TY - GEN
T1 - Pixel and Block Permutation on Combinations of Bit Planes with LSB Steganography
AU - Rodrigues, Marline Priyanka
AU - Prabhu, Srikanth
PY - 2018/12
Y1 - 2018/12
N2 - Protecting confidential information from getting into the hands of intruders has been a matter of concern since ancient times. With the increasing advances in technology and computing resources, researchers have been proposing techniques with varied objectives to serve the current requirements of data communication. Also, advances in security techniques also face the threat of advances in attacks by intruders. While encrypting the data before transfer was enough to provide security, intruders were capable of breaking the code and hence multiple layers of security became the need of the hour. This paper proposes dual permutation of image applied on a group of four of the bit planes. First, using Rubik's cube principle for pixel permutation and second using block permutation. Thus, the correlation between pixels and blocks is reduced significantly in the encrypted image which is evident from the correlation coefficient. Encryption followed by Steganography using LSB substitution provides the third layer of security at the bit level.
AB - Protecting confidential information from getting into the hands of intruders has been a matter of concern since ancient times. With the increasing advances in technology and computing resources, researchers have been proposing techniques with varied objectives to serve the current requirements of data communication. Also, advances in security techniques also face the threat of advances in attacks by intruders. While encrypting the data before transfer was enough to provide security, intruders were capable of breaking the code and hence multiple layers of security became the need of the hour. This paper proposes dual permutation of image applied on a group of four of the bit planes. First, using Rubik's cube principle for pixel permutation and second using block permutation. Thus, the correlation between pixels and blocks is reduced significantly in the encrypted image which is evident from the correlation coefficient. Encryption followed by Steganography using LSB substitution provides the third layer of security at the bit level.
UR - http://www.scopus.com/inward/record.url?scp=85070389268&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85070389268&partnerID=8YFLogxK
U2 - 10.1109/CSITSS.2018.8768795
DO - 10.1109/CSITSS.2018.8768795
M3 - Conference contribution
T3 - Proceedings 2018 3rd International Conference on Computational Systems and Information Technology for Sustainable Solutions, CSITSS 2018
SP - 145
EP - 150
BT - Proceedings 2018 3rd International Conference on Computational Systems and Information Technology for Sustainable Solutions, CSITSS 2018
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 3rd International Conference on Computational Systems and Information Technology for Sustainable Solutions, CSITSS 2018
Y2 - 20 December 2018 through 22 December 2018
ER -