Saturday , June 23 2018

Improved Security Based on Combined Encryption and
Steganography Techniques

University Politehnica of Bucharest,
313 Splaiul Independentei, 060042, Romania.

ABSTRACT: For some people a science, for other people just an art, steganography is in fact an ancient method of embedding a message into an apparently uninteresting carrier. Aiming to protect information, steganography is considered to be a close relative of encryption although they have different approaches. While encryption scrambles the message based on a certain algorithm so it can’t be understood by anyone that does not hold the unscrambling key, steganography works on hiding the message without the need to deteriorate it. Minor alteration of the carrier file is accepted since steganography does not affect its useful content. Actually, steganography exploits file redundancy, file headers or, in case of multimedia content, replaces information that can’t be used or perceived by the human eyes or ears. In this paper, a combination of image based steganography with encryption is presented. The encryption and decryption are based on two different files in which, by steganographic means, important information is hidden. The original message (the secret message) can be restored only if both files arrive safe at destination. There are no constraints regarding the image file types. The most important contribution resides in how the original information is encrypted and embedded into different graphic files, sent to the destination through different channels and then restored. Comparative performance tests were performed.

KEYWORDS: Digital steganography, encryption, pseudo random matrix, message hiding.


Improved Security Based on Combined Encryption and Steganography Techniques, Studies in Informatics and Control, ISSN 1220-1766, vol. 26(1), pp. 115-126, 2017.


  1. Abboud, G., Marean, J. & Yampolskiy, R. (2010). Steganography and Visual Cryptography, In Computer Forensics, IEEE Fifth International Workshop on Systematic Approaches to Digital Forensic Engineering (pp. 25-32).
  2. Djebbar, F., Ayad, B. & Meraim, K. (2012). Comparative study of digital audio steganography techniques, EURASIP Journal on audio, speech and music processing, 2012 (1), 1-16.
  3. Doshi, R., Jain, P. & Gupta, L. (2012). Steganography and Its Applications in Security, International   Journal of Modern Engineering Research, 2 (6), 4634-4638.
  4. Elminaam, D., Kader, H. & Hadhoud, M. (2009). Performance Evaluation of Symmetric Encryption Algorithms, Communications of the IBIMA, 8, 58-64.
  5. Gleason, N. (1987). Fun with codes and ciphers workbook, Dover Publications Inc.
  6. Iordache, D., Pribeanu, C. & Balog, A. (2012). Influence of Specific AR Capabilities on the Learning Effectiveness and Efficiency, Studies in Informatics and Control, 21 (3), 233-240.
  1. Jayaram, P., Ranganatha, H. & Anupama, H. (2011). Information hiding using audio steganography – a survey, International Journal of Multimedia & Its Applications (IJMA), 3 (3), 86-96.
  2. Mazurczyk, W. & Kotulski, Z. (2006). New security and control protocol for VoIP based on steganography and digital watermarking, Annales UMCS, sectio AI – Informatica, 5, 417-426.
  3. Mazurczyk, W., Wendzel, S., Villares, I. & Szczypiorski, K. (2016). On importance of steganographic cost for network steganography, Security  and Communication Networks, 9 (8), 781–790.
  4. Mona, M., Chitra, S. & Gayathri, V. (2014). A survey on various encryption and decryption algorithms, Singapore Journal of Scientific Research, 6 (6), 289-300.
  5. Nissar, A. & Mir, A. (2010). Classification of steganalysis techniques: A study, Journal of Digital Signal Processing, 20 (6),  1758-1770.
  6. Saeed, M. (2013). A new technique based on chaotic steganography and encryption text in DCT domain for color image, Journal of Engineering Science and Technology, 8 (5), 508–520.
  7. Saha, B. & Sharma, S. (2012). Steganographic Techniques of Data Hiding using Digital Images, Defence Science Journal, 62 (1), 11-18.
  8. Saleh, S. (2013). A secure data communication system using cryptography and steganography, International Journal of Computer Networks & Communications (IJCNC), 5 (3), 125-137.
  9. Singh, S. & Attri, V. (2015). State-of-the-art Review on Steganographic Techniques, International Journal of Signal Processing, Image Processing and Pattern Recognition, 8 (7), 161-170.
  10. Subhedar, M. & Mankar, V. (2014). Current status and key issues in image steganography: A survey, Computer Science Review, 13–14, 95–113.
  11. Thangadurai, K. & Devi, G. (2014). An analysis of LSB based image steganography techniques, In IEEE International Conference on Computer Communication and Informatics (1-6).
  12. Tripathi, R. & Agrawal, S. (2014). Comparative Study of Symmetric and Asymmetric Cryptography Techniques, International Journal of Advance Foundation and Research in Computer, 1(6), 68-76.
  13. Tseng, H. & Leng, H. (2013). A Steganographic Method Based on Pixel-Value Differencing and the Perfect Square Number, Journal of Applied Mathematics, 2013, ID 189706, online.
  14. Wang, K., Lu, Z. & Hu, Y. (2013). A high capacity lossless data hiding scheme for JPEG images, Journal of Systems and Software, 86 (7), 1965-1975.
  15. Warkentin, M., Bekkering, E. & Schmidt, M. (2008). Steganography: Forensic, Security, and Legal Issues, Journal of Digital Forensics, Security and Law, 3 (2), article 2, online.
  16. Wendzel, S., Mazurczyk, W., Caviglione, L. & Meier, M. (2014). Hidden and Uncontrolled – On the Emergence of Network Steganographic Threats, In Securing Electronic Business Processes: Highlights of the Information Security Solutions Europe Conference, 1-11.
  17. Zhang, J., Cox, I. & Doerr, G. (2007). Steganalysis for LSB Matching in Images with High-frequency Noise, In IEEE 9th Workshop on Multimedia Signal Processing (pp. 385-388).