Md. Simul Hasan Talukder, M. Hasan, Rafi Ibn Sultan, Mahabubur Rahman, A. K. Sarkar, Sharmin Akter
{"title":"An Enhanced Method for Encrypting Image and Text Data Simultaneously using AES Algorithm and LSB-Based Steganography","authors":"Md. Simul Hasan Talukder, M. Hasan, Rafi Ibn Sultan, Mahabubur Rahman, A. K. Sarkar, Sharmin Akter","doi":"10.1109/icaeee54957.2022.9836589","DOIUrl":null,"url":null,"abstract":"Secure data transmission in the virtual world is becoming increasingly difficult due to the activities of hackers on confidential and sensitive information. To avoid hacking at various levels, there exists a significant number of techniques for data transmission. Data security issues have led to developing a stronger algorithm in cryptography and steganography which have also led us to develop a secure data transmission model by concealing both image and text data simultaneously through the Advanced Encryption Standard (AES) algorithm and LSB-based image steganography. To develop a robust and effective model we have followed four steps in both sender and receiver end for enhancing the data security. On the sender side, first, the targeted image is encrypted using AES then the targeted text data is concealed within the AES encrypted image based on the LSB algorithm. The data security is increased further by masking this blended text image with a cover image using LSB-based image steganography. Finally, the Stego image is split and indexed for secure data transmission from the sender end. Since decryption is the reverse mathematical process of encryption, at the receiving end, inverse steps are performed sequentially to retrieve the image and text of interest. Histogram analysis at a different stage has shown a better realization of the effect of encryption and decryption whereas various comparison indexes such as SSIM, PSNR, MS-SSIM, MSE between the original and retrieved image provide acceptable data integrity after decryption of the input data.","PeriodicalId":383872,"journal":{"name":"2022 International Conference on Advancement in Electrical and Electronic Engineering (ICAEEE)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Conference on Advancement in Electrical and Electronic Engineering (ICAEEE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/icaeee54957.2022.9836589","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An Enhanced Method for Encrypting Image and Text Data Simultaneously using AES Algorithm and LSB-Based Steganography
Secure data transmission in the virtual world is becoming increasingly difficult due to the activities of hackers on confidential and sensitive information. To avoid hacking at various levels, there exists a significant number of techniques for data transmission. Data security issues have led to developing a stronger algorithm in cryptography and steganography which have also led us to develop a secure data transmission model by concealing both image and text data simultaneously through the Advanced Encryption Standard (AES) algorithm and LSB-based image steganography. To develop a robust and effective model we have followed four steps in both sender and receiver end for enhancing the data security. On the sender side, first, the targeted image is encrypted using AES then the targeted text data is concealed within the AES encrypted image based on the LSB algorithm. The data security is increased further by masking this blended text image with a cover image using LSB-based image steganography. Finally, the Stego image is split and indexed for secure data transmission from the sender end. Since decryption is the reverse mathematical process of encryption, at the receiving end, inverse steps are performed sequentially to retrieve the image and text of interest. Histogram analysis at a different stage has shown a better realization of the effect of encryption and decryption whereas various comparison indexes such as SSIM, PSNR, MS-SSIM, MSE between the original and retrieved image provide acceptable data integrity after decryption of the input data.