A Survey on Crypto-Steganographic Schemes and A Use Case in Healthcare System

Main Article Content

Mei Ling Phang
Swee Huay Heng

Abstract

Information sharing has become prevalent due to the expansion of social networking in this 21st century. However, electronic devices are vulnerable to various kinds of attacks. Information might be disclosed, modified and accessed by an unauthorised third party which consequently leads to the breach of confidentiality, integrity and availability of the information. Therefore, it is of utmost importance to employ the technology of cryptography and steganography to protect information assets. Cryptography and steganography have weaknesses when they are working alone. Therefore, crypto-steganography, the combination of cryptography and steganography are introduced to overcome the weaknesses in order to provide a double layer of security and protection. This paper provides a general overview of steganography and cryptography as well as a comparison analysis of different crypto-steganographic schemes. A secure crypto-steganographic system for healthcare is then developed with the implementation and integration of the secure crypto-steganographic scheme proposed by Juneja and Sandhu. This healthcare system enables users to store and deliver message in a more secure way while achieving the main goals of both cryptography and steganography.

Article Details

Section
Articles

References

[1] H. Rout and B. Kishore Mishra, “Pros and Cons of Cryptography, Steganography and Perturbation techniques,” IOSR J. Electron. Commun. Eng., no. December, pp. 2278–2834, 2015.
[2] R. Mishra and P. Bhanodiya, “A Review on Steganography and Cryptography,” Conference Proceeding - 2015 International Conference on Advances in Computer Engineering and Applications (ICACEA), pp. 119–122, 2015.
[3] R. Tripathi and S. Agrawal, “Comparative Study of Symmetric and Asymmetric Cryptography,” Int. J. Adv. Found. Res. Comput., vol. 1, no. 6, pp. 2348–4853, 2014.
[4] A. Febryan, T. W. Purboyo and R. E. Saputra, “Steganography Methods on Text , Audio , Image and Video: A Survey,” Int. J. Appl. Eng. Res., vol. 12, no. 21, pp. 10485–10490, 2017.
[5] J. R. Krenn, “Steganography and Steganalysis,” https://www.krenn.nl/univ/cry/steg/article.pdf, no. January, 2004.
[6] M. Kalita, “A Comparative Study of Steganography Algorithms of Spatial and Transform Domain,” Int. J. Comp. App., pp. 9–14, 2015.
[7] J. Kour and D. Verma, “Steganography Techniques: A Review,” Int. J. Emerg. Res. Manag. & Technol., vol. 3, no. 5, pp. 132–135, 2014.
[8] M. Juneja and P. S. Sandhu, “A New Approach for Information Security using an Improved Steganography Technique,” J. Inf. Process. Syst., vol. 9, no. 3, pp. 405–424, 2013.
[9] S. C. Sumathi, T. Santanam and G. Umamaheswari, “A Study of Various Steganographic Techniques Used for Information Hiding,” Int. J. Comput. Sci. Eng. Surv., vol. 4, no. 6, pp. 9–25, 2013.
[10] P. S. Anju, B. Kuriakose and V. Paul, “A Survey on Steganographic Methods Used in Information Hiding,” Int. J. Sci. Eng. Comput. Technol., vol. 6, no. 1, pp. 27, 2016.
[11] H. Nurdiyanto and R. Rahim, “Enhanced Pixel Value Differencing Steganography with Government Standard Algorithm,” 2017 3rd Int. Conf. on Sci. in Inf. Technol., pp. 366–371, 2017.
[12] H. Tseng and H. Leng, “A Steganographic Method Based on Pixel-Value Differencing and the Perfect Square Number,” J. Appl. Maths., vol. 2013, pp. 1–8, 2013.
[13] K. Joshi and R. Yadav, “A new LSB-S Image Steganography Method blend with Cryptography for Secret Communication,” Proc. 2015 3rd Int. Conf. Image Inf. Process ( ICIIP), pp. 86–90, 2016.
[14] M. Juneja and P. S. Sandhu, “Designing of Robust Image Steganography Technique Based on LSB Insertion and Encryption,” 2009 Int. Conf. on Advances in Recent Technol. in Comm. and Comp., pp. 302–305, 2009.
