Abstract
Data security is a major issue in computer science and information technology. In the cloud computing environment, it is a serious issue because data is located in different places. In the cloud, environment data is maintained by the third party so it is harder to maintain security for user’s data. There is a prominent need for security for cloud data, so we proposed an approach which provides better results as compared to previous approaches. In this work, we tried to secure the data by using image steganography partition random edge-based technique. In the next step, partition the original image into a number of parts, apply edge-based algorithms, select random pixels (prime number-based pixels) from each part, and insert the data into them. The performance of this proposed analysis is calculated by using MSE and PSNR values. Results are good as compared to several existing edge-based algorithms of image steganography.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Anderson RJ, Petitcolas FAP (1998) On the limits of steganography. IEEE J Sel Areas Commun 16(4):474–481
Chandramouli R, Memon N (2001) Analysis of LSB based image steganography techniques. In: Proceedings 2001 international conference on image processing, vol 3. IEEE, New York
Christina L, VS Joe Irudayaraj (2014) Optimized blowfish encryption technique. IJIRCCE 2:2320–9798
Provos N, Honeyman P (2003) Hide and seek: an introduction to steganography. IEEE Secur Priv 99(3):32–44
Patil P et al (2016) A comprehensive evaluation of cryptographic algorithms: DES, 3DES, AES, RSA and Blowfish. Procedia Comput Sci 78:617–624
Awwad YB, Shkoukani M (2017) The affect of genetic algorithms on blowfish symmetric Algorithm. IJCSNS 17(3):65
Sumathi CP, Santanam T, Umamaheswari G (2014) A study of various steganographic techniques used for information hiding. arXiv preprint arXiv:1401.5561
Van Cleeff A, Pieters W, Wieringa RJ (2009) Security implications of virtualization: a literature study. In: International conference on computational science and engineering, CSE’09, vol 3. IEEE, New York
Islam S, Modi MR, Gupta P (2014) Edge-based image steganography. EURASIP J Inf Sec 2014(1):8
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Suneetha, D., Kiran Kumar, R. (2019). Enhancement of Security for Cloud Data Using Partition-Based Steganography. In: Kulkarni, A., Satapathy, S., Kang, T., Kashan, A. (eds) Proceedings of the 2nd International Conference on Data Engineering and Communication Technology. Advances in Intelligent Systems and Computing, vol 828. Springer, Singapore. https://doi.org/10.1007/978-981-13-1610-4_21
Download citation
DOI: https://doi.org/10.1007/978-981-13-1610-4_21
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-1609-8
Online ISBN: 978-981-13-1610-4
eBook Packages: EngineeringEngineering (R0)