IMAGE STEGANOGRAPHY USING TWO LAYER SECURITY ALGORITHMS

Authors

  • Shikha Choudhary SIET, Shobhit Institute of Engineering and Technology Deemed to be University, Meerut, U.P., India
  • Shamshad Husain SBAS, Shobhit Institute of Engineering and Technology Deemed to be University, Meerut, U.P., India

DOI:

https://doi.org/10.29121/ijoest.v7.i5.2023.549

Keywords:

DWT, Security, Information Hiding, Steganography, Lightweight Algorithm, Stego Image

Abstract

Steganography is a method used to enhance the security of messages across networks, derived from the Greek words steganos (secret) and graphic (writing). Researchers have explored image steganography, a method that uses a photo as a cover material. The modern energy grid, known as the smart grid, offers flexibility, dependability, and efficiency in power production and distribution. To protect privacy and confidentiality, a greyscale cover picture is subjected to discrete wavelet transformation (DWT), while a chaotic map is applied to the secret image. This method offers more security and can shield communication from stegoimage attacks. Additionally, a novel approach to disguise an image is presented to combat cryptography and steganography algorithms attacks.

Downloads

Download data is not yet available.

References

Abbasinezhad-Mood, D., & Nikooghadam, M. (2018). Design of an Enhanced Message Authentication Scheme for Smart Grid and its Performance Analysis on an ARM Cortex-M3 Microcontroller. Journal of Information Security and Applications, 40, 9-19. https://doi.org/10.1016/j.jisa.2018.02.007.

Abdalzaher, M. S., Fouda, M. M., & Ibrahem, M. I. (2022). Data Privacy Preservation and Security in Smart Metering Systems. Energies, 15(19). https://doi.org/10.3390/en15197419.

Asghar, M. R., Dán, G., Miorandi, D., & Chlamtac, I. (2017). Smart Meter Data Privacy: A Survey. IEEE Communications Surveys & Tutorials, 19(4), 2820-2835. https://doi.org/10.1109/COMST.2017.2720195.

Choudhary, S., & Panwar, C. (2014). Key Based Image Steganography Using Dwt and Chaotic Map. International Journal of Engineering and Management Research (IJEMR), 4(4), 94-97.

Dong, R., Hao, S., Yang, T. H., Tang, Z., Yan, Y., & Chen, J. (2021). Recent Advances in Smart Meter : Data Analysis, Privacy Preservation and Applications. In International Conference on Big Data and Security. Singapore : Springer Singapore, 105-114. https://doi.org/10.1007/978-981-19-0852-1_8.

Ferrag, M. A., Maglaras, L. A., Janicke, H., Jiang, J., & Shu, L. (2018). A Systematic Review of Data Protection and Privacy Preservation Schemes for Smart Grid Communications. Sustainable Cities and Society, 38, 806-835. https://doi.org/10.1016/j.scs.2017.12.041.

Hossain, M. B., Natgunanathan, I., Xiang, Y., & Zhang, Y. (2021). Cost-Friendly Differential Privacy of Smart Meters Using Energy Storage and Harvesting Devices. IEEE Transactions on Services Computing, 15(5), 2648-2657. https://doi.org/10.1109/TSC.2021.3081170.

Hossain, M. B., Natgunanathan, I., Xiang, Y., Yang, L. X., & Huang, G. (2019). Enhanced Smart Meter Privacy Protection Using Rechargeable Batteries. IEEE Internet of Things Journal, 6(4), 7079-7092. https://doi.org/10.1109/JIOT.2019.2914135.

Husain, S., & Shivani, K. (2018). A Study of Properties of Soft Set and its Applications. International Research Journal of Engineering and Technology (IRJET), 5(01), 2395-0056.

Husain, S., Kumari, A., & Tyagi, V. K. (2022). An Approach to Group Decision Problems Using Fuzzy-soft-set Theory and Lambda Cuts. International Journal of Early Childhood Special Education (INT-JECSE), 14(08). https://doi.org/10.48047/INTJECSE/V14I8.

Husain, S., Tyagi, V. K., & Gupta, M. K. (2022). A Fuzzy Soft Set-Theoretic New Methodology to Solve Decision-Making Problems. In Electronic Systems and Intelligent Computing : Proceedings of ESIC 2021. Singapore : Springer Nature Singapore, 671-683.

Mouachi, R., Ait-Mlouk, A., Gharnati, F., & Raoufi, M. (2017). A Choice of Symmetric Cryptographic Algorithms Based on Multi-Criteria Analysis Approach for Securing Smart Grid. Indian Journal of Science and Technology, 10, 39. https://dx.doi.org/10.17485/ijst/2017/v10i39/119856.

Natgunanathan, I., Hossain, M. B., Xiang, Y., Gao, L., Peng, D., & Li, J. (2019). Progressive Average-Based Smart Meter Privacy Enhancement Using Rechargeable Batteries. IEEE Internet of Things Journal, 6(6), 9816-9828. https://dx.doi.org/10.1109/JIOT.2019.2932085.

Wang, Y., Chen, Q., Hong, T., & Kang, C. (2018). Review of Smart Meter Data Analytics : Applications, Methodologies, and Challenges. IEEE Transactions on Smart Grid, 10(3), 3125-3148. https://dx.doi.org/10.1109/TSG.2018.2818167.

Zhu, L., Zhang, Z., Qin, Z., Weng, J., & Ren, K. (2016). Privacy Protection Using a Rechargeable Battery for Energy Consumption in Smart Grids. IEEE Network, 31(1), 59-63. https://dx.doi.org/10.1109/MNET.2016.1500292NM.

Downloads

Published

2023-11-04

How to Cite

Choudhary, S., & Husain, S. (2023). IMAGE STEGANOGRAPHY USING TWO LAYER SECURITY ALGORITHMS. International Journal of Engineering Science Technologies, 7(5), 80–87. https://doi.org/10.29121/ijoest.v7.i5.2023.549