[15] A. Kumar and R. Sharma, “A Secure Image Steganography Based on RSA Algorithm and Hash-LSB Technique,” Int. J. of Adv. Res. in Comp. Sci. and Soft. Eng., vol. 3, no. 7, pp. 363–372, 2013.
[16] K. Dasgupta, J. K. Mandal and P. Dutta, “Hash Based Least Significant Bit Technique for Video Steganography (HLSB),” Int. J. Secur. Priv. Trust Manag. ( IJSPTM), vol. 1, no. 2, pp. 1–11, 2012.
[17] M. R. Islam, A. Siddiqa, M. P. Uddin, A. K. Mandal and M. D. Hossain, “An Efficient Filtering Based Approach Improving LSB Image Steganography using Status Bit along with AES cryptography,” 2014 Int. Conf. Informatics, Electron. Vision (ICIEV), 2014.
[18] H. A. Prajapati and D. N. G. Chitaliya, “Secured and Robust Dual Image Steganography: A Survey,” Int. J. Innov. Res. Comput. Commun. Eng., vol. 3, no. 1, pp. 30–37, 2015.
[19] N. Rashmi and K. Jyothi, “An Improved Method for Reversible Data Hiding Steganography Combined with Cryptography,” Proc. 2nd Int. Conf. Inven. Syst. Control.( ICISC), no. Icisc, pp. 81–84, 2018.
[20] D. Hou, W. Zhang, J. Liu, S. Zhou, D. Chen and N. Yu, “Emerging Applications of Reversible Data Hiding,” ACM Int. Conf. Proceeding Ser., vol. Part F1477, pp. 105–109, 2019.
[21] H. Antonio, P. W. C. Prasad and A. Alsadoon, “Implementation of Cryptography in Steganography for Enhanced Security,” Multimed. Tools Appl., 2019.
[22] M. O. Rahman, M. K. Hossen, G. Morsad and A. Chandra, “An Approach for Enhancing Security of Cloud Data using Cryptography and Steganography with E-LSB Encoding Technique,” IJCSNS Int. J. Comput. Sci. Netw. Secur., vol. 18, no. 9, pp. 85–93, 2018.
[23] P. Miklós, “Comparison of Spatial and Frequency Domain Image Compression Methods,” 4th Int. Conf. Work. Mechatronics Pract. Educ. – MECHEDU 2017, pp. 57–60, 2017.
[24] E. Eltyeb, “Comparison of LSB Steganography in BMP and JPEG Images,” Int. J. Soft Comput. Eng., vol. 3, no. 5, pp. 91–95, 2013.
[25] R. R. Sindhu M, “Images and Its Compression Techniques – A Review,” Int. J. Recent Trends Eng. Technol., vol. 2, no. 4, pp. 71–75, 2009.
[26] A. Cheddad, J. Condell, K. Curran and P. Mc Kevitt, “Digital Image Steganography: Survey and Analysis of Current Methods,” Signal Processing, vol. 90, no. 3, pp. 727–752, 2010.
[27] N. T. Courtois, “Security Evaluation of GOST 28147-89 in View of International Standardisation,” Cryptologia, vol. 36, no. 1, pp. 2–13, 2012.
[28] N. Qi , W. Wei, J. Zhang, W. Wang, J. Zhao, J. Li, P. Shen, X. Yin, X. Xiao and Jie Hu, “Analysis and Research of the RSA Algorithm,” Inf. Technol. J., vol. 12, pp. 1818-1824, 2013.
[29] M. Nazeh, A. Wahid, A. Ali and M. Marwan, “A Comparison of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish for Guessing Attacks Prevention,” J. Comp. Sci. Appl. Inf. Technol., pp. 1–7, 2018.
[30] P. Patil, P. Narayankar, D. G. Narayan and S. M. Meena, “A Comprehensive Evaluation of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish,” Procedia Comput. Sci., vol. 78, no. December 2015, pp. 617–624, 2016.
[31] J. Canny, “A Computational Approach to Edge Detection.,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 8, no. 6, pp. 679–698, 1986.
[32] P. E. Queneau, “Method and Means for Recognizing Complex Patterns,” U.S. Pat. 3.069.654, 1962.
[33] “The Rods and Cones of the Human Eye.” [Online]. Available: http://hyperphysics.phy-astr.gsu.edu/hbase/vision/rodcone.html. [Accessed: 30-May-2019].
[34] R. T. Houzz, “How to Organize your Kitchen — and Enjoy Cooking in It | Valley Life | argusobserver.com.” [Online]. Available: https://www.argusobserver.com/valley_life/how-to-organize-your-kitchen-and-enjoy-cooking-in-it/article_1959efd0-9fe3-11e8-a135-f3c020d54df5.html. [Accessed: 30-Jan-2019].