An Information Security System Based on Optimized Pixel Mapping Method

  • Su Mon Thu Mandalay Technological University, Mandalay and 100/107, Myanmar
  • Khin Myo Thant Mandalay Technological University, Mandalay and 100/107, Myanmar
Keywords: Cryptography, Steganography, SHA-512, BREA, OPMM, Embedding Capacity, PSNR.


In the field of communication system and internet, the information security is playing a crucial role. At the present time, communication through Internet is becoming popular and it should be accurate and secure. To make it reality, cryptography is very useful tool to protect the content of confidential data in many research areas. Another one, steganography is also commonly used to hide the existence of data into cover media known as text, image, audio and video. In this work, it is considered that the two most popular techniques (Cryptography and Steganography) should be combined to develop the strong and robust security system. At first, confidentiality and message authentication requirements are fulfilled with the help of Byte-Rotation Encryption Algorithm (BREA) and Secure Hash Algorithm-512(SHA-512). On the other hand, a new data hiding approach based on the optimization of Pixel Mapping Method (OPMM) also provides the system the higher embedding capacity with minimum degradation of stego image quality. To analyze the performance of the proposed OPMM, the comparison is also presented in terms of embedding capacity and Peak Signal to Noise Ratio (PSNR) values.


[1] Menezes, Alfred , Paul C van Oorschot, Scott A.Vanstone. Handbook of Applied Cryptography. Canada: Waterloo University, 1996, pp.1-816.
[2] William Stallings. Cryptography and Network Security: Principles and practices. India: Prentice Hall in Pearson education, 2002, pp. 1- 681.
[3] Davida M. Chapman and M. Rennhard. “A practical and effective approach to large-scale automated linguistic steganography,” in Proc . The Information Security Conference, 2001, pp.156–165.
[4] Kran Bailey Kevin Curran. “An Evaluation of Image Based Steganography Methods.” The International Journal of Digital Evidence, vol. 2, pp.1-40, 2003.
[5] Jr. L. M. Marvel, C. G. Boncelet and C. T. Retter. “Spread Spectrum Image Steganography.” The International Journal of IEEE Transactions on Image Processing, vol. 8, pp.1-11, February.1999.
[6] Nasir Memon R. Chandramouli. “Analysis of lsb based image steganography techniques,” In Proc.IEEE ICIP, 2001, pp.1-8.
[7] William Stallings. Cryptography and Network Security: Principles and Practices. India: Prentice Hall in Pearson Education, 2005, pp.1-679.
[8] Sunita Bhati, Anita Bhati and S. K. Sharma. “A new approach towards encryption schemes: byte – rotation encryption algorithm,” In Proc. the World Congress on Engineering and Computer Science, San Francisco, USA, 2012, pp.1-4.
[9] Souvik Bhattacharyya and Gautam Sanyal, “A data hiding model with high security features combining finite state machines and PMM method.” The International Journal of International Scholarly and Scientific Research & Innovation, vol. 4, pp. 324–331, October. 2010.
[10] Parvinder Singh and Prince Kumar Panjabi. “An Enhanced Data Hiding Approach Using Pixel Mapping Method with Optimal Substitution Approach.” The International Journal of Computer Applications, vol. 74, pp. 36–43, July. 2013.