CLSM: COUPLE LAYERED SECURITY MODEL A HIGH-CAPACITY DATA HIDING SCHEME USING WITH STEGANOGRAPHY
Keywords:cryptography, decryption, encryption, high-capacity data hiding scheme, image processing, steganography
Cryptography and steganography are the two significant techniques used in secrecy of communications and in safe message transfer. In this study CLSM – Couple Layered Security Model is suggested which has a hybrid structure enhancing information security using features of cryptography and steganography. In CLSM system; the information which has been initially cryptographically encrypted is steganographically embedded in an image at the next step. The information is encrypted by means of a Text Keyword consisting of maximum 16 digits determined by the user in cryptography method. Similarly, the encrypted information is processed, during the embedding stage, using a 16 digit pin (I-PIN) which is determined again by the user. The carrier images utilized in the study have been determined as 24 bit/pixel colour. Utilization of images in .jpeg, .tiff, .pnp format has also been provided. The performance of the CLSM method has been evaluated according to the objective quality measurement criteria of PSNR-dB (Peak Signal-to-Noise Ratio) and SSIM (Structural Similarity Index). In the study, 12 different sized information between 1000 and 609,129 bits were embedded into images. Between 34.14 and 65.8 dB PSNR values and between 0.989 and 0.999 SSIM values were obtained. CLSM showed better results compared to Pixel Value Differencing (PVD) method, Simulated Annealing (SA) Algorithm and Mix column transform based on irreducible polynomial mathematics methods.
Abduallah WM, Rahma AMS, Pathan ASK (2014). Mix column transform based on irreducible polynomial mathematics for color image steganography: A novel approach. Computers & Electrical Engineering, 40:1390–1404.
Alavi-Milani MMR, Pehlivan H, Hosein-Pour S (2012). OTP (One Time Pad) Tabanlı DNA Şifreleme Yöntemi. Akademik Bilişim’12, XIV. Akademik Bilişim Konferansı Bildirileri 1– 3 Şubat 2012 Uşak Üniversitesi.
Bruce S (2007). Applied cryptography: protocols, algorithms, and source code in C., john wiley & sons.
Chan C K, Cheng LM (2004). Hiding data in images by simple LSB substitution. Pattern Recognition, 37: 469–474.
Chen YY, Chang YW, Yen WC (2008). Design a deblocking filter with three separate modes in DCT-based coding. Journal of Visual Communication and Image Representation, 19:231– 244.
Grifin AL (2009). Color, Mapping. International Encyclopedia of Human Geography, Elsevier UK, 195–201.
Koçak C (2015). Kriptografi ve stenografi yöntemlerini birlikte kullanarak yüksek güvenlikli veri gizleme. Erciyes Üniversitesi Fen Bilimleri Enstitüsü Dergisi, 31:115–123.
Lee YK, Chen LH (2000). High capacity steganographic model. Vision, Image and Signal Processing, IEE Proceedings, 147:288–294.
Lie WN, Chang LC (1999). Data hiding in images with adaptive numbers of least significant bits based on the human visual system. Image Processing, ICIP 99. Proceedings. International Conference, Kobe, 1:286–290.
Lin GS, Chang YT, Lie WN (2010). A framework of enhancing image steganography with picture quality optimization and anti-steganalysis based on simulated annealing algorithm. Multimedia, IEEE Transactions on, 12:345–357.
Lou DC, Liu JL (2002). Stenographic Method for Secure Communications. Computers & Security, 21:449–460.
Lusson F, Bailey FK, Leeney M, Curran K (2013). A novel approach to digital watermarking, exploiting colour spaces. Signal Processing, 93:1268–1294.
Mandal JK, Das D (2012). Colour image steganography based on pixel value differencing in spatial domain. International journal of information sciences and techniques, 2:83–93.
Menezes AJ, Van Oorschot PC, Vanstone SA (1996). Handbook of applied cryptography. CRC press.
Narayana S, Prasad G (2010). Two New Approaches for Secured Image Steganography Using Cryptographic Techniques And Type Conversions. Signal & Image Processing: An International Journal (SIPIJ), 1:60–73.
How to Cite
Copyright (c) 2017 Image Analysis & Stereology
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.