The combination of steganography and cryptographic approaches for information concealing has piqued the curiosity of numerous researchers. We also integrate those two methods in our research. Using Fernet symmetric encryption and odd-even pixel alteration, this research presents a novel method for image steganography that distributes the data equally throughout the image. To create a stego image, the sender uses a password to encrypt a secret message embedded into an image's red channel. The stego image resembles the original cover image, while the underlying secret data is concealed from human view. The main goals of the system—encryption, consistent data concealing, and message retrieval—were all successfully met. Before integrating the secret data into the image, it can be easily and successfully secured using symmetric encryption using the Fernet cipher. By adding another layer of security to the system, the password feature makes it harder for unauthorized users to access hidden data. By altering image pixels according to whether they are odd or even, the odd-even pixel modification-based steganography approach makes it possible to conceal data. Based on the experiment's results, it can be concluded that this approach embeds concise messages with a high visual quality.
References
Kadhim, I.J., Premaratne, P., Vial, P.J. and Halloran, B. Comprehensive survey of image steganography: Techniques, Evaluations, and trends in future research. Neurocomputing 2019, 335, 299–326.
Sultana, H.; Kamal, A. An Edge Detection Based Reversible Data Hiding Scheme. In Proceedings of the 2022 IEEE Delhi Section Conference (DELCON), New Delhi, India, 11–13 February 2022; IEEE: Piscataway, NJ, USA, 2022; pp. 1–6.
Reddy, V. L., Subramanyam, A. and Reddy, P. C. Implementation of LSB steganography and its evaluation for various file formats. Int. J. Advanced Networking and Applications, 2011, pp. 868--872.
Thangadurai, K and Devi, G. S. An analysis of LSB based image steganography techniques. 2014 international conference on computer communication and informatics. 2014, pp. 1-4.
Goel, S., Rana, A. and Kaur, M. A review of comparison techniques of image steganography. Global Journal of Computer Science and Technology, 2013, pp. 9-14.
Hashim, M.M., Abdulrazzaq, A.A., Rahim, M.S.M, Taha, M.S., Khalid, H.N., and lafta, S.A.S. Improvement of image steganography scheme based on LSB value with two control random parameters and multi-level encryption. IOP Conference Series: Materials Science and Engineering. s.l. : IOP Publishing, 2019, p. 052002.
Fateh, M., Rezvani, M. and Irani, Y. A new method of coding for steganography based on LSB matching revisited. Security and Communication Networks, 2021, pp. 1--15.
Ali, U., Sohrawordi, M. and Uddin, M. P. A robust and secured image steganography using LSB and random bit substitution. American Journal of Engineering Research (AJER), 2019, pp. 39--44.
Neeta, D., Snehal, K. and Jacobs, D. Implementation of LSB steganography and its evaluation for various bits. 2006 1st international conference on digital information management, 2006, pp. 173--178.
Fridrich, J., Goljan, M. and Du, R. Detecting LSB steganography in color, and gray-scale images. IEEE multimedia, 2001, pp. 22--28.
Fkirin, A., Attiya, G. and El-Sayed, A. Steganography literature survey, classification and comparative study. Communications on Applied Electronics, 2016, pp. 13--22.
Djebbar, Fatiha, A., Beghdad, M., Karim, A. and Hamam, H. Comparative study of digital audio steganography techniques. EURASIP Journal on Audio, Speech, and Music Processing, 2012, pp. 1--16.
Liu, Y., Liu, S., Wang, Y., Zhao, H. and Liu, S. Video steganography: A review. Neurocomputing, 2019, pp. 238--250.
Krishnan, Thandra,R.B., P Kumar, P. and Baba, M.S. steganography, An overview of text. 2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN), 2017, pp. 1--6.
Setiadi, De Rosal Igantius Moses. PSNR vs SSIM: imperceptibility quality assessment for image steganography. Multimedia Tools and Applications, 2021, pp. 8423--8444.
Mukherjee, S. and Sanyal, G. Edge based image steganography with variable threshold. Multimedia Tools and Applications, 2019, pp. 16363--16388.
Qian, Y., Dong, J., Wang, W. and Tan, T. Deep learning for steganalysis via convolutional neural networks. Media Watermarking, Security, and Forensics, 2015, pp. 171--180.
Reddy, H. M., Sathisha, N., Kumari, A. and Raja, KB. Secure steganography using hybrid domain technique. 2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12), 2012, pp. 1--11.
Guo, L., Ni, J., Su, W., Tang, C. and Shi, Y. Using statistical image model for JPEG steganography: Uniform embedding revisited. IEEE Transactions on Information Forensics and Security, 2015, pp. 2669--2680.
Cogranne, R., Giboulot, Q. and Bas, P. The ALASKA Steganalysis Challenge: A First Step Towards Steganalysis. Proceedings of the ACM Workshop on Information Hiding and Multimedia Security (IH&MMSec'2019), 2019, pp. 125--137.
Dang-Nguyen, D.T., Pasquini, C., Conotter, V. and Boato, G. RAISE – A Raw Images Dataset for Digital Image Forensics. Proceedings of ACM Multimedia Systems, 2015.
Gloe, T. and Bohme, R. The 'Dresden Image Database' for Benchmarking Digital Image Forensics. Proceedings of the 25th Symposium on Applied Computing (ACM SAC 2010). 2010, pp. 1585--1591.
Newman, J. and Lin, L. and Chen, W. and Reinders, S. and Wang, Y. and Wu, M. and Guan, Y. StegoAppDB: a Steganography Apps Forensics Image Database. Proceedings of Media Watermarking, Security, and Forensics (MWSF'2019), Part of IS&T International Symposium on Electronic Imaging (EI'2019). 2019.
Subsol, H. R., Mehdi, Y., Marc, C., Frédéric, C. and Gérard. LSSD: A Controlled Large JPEG Image Database for Deep-Learning-based Steganalysis ''into the Wild''. Proceedings of the 25th International Conference on Pattern Recognition (ICPR'2021), Workshop on Multi Media FOR ensics in the WILD (MMForWILD'2021). s.l.: Springer, 2021, pp. 470--483.