Multilevel Steganography for Data Protection

Sourabh Tyagi, Priyanka Anurag, Smitha N. Pai

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Nowadays, the world is changing very fast. In this world, there are many technologies that are being developed to protect the data from the outer world. Here the outer world is referred to a hacker or the third man who is in between one end user and the other end user. There is many software’s which protects and transfers the data from the one machine to another machine or from one user to the other user, as in mobile phones, laptop, IoT devices, cloud, etc. There are also many algorithms and techniques, which protect data from unauthorized accesses. One of the techniques is called stenography. Two levels of data protection are carried out in the current proposed model. One is image stenography and another one is video stenography. Here, the text is encrypted by using digital encryption system (DES). The encrypted data is embedded in the image by using the LSB technique. The stegano image is converted to the base 16 in text format and embedded on to the video by using the frame converting technique. This process is called the multilevel stenography where the data is processed by two stenography techniques, i.e., image stenography and video stenography. This increases the security of data and the data is easily transmitted from one machine to the other machine providing multilevel security.

Original languageEnglish
Title of host publicationAmbient Communications and Computer Systems - RACCCS-2018
EditorsYu-Chen Hu, Krishn K. Mishra, Munesh C. Trivedi, Shailesh Tiwari
PublisherSpringer Verlag
Pages461-472
Number of pages12
ISBN (Print)9789811359330
DOIs
Publication statusPublished - 01-01-2019
Externally publishedYes
EventInternational Conference on Recent Advancement in Computer, Communication and Computational Sciences, RACCCS 2018 - Ajmer, India
Duration: 10-08-201811-08-2018

Publication series

NameAdvances in Intelligent Systems and Computing
Volume904
ISSN (Print)2194-5357

Conference

ConferenceInternational Conference on Recent Advancement in Computer, Communication and Computational Sciences, RACCCS 2018
CountryIndia
CityAjmer
Period10-08-1811-08-18

Fingerprint

Steganography
Data privacy
Security of data
Mobile phones
Cryptography
Internet of things

All Science Journal Classification (ASJC) codes

  • Control and Systems Engineering
  • Computer Science(all)

Cite this

Tyagi, S., Anurag, P., & Pai, S. N. (2019). Multilevel Steganography for Data Protection. In Y-C. Hu, K. K. Mishra, M. C. Trivedi, & S. Tiwari (Eds.), Ambient Communications and Computer Systems - RACCCS-2018 (pp. 461-472). (Advances in Intelligent Systems and Computing; Vol. 904). Springer Verlag. https://doi.org/10.1007/978-981-13-5934-7_41
Tyagi, Sourabh ; Anurag, Priyanka ; Pai, Smitha N. / Multilevel Steganography for Data Protection. Ambient Communications and Computer Systems - RACCCS-2018. editor / Yu-Chen Hu ; Krishn K. Mishra ; Munesh C. Trivedi ; Shailesh Tiwari. Springer Verlag, 2019. pp. 461-472 (Advances in Intelligent Systems and Computing).
@inproceedings{a0cd4056686a406888d0f7ed0494f3c0,
title = "Multilevel Steganography for Data Protection",
abstract = "Nowadays, the world is changing very fast. In this world, there are many technologies that are being developed to protect the data from the outer world. Here the outer world is referred to a hacker or the third man who is in between one end user and the other end user. There is many software’s which protects and transfers the data from the one machine to another machine or from one user to the other user, as in mobile phones, laptop, IoT devices, cloud, etc. There are also many algorithms and techniques, which protect data from unauthorized accesses. One of the techniques is called stenography. Two levels of data protection are carried out in the current proposed model. One is image stenography and another one is video stenography. Here, the text is encrypted by using digital encryption system (DES). The encrypted data is embedded in the image by using the LSB technique. The stegano image is converted to the base 16 in text format and embedded on to the video by using the frame converting technique. This process is called the multilevel stenography where the data is processed by two stenography techniques, i.e., image stenography and video stenography. This increases the security of data and the data is easily transmitted from one machine to the other machine providing multilevel security.",
author = "Sourabh Tyagi and Priyanka Anurag and Pai, {Smitha N.}",
year = "2019",
month = "1",
day = "1",
doi = "10.1007/978-981-13-5934-7_41",
language = "English",
isbn = "9789811359330",
series = "Advances in Intelligent Systems and Computing",
publisher = "Springer Verlag",
pages = "461--472",
editor = "Yu-Chen Hu and Mishra, {Krishn K.} and Trivedi, {Munesh C.} and Shailesh Tiwari",
booktitle = "Ambient Communications and Computer Systems - RACCCS-2018",
address = "Germany",

