with asymmetric keys and AES with symmetric key to encrypt the data, after that the encrypted data is embedded into the cover image using smart LSB pixel mapping and data rearrangement method. In [11] and [12] two secure communication systems were proposed to be used for voice over IP (VOIP) applications. LSB based steganography was employed to hide the information over an audio cover signal. An extended version of SHA-1 (Secure Hash Algorithm) was introduced in [13]; this system can be used to encrypt two dimensional data such as image. It is developed to increase the resistance of image based steganography against the attackers and hackers. A chaotic signal was employed in [14] for image steganography, which presents a scattering format for the embedded data through the cover image. A high capacity and security steganography using discrete wavelet transform (HCSSD) was developed in [15]; the wavelet coefficients for the cover image and the payload image were fused to obtain a single image. 3. PROPOSED SYSTEM The main objective of this paper is to introduce a secure communication system that employs both cryptography and steganography to encrypt and embed the secret message to be transmitted over a non secure channel. In this system, the encryption process is achieved using the filter bank cipher, which presents a high speed and level of security. The embedding process is achieved using the discrete wavelet transform based steganography. The proposed system consists from four stages as shown in Figure 1. Note that the main stages are encryption, embedding, extraction and decryption. The following algorithm describes these stages. Algorithm Input: Embed the message. Output: Message is embedded safely in an image and reconstructed properly. Begin 1. Message. 2. Encrypting message. 3. Implementing DWT based steganography 4. Embedding data. 5. Stego image. 6. Extraction of embedded message. 7. Encrypted message generation. 8. Decryption. 9. Original Message. End 3.1 Encryption and Decryption Process The cryptographic algorithm used in this paper is filter bank cipher over Galois field (GF (28 )) [16]. In this cipher the encryption process consists from two layers. Firstly, the diffusion layer is represented by the analysis filter bank to introduce a high diffusion rate. Secondly, the substitution layer which is represented by the lifting scheme over GF (28 ) to add the required nonlinearity to increase the resistivity of the cipher against the differential and linear cryptanalysis attacks. The lifting scheme is shown in Figure 2, where S is the inverse function over GF (28 ). The filter bank cipher consists from two rounds to improve its security. Figure 3
  • 4. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, May 2013 128   shows one round filter bank cipher. In this stage, the message is encrypted using filter bank cipher, where its filters coefficients are generated from the key [16]. The decryption process is achieved at the receiver. In this case, the synthesis filter bank and perfect reconstruction lifting scheme are used to reconstruct the original message. The perfect reconstruction lifting scheme is shown in Figure 4. And one Round filter bank cipher decryption System is shown in Figure 5 which satisfies the perfect reconstruction property to recover the original message properly. Figure 1. Block Diagram of the proposed system. Figure 2. Lifting scheme. Figure 3. One Round Filter Bank Encryption cipher. Figure 4. Perfect reconstruction lifting scheme. + S  S + + S S + + S  + S S + + S Encryption Process Secret Message Key Encrypted Message Embedding Process Cover Image Stego Image Decryption Process Secret Message Encrypted Message Extraction Process
  • 5. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, May 2013 129     Figure 5. One Round filter bank cipher decryption System. 3.2 Embedding and Extraction Process DWT based steganography is used to hide the message using Haar wavelet. Wavelet transform converts a spatial domain into frequency domain. In this case the cover image is decomposed into four sub-images, namely, approximation coefficients, horizontal detail coefficients, vertical detail coefficients and diagonal detail coefficients. The embedding process is achieved at the transmitter to hide the message. In this paper the embedding process based on the following algorithm. Algorithm Input: Cover image and encrypted message. Output: Stego image. Begin 1. Normalized the encrypted message. 2. Transform the cover image using Haar wavelet transform 3. Embedding the normalized encrypted image in vertical detail coefficients and diagonal detail coefficients. 4. Inverse DWT of all the subbands. 5. Denomoralize. 6. Stego image is generated. End The extraction process is used to retrieve the original message at the receiver. It processes the stego image to extract the original message. In this paper the extraction process based on the following algorithm. Algorithm Input: Stego Image. Output: Encrypted message. Begin 1. Transform the stego image using Haar wavelet transform. 2. Extracting the normalized encrypted image from the vertical detail coefficients and diagonal detail coefficients. 3. Normalization. 4. The encrypted message is generated. End 2 g0(n,k)  g1(n,k) 2 2 g3(n,k)  g4(n,k)  2   2   2  2    Perfect reconstruction lifting 2
