Cryptography Application on RGB Overlapping Block Based PVD Using AES
DOI:
10.33395/sinkron.v7i3.11685Keywords:
Keywords: Steganography; PVD; Overlapping; Block Based; AES;Abstract
Pixel Value Differencing is a data hiding method in digital images that uses the difference in pixel values as a reference for inserting secret data bits. RGB Overlapping Block Based PVD is an optimization of PVD steganography. RGB Overlapping Block Based PVD provides a much larger capacity with acceptable quality. In this study, the AES cryptography application is used as an additional layer on RGB Overlapping Block Based PVD to provide additional security. Testing and observations have been carried out on the capacity and quality aspects of the embedding results using additional AES encryption. Based on the results, AES cryptography applications can be implemented properly where there is no significant change in terms of capacity and quality to the default RGB Overlapping Block Based PVD.
Downloads
References
Alade, O., Amusan, E., Adedeji, O., & Alo, O. (2021). Image Steganography Using Pixel Value Differencing (PVD) Technique Based on Firefly Algorithm. Journal of Scientific Research & Reports, 27(7), 80-86.
Alexan, W., Hamza, A., & Medhat, H. (2019). An aes double–layer based message security scheme. 2019 International Conference on Innovative Trends in Computer Engineering (ITCE), 86-91.
Ali, S., Ali, M., & Qudr, L. (2019). PDA: A private domains approach for improved msb steganography image. Periodicals of Engineering and Natural Sciences (PEN), 7(3), 1405-1411.
Al-Juaid, N., Gutub, A., & Khan, E. (2018). Enhancing PC data security via combining RSA cryptography and video based steganography. Journal of Information Security and Cybercrimes Research, 1(1), 5-13.
Bender, W., Gruhl, D., Morimoto, N., & Lu, A. (1996). Techniques for data hiding. IBM systems journal, 35(3.4), 313-336.
Biswas, C., Gupta, U., & Haque, M. (2019). An efficient algorithm for confidentiality, integrity and authentication using hybrid cryptography and steganography. 2019 international conference on electrical, computer and communication engineering (ECCE), 1-5.
COCO. (2022). cocodataset.org. COCO. Retrieved from https://cocodataset.org/#explore
Daemen, J., & Rijmen, V. (1999). AES proposal: Rijndael. Retrieved from https://www.cs.miami.edu/home/burt/learning/Csc688.012/rijndael/rijndael_doc_V2.pdf
Duan, X., Guo, D., Liu, N., Li, B., Gou, M., & Qin, C. (2020). A new high capacity image steganography method combined with image elliptic curve cryptography and deep neural network. IEEE Access, 8, 25777-25788.
Garg, M., & Scholar, M. (2012). Comparison Of Lsb & Msb Based Steganography. International Journal of Engineering Research & Technology (IJERT), 1(8), 1-6.
Kalita, M., Tuithung, T., & Majumder, S. (2019). An adaptive color image steganography method using adjacent pixel value differencing and LSB substitution technique. Cryptologia, 43(5), 414-437.
Kushwaha, S. (2022). BBC Full Text Document Classification. Kaggle. Retrieved from BBC Full Text Document Classification
Prasad, S., & Pal, A. (2017). An RGB colour image steganography scheme using overlapping block-based pixel-value differencing. Royal Society open science, 4(4), 1-14. doi:https://doi.org/10.1098/rsos.161066
Reddy, V., Subramanyam, A., & Reddy, P. (2011). Implementation of LSB steganography and its evaluation for various file formats. Int. J. Advanced Networking and Applications, 2(5), 868-872.
Sahu, A., & Swain, G. (2016). A review on LSB substitution and PVD based image steganography techniques. Indonesian Journal of Electrical Engineering and Computer Science, 2(3), 712-719.
Sahu, A., & Swain, G. (2018). Pixel overlapping image steganography using PVD and modulus function. 3D Research, 9(3), 1-14.
Sahu, M., Padhy, N., & Gantayat, S. (2021). Multi-directional PVD steganography avoiding PDH and boundary issue. Journal of King Saud University-Computer and Information Sciences. doi:https://doi.org/10.1016/j.jksuci.2021.10.007
Subramanian, N., Elharrouss, O., Al-Maadeed, S., & Bouridane, A. (2021). Image steganography: A review of the recent advances. IEEE access, 9, 23409-23423.
Vinothkanna, M. (2019). A secure steganography creation algorithm for multiple file formats. Journal of Innovative Image Processing (JIIP), 1(1), 20-30.
Wahab, O., Khalaf, A., Hussein, A., & Hamed, H. (2021). Hiding data using efficient combination of RSA cryptography, and compression steganography techniques. IEEE Access, 9, 31805-31815.
Wai, Y., & Myat, E. (2018). Comparison of LSB, MSB and New Hybrid (NHB) of Steganography in Digital Image. International Journal of Engineering Trends and Applications, 5(4), 16-19.
Wu, D., & Tsai, W. (2003). A steganographic method for images by pixel-value differencing. Pattern recognition letters, 24(9-10), 1613-1626.
Yasser, S., Hesham, A., Hassan, M., & Alexan, W. (2020). Aes-secured bit-cycling steganography in sliced 3d images. 2020 International Conference on Innovative Trends in Communication and Computer Engineering (ITCE), 227-231.
Downloads
How to Cite
Issue
Section
License
Copyright (c) 2022 Andi Marwan Elhanafi, Tommy, Rosyidah Siregar, Manovri Yeni, Shahira An-Nissa
![Creative Commons License](http://i.creativecommons.org/l/by-nc/4.0/88x31.png)
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.