• P-ISSN 0974-6846 E-ISSN 0974-5645

Indian Journal of Science and Technology

Article

Indian Journal of Science and Technology

Year: 2023, Volume: 16, Issue: 23, Pages: 1733-1744

Original Article

Dual Level Security Scheme (DLSS) Using RGB Layer Cryptography and Audio Steganography for Secret Image Transmission in Unsecure Medium

Received Date:29 April 2023, Accepted Date:24 May 2023, Published Date:13 June 2023

Abstract

Objectives: Recent trend depicts a steep hike in the value of data. Data in all forms are vulnerable and especially multimedia data are fascinated by hackers Hence, strong security measure has to be applied before attempting to use the unsecure transmission medium for sharing secret / personal data. Methods: Dual Level Security Scheme (DLSS) is proposed which combines cryptography and steganography techniques to ensure double level security. Cipher image is obtained by applying Spiral Mapping and discrete cosine transformations (DCT) in RGB Layers. Then, the cipher image is hidden in the audio signal. Findings: SNR value is considered for normalizing the signals before embedding it, to obtain final signal without any traces of the hidden secret signal. Core objective of using DLSS is maintaining the secrecy when data transmission is taking place in any unsafe medium. Simulation results of our proposed method exhibit an average of 10% improvement and hence, DLSS outperforms well over the existing methods. Competence of the method is evident from the performed histogram analysis. Standard image dataset is used and directional correlation, PSNR, SSIM, and MSE are the considered measures to prove DLSS efficiency. Novelty: Here, a novel method Dual Level Security Scheme (DLSS) with spiral mapping is proposed to incorporate the aids of cryptography and steganography for enhanced efficiency.

Keywords: Cryptography; Steganography; RGB Layer Extraction; DCT; Spiral Mapping

References

  1. Yang B, Liao X. A new color image encryption scheme based on logistic map over the finite field ZN. Multimedia Tools and Applications. 2018;77(16):21803–21821. Available from: https://doi.org/10.1007/s11042-017-5590-0
  2. Teng L, Wang X, Meng J. A chaotic color image encryption using integrated bit-level permutation. Multimedia Tools and Applications. 2018;77(6):6883–6896. Available from: https://doi.org/10.1007/s11042-017-4605-1
  3. Sneha PS, Sankar S, Kumar AS. A chaotic colour image encryption scheme combining Walsh–Hadamard transform and Arnold–Tent maps. Journal of Ambient Intelligence and Humanized Computing. 2020;11(3):1289–1308. Available from: https://doi.org/10.1007/s12652-019-01385-0
  4. Broumandnia A. The 3D modular chaotic map to digital color image encryption. Future Generation Computer Systems. 2019;99:489–499. Available from: https://doi.org/10.1016/j.future.2019.04.005
  5. Alexan W, Elbeltagy M, Aboshousha A. RGB Image Encryption through Cellular Automata, S-Box and the Lorenz System. Symmetry. 2022;14(3):443. Available from: https://doi.org/10.3390/sym14030443
  6. Al-Roithy BO, Gutub A. Remodeling randomness prioritization to boost-up security of RGB image encryption. Multimedia Tools and Applications. 2021;80(18):28521. Available from: https://doi.org/10.1007/s11042-021-11051-3
  7. Shaji C, Sam IS. A new data encoding based on maximum to minimum histogram in reversible data hiding. The Imaging Science Journal. 2019;67(4):202–214. Available from: https://doi.org/10.1080/13682199.2019.1592892
  8. Valandar MY, Barani MJ, Ayubi P, Aghazadeh M. An integer wavelet transform image steganography method based on 3D sine chaotic map. Multimedia Tools and Applications. 2019;78(8):9971–9989. Available from: https://doi.org/10.1007/s11042-018-6584-2
  9. Ayub N, Selwal A. An improved image steganography technique using edge based data hiding in DCT domain. Journal of Interdisciplinary Mathematics. 2020;23(2):357–366. Available from: https://doi.org/10.1080/09720502.2020.1731949
  10. Singh H. Color Image Steganography Techniques - A Review. RA Journal of Applied Research. 2018. Available from: https://doi.org/10.18535/rajar/v4i1.01
  11. Gutub A. Pixel Indicator Technique for RGB Image Steganography. Journal of Emerging Technologies in Web Intelligence. 2010;2(1). Available from: https://doi.org/10.4304/jetwi.2.1.56-64
  12. Muhammad K, Jamil A, Sajjad M, Zubair M. Secure Image Steganography using Cryptography and Image Transposition. NED University Journal of Research. 2015;12:81–91. Available from: https://doi.org/10.48550/arXiv.1510.04413
  13. Mehra I, Fatima A, Nishchal NK. Gyrator wavelet transform. IET Image Processing. 2018;12(3):432–437. Available from: https://doi.org/10.1049/iet-ipr.2017.0666
  14. Chithra PL, Tamilmathi AC. 3D LiDAR point cloud image codec based on Tensor. The Imaging Science Journal. 2020;68(1):1–10. Available from: https://doi.org/10.1080/13682199.2020.1719747
  15. Chithra PL, Aparna R. Voice Signal Encryption Scheme Using Transformation and Embedding Techniques for Enhanced Security. 2018 2nd International Conference on Imaging, Signal Processing and Communication (ICISPC). 2018;p. 149–154. Available from: https://doi.org/10.1109/ICISPC44900.2018.9006681
  16. Sharma H, Mishra DC, Sharma RK, Kumar N. Multi-image steganography and authentication using crypto-stego techniques. Multimedia Tools and Applications. 2021;80(19):29067–29093. Available from: https://doi.org/10.1007/s11042-021-11068-8
  17. Jan A, Parah SA, Hussan M, Malik BA. Double layer security using crypto-stego techniques: a comprehensive review. Health and Technology. 2022;12(1):9–31. Available from: https://doi.org/10.1007/s12553-021-00602-1

Copyright

© 2023 Chithra & Aparna. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. Published By Indian Society for Education and Environment (iSee)

DON'T MISS OUT!

Subscribe now for latest articles and news.