  • 6. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, May 2013 130   Note that, the encryption and embedding processes are achieved in the transmitter to generate the stego image, while the extraction and decryption processes are achieved in the receiver to recover the original message. 4. EXPERIMENTAL RESULTS AND DISCUSSIONS To evaluate the performance of the proposed system in this paper, five cover images (Cameraman, Lenna, Peppers, House, Baboon and each of size 256×256) were employed to embed a text encrypted message. In this paper, the message is firstly encrypted, after that it is hidden to be sent. At the receiver, the hidden message is extracted and then decrypted. This represents a hybrid system that combines cryptographic and steganographic algorithms together to improve the security of the information. This combination is tested using PSNR and histogram analysis. PSNR is used to compare between the cover image and the stego image. It is measured in decibels (dB). It is used to assess the quality of the stego image. If PSNR of gray scale image larger than 36 dB then the human cannot distinguish between the cover image and the stego image [17]. The PSNR of the proposed system using different images were calculated using equation (1), and the results are summarized in Table 1. The results indicate that, the PSNR values are much greater than 36 dB; this proves the suitability of the proposed system. Table 1. PSNR Results Cover Image PSNR Cameraman 68.8120 Lenna 62.1071 Peppers 53.1336 House 68.6596 Baboon 59.9863 The histogram analysis can be used to evaluate the efficiency of the embedded algorithm. If the histogram remains the same after the embedding, then the embedded algorithm is efficient. The histograms of the cover images before and after the embedding process were plotted as shown in the Figures 6, 7, 8, 9 and 10. Note that the histograms of the cover images and the stego images do not have any significant change. The stability of the stego images histograms means that the proposed system can resist the attacks and statistical changes. The processing time for embedding and extraction processes using different cover images are summarized in Table 3 and Table 4 respectively. Basically, the processing time depends on the specifications of the computer that used to run the program, and the speed of the compiler of the used programming language which is the Matlab in this paper. Usually the Matlab compiler is very slow when it compares with the compilers of other programming languages. Even though, the processing times for embedding and extraction are acceptable.
  • 7. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, May 2013 131   Table 2. Embedding Process Time Cover Image Embedding Time (Second) Cameraman 1.0462 Lenna 0.9986 Peppers 1.1033 House 1.0651 Baboon 0.9965 Table 3. Extraction Process time Cover Image Extraction Time (Second) Cameraman 1.1322 Lenna 1.0192 Peppers 1.1321 House 1.1151 Baboon 1.0795 (a) (b) (c) (d) Figure 6. a) Cameraman cover image. b) Stego image. c) Histogram of Camerman image. d) Histogram of stego image.
  • 8. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, May 2013 132   (a) (b) (c) (d) Figure 7. a) Lenna cover image. b) Stego image. c) Histogram of Lenna image. d) Histogram of stego image.
  • 9. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, May 2013 133   (a) (b) (c) (d) Figure 8. a) Peppers cover image. b) Stego image. c) Histogram of Peppers image. d) Histogram of stego image.
  • 10. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, May 2013 134        (a) (b) (c) (d) Figure 9. a) Baboon cover image. b) Stego image. c) Histogram of Baboon image. d) Histogram of stego image.
  • 11. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, May 2013 135                                   (a) (b)         (c) (d) Figure 10. a) House cover image. b) Stego image. c) Histogram of House image. d) Histogram of stego image. 5. CONCLUSION In this paper a high security model uses both cryptography and Steganography has been developed. Filter bank cipher is used for encryption the data. Filter bank cipher is a symmetric block cipher; it provides high level of security, scalability and speed. The encrypted data is embedded in a cover image using discrete wavelet transform. The performance of the proposed algorithm has been evaluated using PSNR and histogram. The results showed that, the PSNR of the proposed system are high, which ensure the invisibility of the hidden message through the cover image. Also, the histograms of the stego and cover images are very close to each other, which ensure the resistivity of the proposed system against the attacks.
