Cryptography Application on RGB Overlapping Block Based PVD Using AES

Authors

  • Andi Marwan Elhanafi Universitas Harapan Medan, Indonesia
  • Tommy Universitas Harapan Medan, Indonesia
  • Rosyidah Siregar Universitas Harapan Medan, Indonesia
  • Manovri Yeni Universitas Muhammadiyah Aceh, Indonesia
  • Shahira An-Nissa Universitas Harapan Medan, Indonesia

DOI:

10.33395/sinkron.v7i3.11685

Keywords:

Keywords: Steganography; PVD; Overlapping; Block Based; AES;

Abstract

Pixel Value Differencing is a data hiding method in digital images that uses the difference in pixel values as a reference for inserting secret data bits. RGB Overlapping Block Based PVD is an optimization of PVD steganography. RGB Overlapping Block Based PVD provides a much larger capacity with acceptable quality. In this study, the AES cryptography application is used as an additional layer on RGB Overlapping Block Based PVD to provide additional security. Testing and observations have been carried out on the capacity and quality aspects of the embedding results using additional AES encryption. Based on the results, AES cryptography applications can be implemented properly where there is no significant change in terms of capacity and quality to the default RGB Overlapping Block Based PVD.

GS Cited Analysis

Downloads

Download data is not yet available.

References

Alade, O., Amusan, E., Adedeji, O., & Alo, O. (2021). Image Steganography Using Pixel Value Differencing (PVD) Technique Based on Firefly Algorithm. Journal of Scientific Research & Reports, 27(7), 80-86.

Alexan, W., Hamza, A., & Medhat, H. (2019). An aes double–layer based message security scheme. 2019 International Conference on Innovative Trends in Computer Engineering (ITCE), 86-91.

Ali, S., Ali, M., & Qudr, L. (2019). PDA: A private domains approach for improved msb steganography image. Periodicals of Engineering and Natural Sciences (PEN), 7(3), 1405-1411.

Al-Juaid, N., Gutub, A., & Khan, E. (2018). Enhancing PC data security via combining RSA cryptography and video based steganography. Journal of Information Security and Cybercrimes Research, 1(1), 5-13.

Bender, W., Gruhl, D., Morimoto, N., & Lu, A. (1996). Techniques for data hiding. IBM systems journal, 35(3.4), 313-336.

Biswas, C., Gupta, U., & Haque, M. (2019). An efficient algorithm for confidentiality, integrity and authentication using hybrid cryptography and steganography. 2019 international conference on electrical, computer and communication engineering (ECCE), 1-5.

COCO. (2022). cocodataset.org. COCO. Retrieved from https://cocodataset.org/#explore

Daemen, J., & Rijmen, V. (1999). AES proposal: Rijndael. Retrieved from https://www.cs.miami.edu/home/burt/learning/Csc688.012/rijndael/rijndael_doc_V2.pdf

Duan, X., Guo, D., Liu, N., Li, B., Gou, M., & Qin, C. (2020). A new high capacity image steganography method combined with image elliptic curve cryptography and deep neural network. IEEE Access, 8, 25777-25788.

Garg, M., & Scholar, M. (2012). Comparison Of Lsb & Msb Based Steganography. International Journal of Engineering Research & Technology (IJERT), 1(8), 1-6.

Kalita, M., Tuithung, T., & Majumder, S. (2019). An adaptive color image steganography method using adjacent pixel value differencing and LSB substitution technique. Cryptologia, 43(5), 414-437.

Kushwaha, S. (2022). BBC Full Text Document Classification. Kaggle. Retrieved from BBC Full Text Document Classification

Prasad, S., & Pal, A. (2017). An RGB colour image steganography scheme using overlapping block-based pixel-value differencing. Royal Society open science, 4(4), 1-14. doi:https://doi.org/10.1098/rsos.161066

Reddy, V., Subramanyam, A., & Reddy, P. (2011). Implementation of LSB steganography and its evaluation for various file formats. Int. J. Advanced Networking and Applications, 2(5), 868-872.

Sahu, A., & Swain, G. (2016). A review on LSB substitution and PVD based image steganography techniques. Indonesian Journal of Electrical Engineering and Computer Science, 2(3), 712-719.

Sahu, A., & Swain, G. (2018). Pixel overlapping image steganography using PVD and modulus function. 3D Research, 9(3), 1-14.

Sahu, M., Padhy, N., & Gantayat, S. (2021). Multi-directional PVD steganography avoiding PDH and boundary issue. Journal of King Saud University-Computer and Information Sciences. doi:https://doi.org/10.1016/j.jksuci.2021.10.007

Subramanian, N., Elharrouss, O., Al-Maadeed, S., & Bouridane, A. (2021). Image steganography: A review of the recent advances. IEEE access, 9, 23409-23423.

Vinothkanna, M. (2019). A secure steganography creation algorithm for multiple file formats. Journal of Innovative Image Processing (JIIP), 1(1), 20-30.

Wahab, O., Khalaf, A., Hussein, A., & Hamed, H. (2021). Hiding data using efficient combination of RSA cryptography, and compression steganography techniques. IEEE Access, 9, 31805-31815.

Wai, Y., & Myat, E. (2018). Comparison of LSB, MSB and New Hybrid (NHB) of Steganography in Digital Image. International Journal of Engineering Trends and Applications, 5(4), 16-19.

Wu, D., & Tsai, W. (2003). A steganographic method for images by pixel-value differencing. Pattern recognition letters, 24(9-10), 1613-1626.

Yasser, S., Hesham, A., Hassan, M., & Alexan, W. (2020). Aes-secured bit-cycling steganography in sliced 3d images. 2020 International Conference on Innovative Trends in Communication and Computer Engineering (ITCE), 227-231.

Downloads


Crossmark Updates

How to Cite

Elhanafi, A. M. ., Tommy, T., Siregar, R. ., Yeni, M. ., & An-Nissa, S. . (2022). Cryptography Application on RGB Overlapping Block Based PVD Using AES. Sinkron : Jurnal Dan Penelitian Teknik Informatika, 6(3), 2116-2124. https://doi.org/10.33395/sinkron.v7i3.11685