}

Tyagi, S, Anurag, P & Pai, SN 2019, Multilevel Steganography for Data Protection. in Y-C Hu, KK Mishra, MC Trivedi & S Tiwari (eds), Ambient Communications and Computer Systems - RACCCS-2018. Advances in Intelligent Systems and Computing, vol. 904, Springer Verlag, pp. 461-472, International Conference on Recent Advancement in Computer, Communication and Computational Sciences, RACCCS 2018, Ajmer, India, 10-08-18. https://doi.org/10.1007/978-981-13-5934-7_41

Multilevel Steganography for Data Protection. / Tyagi, Sourabh; Anurag, Priyanka; Pai, Smitha N.

Ambient Communications and Computer Systems - RACCCS-2018. ed. / Yu-Chen Hu; Krishn K. Mishra; Munesh C. Trivedi; Shailesh Tiwari. Springer Verlag, 2019. p. 461-472 (Advances in Intelligent Systems and Computing; Vol. 904).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - Multilevel Steganography for Data Protection

AU - Tyagi, Sourabh

AU - Anurag, Priyanka

AU - Pai, Smitha N.

PY - 2019/1/1

Y1 - 2019/1/1

N2 - Nowadays, the world is changing very fast. In this world, there are many technologies that are being developed to protect the data from the outer world. Here the outer world is referred to a hacker or the third man who is in between one end user and the other end user. There is many software’s which protects and transfers the data from the one machine to another machine or from one user to the other user, as in mobile phones, laptop, IoT devices, cloud, etc. There are also many algorithms and techniques, which protect data from unauthorized accesses. One of the techniques is called stenography. Two levels of data protection are carried out in the current proposed model. One is image stenography and another one is video stenography. Here, the text is encrypted by using digital encryption system (DES). The encrypted data is embedded in the image by using the LSB technique. The stegano image is converted to the base 16 in text format and embedded on to the video by using the frame converting technique. This process is called the multilevel stenography where the data is processed by two stenography techniques, i.e., image stenography and video stenography. This increases the security of data and the data is easily transmitted from one machine to the other machine providing multilevel security.

AB - Nowadays, the world is changing very fast. In this world, there are many technologies that are being developed to protect the data from the outer world. Here the outer world is referred to a hacker or the third man who is in between one end user and the other end user. There is many software’s which protects and transfers the data from the one machine to another machine or from one user to the other user, as in mobile phones, laptop, IoT devices, cloud, etc. There are also many algorithms and techniques, which protect data from unauthorized accesses. One of the techniques is called stenography. Two levels of data protection are carried out in the current proposed model. One is image stenography and another one is video stenography. Here, the text is encrypted by using digital encryption system (DES). The encrypted data is embedded in the image by using the LSB technique. The stegano image is converted to the base 16 in text format and embedded on to the video by using the frame converting technique. This process is called the multilevel stenography where the data is processed by two stenography techniques, i.e., image stenography and video stenography. This increases the security of data and the data is easily transmitted from one machine to the other machine providing multilevel security.

UR - http://www.scopus.com/inward/record.url?scp=85064574747&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85064574747&partnerID=8YFLogxK

U2 - 10.1007/978-981-13-5934-7_41

DO - 10.1007/978-981-13-5934-7_41

M3 - Conference contribution

SN - 9789811359330

T3 - Advances in Intelligent Systems and Computing

SP - 461

EP - 472

BT - Ambient Communications and Computer Systems - RACCCS-2018

A2 - Hu, Yu-Chen

A2 - Mishra, Krishn K.

A2 - Trivedi, Munesh C.

A2 - Tiwari, Shailesh

PB - Springer Verlag

ER -

Tyagi S, Anurag P, Pai SN. Multilevel Steganography for Data Protection. In Hu Y-C, Mishra KK, Trivedi MC, Tiwari S, editors, Ambient Communications and Computer Systems - RACCCS-2018. Springer Verlag. 2019. p. 461-472. (Advances in Intelligent Systems and Computing). https://doi.org/10.1007/978-981-13-5934-7_41