  • 12. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, May 2013 136   REFERENCES [1 ] Obaida Mohammad Awad Al-Hazaimeh, (2013) "A New Approach for Complex Encrypting and Decrypting Data" International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.2. [2] Katzenbeisser, S. and Petitcolas, F.A.P. 2000, Information Hiding Techniques for Steganography and Digital Watermarking. Artech House, Inc., Boston, London. [3] Xinpeng Zhang and Shuozhong Wang, (2005), "Steganography Using MultipleBase Notational System and Human Vision Sensitivity", IEEE signal processing letters, Vol. 12, No. 1. [4] Jarno Mielikainen, (2006), "LSB Matching Revisited", IEEE signal processing letters, Vol. 13, No. 5. [5] Piyush Marwaha, Paresh Marwaha, (2010), "Visual Cryptographic Steganography in images", IEEE, 2nd International conference on Computing, Communication and Networking Technologies. [6] G.Karthigai Seivi, Leon Mariadhasan and K. L. Shunmuganathan, (2012), " Steganography Using Edge Adaptive Image " IEEE, International Conference on Computing, Electronics and Electrical Technologies. [7] Hemalatha S, U Dinesh Acharya, Renuka A and Priya R. Kamath, (2012), " A Secure and High Capacity Image Steganography Technique", Signal & Image Processing : An International Journal (SIPIJ) Vol.4, No.1. [8] Tong L.and Zheng-ding, Q, (2002), "DWT-based color Images Steganography Scheme", IEEE International Conference on Signal Processing, 2:1568-1571. [9] Mandal J.K. and Sengupta M., (2010), “Authentication/Secret Message Transformation Through Wavelet Transform based Subband Image Coding (WTSIC).”, Proceedings of International Symposium on Electronic System Design, IEEE Conference Publications, pp 225 – 229. [10] Septimiu F. M., Mircea Vladutiu and Lucian P., (2011),"Secret data communication system using Steganography, AES and RSA", IEEE 17th International Symposium for Design and Technology in Electronic Packaging. [11] H. Tian, K. Zhou, Y. Huang, D. Feng, J. Liu, (2008), "A Covert Communication Model Based on Least Significant Bits Steganography in Voice over IP", IEEE The 9th International Conference for Young Computer Scientists, pp. 647-652. [12] Y. Huang, B. Xiao, H. Xiao, (2008), "Implementation of Covert Communication Based on Steganography", IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 1512-1515. [13] Cheddad, A, Condell, Joan, Curran, K and McKevitt, Paul,(2008), "Securing Information Content using New Encryption Method and Steganography", IEEE Third International Conference on Digital Information Management. [14] Rasul E., Saed F. and Hossein S, (2009), " Using the Chaotic Map in Image Steganography", IEEE, International Conference on Signal Processing Systems. [15] Majunatha R. H. S. and Raja K B, (2010), "High Capacity and Security Steganography using Discrete Wavelet Transform", International Journal of Computer Science and Security (IJCSS), Vol. 3: Issue (6) pp 462-472. [16] Saraireh S. and Benaissa M., (2009), “A Scalable Block Cipher Design using Filter Banks and Lifting over Finite Fields” In IEEE International Conference on Communications (ICC), Dresden, Germany. [17] El Safy, R.O, Zayed. H. H, El Dessouki. A, (2009), “An adaptive steganography technique based on integer wavelet transform,” ICNM International Conference on Networking and Media Convergence, pp 111-117.
  • 13. International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, May 2013 137   Author Saleh Saraireh has been an assistant Professor at Philadelphia university in Jordan – Amman since 2009. I am PhD holder from the university of Sheffield, UK ,in communication engineering. Also I hold a Master degree in Communication Engineering, and a Bachelor degree in electrical engineering from Mutah university, Jordan. My research area related to wireless communication, digital signal processing and cryptography.