z-logo
open-access-imgOpen Access
Two Stage Steganography on Compressed and Encrypted Message
Author(s) -
Kamal Jadidy Aval,
Masumeh Damrudi
Publication year - 2021
Publication title -
international journal of circuits, systems and signal processing
Language(s) - English
Resource type - Journals
ISSN - 1998-4464
DOI - 10.46300/9106.2021.15.54
Subject(s) - steganography , computer science , huffman coding , steganography tools , encryption , cryptography , lossless compression , peak signal to noise ratio , least significant bit , computer security , data compression , theoretical computer science , algorithm , artificial intelligence , embedding , image (mathematics) , operating system
Security of confidential information in the insecure era of information transmission (Internet) is still one of the most important challenges of the day. The combination of cryptography and steganography increases the security of embedded data to avoid from unauthorized access. Furthermore, compression of secret data reduces the size of transmitted message. In addition to compression and encryption, in this paper, two stage steganography is employed to enhance the security. In the proposed approach, the Huffman coding as lossless compression, the Blowfish, DES, 3DES, AES, and RSA as cryptography algorithms and LSB (Least significant Bit) as steganography technique are employed with enhancement of security by two stage steganography. The results are analyzed through quality parameters including MSE (Mean Square Error) and PSNR (Peak Signal to Noise Ratio), and histogram of images.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here