Cryptography and Steganography: New Approach

  • Ahmed Ali AL-Shaaby College of Computer Sciences and Engineering, King Fahd University of Petroleum and Minerals, Dhahran, Saudi Arabia
  • Talal AlKharobi College of Computer Sciences and Engineering, King Fahd University of Petroleum and Minerals, Dhahran, Saudi Arabia
Keywords: Steganography, Cryptography, Least Significant Bit (LSB), encryption, decryption, Stego image, Color image, Random embedding

Abstract

Digital communication witness a noticeable and continuous development in many applications in the Internet. Hence, secure communication sessions must be provided. The security of data transmitted across a global network has turned into a key factor on the network performance measures. So, the confidentiality and the integrity of data are needed to prevent eavesdroppers from accessing and using transmitted data. Steganography and Cryptography are two important techniques that are used to provide network security. In this paper, We survey a number of methods combining cryptography and steganography techniques in one system. Moreover, We present some differences between cryptography and steganography. The aim of this paper is to develop a new approach to hiding a secret information in an image or audio or video, by taking advantage of benefits of combining cryptography and steganography. In this method first, the message is encrypted by using AES algorithm and hashed the key using SHA-2 to prevent from attacks, After that, we performed some modifications on LSB algorithm by adding a key to make hiding process nonsequential. Results achieved indicate that our proposed method is encouraging in terms of robustness and security.

Author Biography

Ahmed Ali AL-Shaaby, College of Computer Sciences and Engineering, King Fahd University of Petroleum and Minerals, Dhahran, Saudi Arabia
ICS-GRADUATE STUDENT-King Fahd University of Petroleum & Minerals

References

Published
2017-12-31
How to Cite
AL-Shaaby, A. A., & AlKharobi, T. (2017). Cryptography and Steganography: New Approach. Transactions on Networks and Communications, 5(6), 25. https://doi.org/10.14738/tnc.56.3914