Secure Image Hiding using algorithm IOT and LSB

Authors

  • Nidhi Chawade  B.E(CSE), Smt.Rajshree Mulak College of Engineering For Women, RTMNU, Nagpur ,India
  • Priya Bisen   B.E(CSE), Smt.Rajshree Mulak College of Engineering For Women, RTMNU, Nagpur ,India
  • Ankita Makde  B.E(CSE), Smt.Rajshree Mulak College of Engineering For Women, RTMNU, Nagpur ,India
  • Priyanka Kawale  B.E(CSE), Smt.Rajshree Mulak College of Engineering For Women, RTMNU, Nagpur ,India

Keywords:

Internet of Things, SIT

Abstract

Internet of Things (IoT) is a common thing (object) in today's world, which serves as part of our routine life activities. Although it benefits the residential district in several ways, various challenges such as data confidentiality and privacy are created.Cryptography and Steganography are the two major techniques for secret communicationIn this paper we propose a lightweight encryption algorithm named as Secure internet of things (SIT). It is a 64-bit block cipher and requires 64-bit key to encrypt the data. Now this encrypted image is embedded with stego image by using LSB Approach of Steganography. Our proposed model gives two layers of security for secret data, which fully satisfy the basic key factors of information security system that includes: Confidentiality, Authenticity, Integrity and Non – Repudiation.

References

  1. Rajput A.S., Mishra N., and Sharma S., -Towards the growth of image Encryption and Authentication Schemes?, International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2013.
  2. BassemBakhache, Joseph M. Ghazal, and Safwan El Assad,?Improvement of the Security of ZigBee by a New Chaotic Algorithm?, IEEE Systems Journal 2013.
  3. V.Sathyal, K.Balasuhramaniyam, N.Murali, M.Rajakumaran, Vigneswari,?data hiding in audio signal, video signaltext and jpeg images?,IEEE-International Conference on Advances in Engineering, Science and Management (ICAESM -2012)
  4. Audio-video Crypto Steganography using LSB substitution and advanced chaotic algorithm?.Praveen. P1, Arun. R2M.Tech, Asst. Prof, Dept of Computer Science and Engineering, Shree NarayanaGurukulam College of Engineering, Kadayiruppu, Ernakulam, Kerala.
  5. K.A Navas, Vidya.V, Sonia.V.Dass,High security data embedding in video?,Recent Advances in Intelligent Computational Systems (RAICS), 2011 IEEE.
  6. FatihaDjebbar, BeghdadAyad, HabibHamamandKarimAbed-Meraim,?A view on latest audio steganography techniques?, International Conference on innovations in Information Technology 2011.
  7. Yogita Verma1, Neerja Dharmale2, 1M Tech Scholar Digital Electronics RCET Bhilai, India 2Assistant Professor (ET&T) RCET Bhilai, India, A Survey Paper Based On Image Encryption and Decryption Using Modified Advanced Encryption Standard,International Journal of Science and Research (IJSR) ISSN (Online): 2319-7064 Index Copernicus Value (2013)
  8. Sneha Ghoradkar, Aparna Shinde, Review on Image Encryption and Decryption using AES Algorithm,International Journal of Computer Applications (0975 – 8887) National Conference on Emerging Trends in Advanced Communication Technologies (NCETACT-2015).
  9. Muhammad Usman_, Irfan Ahmedy, M. Imran Aslamy, Shujaat Khan_ and Usman Ali Shahy,Faculty of Engineering Science and Technolog,SIT: A Lightweight Encryption Algorithm for Secure Internet of Things,(IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 8, No. 1, 2017.

Use the online HTML, CSS, JavaScript resources to generate the perfect code in your web projects

Downloads

Published

2018-04-30

Issue

Section

Research Articles

How to Cite

[1]
Nidhi Chawade, Priya Bisen , Ankita Makde, Priyanka Kawale, " Secure Image Hiding using algorithm IOT and LSB, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 4, Issue 4, pp.599-604, March-April-2018.