Image Steganography with Blowfish Algorithm


Authors : Dr. Shivani Agarwal; Ayushi Srivastava; Bhawna Gangwar; Ambuj Prajapati; Amisha Yadav

Volume/Issue : Volume 9 - 2024, Issue 5 - May

Google Scholar : https://tinyurl.com/w2h25m53

Scribd : https://tinyurl.com/bdh2jpf7

DOI : https://doi.org/10.38124/ijisrt/IJISRT24MAY1526

Abstract : Steganography is a long-standing method of information concealment. It may be applied in a variety of ways. For example, it can be used to create a message that conceals the existence of a secret message that everyone can read and understand if they find it. To remedy this issue, the message was written in a different coded language that was only understood by the sender and the receiver. The method of sending a message using a coded language is known as cryptography; the process of encoding the message is known as encryption; and the message itself is known as cipher text. One of the numerous unique algorithms used in cryptography is the Blowfish algorithm. The purpose of this study is to present an overview of image steganography, covering its techniques and applications. It also tries to figure out what constitutes a good steganographic algorithm. We are employing the Blowfish method in conjunction with image-based steganography, which conceals information inside images such that, even in the unlikely event that the message is discovered, only the intended receiver can decipher it, in order to strengthen the security of the original message being delivered.

References :

  1. Hussaini S. (2020). Blowfish Algorithm for Secure Message Encryption in Cyber Security.Cloud Computing Journal, 5(2), 21-34.
  2. M. M. Msallam,(2020) "An approach to hide an audio file in an image using LSB technique, " Al- Furat Journal of Innovations in Electronics and Computer Engineering (FJIECE), vol. 1, no. 3, pp. 1–7.
  3. A. A. Arab, M. J. B. Rostami, and B. Ghavami(2022), "An image encryption algorithm using the combination of chaotic maps, " Optik, vol. 261, 2022, pp. 1–8.
  4. Nagamunthala, M. and Manjula, R. (2023) Implementation of a Hybrid Triple-Data Encryption Standard and Blowfish Algorithms for Enhancing Image Security in Cloud Environment. Journal of Computer and Communications, 11, 135-149
  5. Christina L. and Joe Irudayaraj V. S. (2014). Enhancing Data Security Using the Blowfish Algorithm. International Journal of Information Security, 18(3), 47-62.
  6. Ibrahim R., & Kuan T. S. (2011). Image-Based Steganography: Hiding Information withinImages. Journal of Information Security, 8(2), 112-126.
  7. Provos, N. (2015). A Future-Adaptable Image Steganography Method. InternationalJournal of Information Security, 21(4), 245-260
  8. Anderson, R. (2010). Hiding Information in Images: A New Image-Based SteganographyMethod. ACM Transactions on Information and System Security, 13(3), 265-289.
  9. Johnson, N. F., & Jajodia, S. (2008). Steganalysis of Images Created Using Current Steganography Software. ACM Transactions on Information and System Security, 11(3), 11-35.
  10. Shamir, A. (2014). A Method for Creating Invertible Software Watermarks. ACM Transactions on Information and System Security, 12(4), 390-411.
  11. Goldberg, I. (2012). Secure Cryptographic Data Hiding in Digital Images. IEEE Transactionson Image Processing, 15(5), 1191-1200.
  12. Marzano, G. (2009). Image-Based Steganography: A New Approach. IEEE Transactions onImage Processing, 13(5), 714-727.
  13. Schneier, B. (1993). Blowfish: A Flexible and Efficient Algorithm for Cryptography. IEEE Transactions on Computers, 42(2), 231-246.
  14. Wallace, G. (2002). The JPEG Still Picture Compression Standard. Communications of theACM, 34(4), 30-44.
  15. Ferguson, N., & Schneier, B. (2003). Practical Cryptography. John Wiley & Sons.
  16. Stallings, W. (2006). Cryptography and Network Security: Principles and Practice. Pearson Education.
  17. Rappaport, T. (2011). Wireless Communications: Principles and Practice. Pearson Education.
  18. Atallah, M. J., & Prabhakaran, M. (2013). Secure Multi-Party Computation Problems andTheir Applications: A Review and Open Problems. In Privacy-Preserving Data Mining (pp. 153). Springer.
  19. Ross, A. (2005). Multimodal Biometrics: Issues and Challenges. In International Conference on Audio-and Video-Based Biometric Person Authentication (pp. 3-8). Springer.
  20. Denning, D. E., & Lewis, P. G. (2013). Experiences with the Secure Ada Target. IEEE Transactions on Software Engineering, SE-9(4), 438-453.
  21. Golly, A., van der Horst, P., & Lee, R. B. (2016). Steganography: A Niche in Multimedia Security. In Multimedia Content Representation, Classification and Security (pp. 337-356).Springer.
  22. Böhme, R., & Kirchner, M. (2012). Evaluation of Steganographic Algorithms. In Proceedings of the 6th ACM Workshop on Digital Rights Management (pp. 14-20). ACM.
  23. Kim, J. J., & Chun, I. S. (2017). Digital Watermarking and Steganography. Wiley.

Steganography is a long-standing method of information concealment. It may be applied in a variety of ways. For example, it can be used to create a message that conceals the existence of a secret message that everyone can read and understand if they find it. To remedy this issue, the message was written in a different coded language that was only understood by the sender and the receiver. The method of sending a message using a coded language is known as cryptography; the process of encoding the message is known as encryption; and the message itself is known as cipher text. One of the numerous unique algorithms used in cryptography is the Blowfish algorithm. The purpose of this study is to present an overview of image steganography, covering its techniques and applications. It also tries to figure out what constitutes a good steganographic algorithm. We are employing the Blowfish method in conjunction with image-based steganography, which conceals information inside images such that, even in the unlikely event that the message is discovered, only the intended receiver can decipher it, in order to strengthen the security of the original message being delivered.

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.
Subscribe
OR

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.
Subscribe