SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2749
Concealing of Deets using Steganography Technique
Sudha S1, Deebika G2, Dhivya L3, Assistant Professor Susan Mano Derry V4
1,2,3Students, Dept. of Electronics Engineering, Jeppiaar SRR Engineering College, Chennai, Tamil Nadu
4Assistant Professor, Dept. of Electronics Engineering, Jeppiaar SRR Engineering College, Chennai, Tamil Nadu
----------------------------------------------------------------------***---------------------------------------------------------------------
Abstract –The project proposes the enhancement of security
system for secret data communication through multi plane
image data embedding in image. A given input audio is
converted to any one plane process. After plane separation,
the data hider will conceal the secret data into the image
pixels. The data hiding technique uses the AES replacement
algorithm for concealing the secret message bits into the
input image. In the data extraction module, the secret data
will be extracted by using relevant key for choosing the
image pixels STEGO image to get the information about the
data. Finally the performance of this proposal in Color Image
and data hiding will be analyzed based on audio and data.
Key Words: Security, Multiplane image, AES
replacement algorithm, STEGO image, data hiding,
audio and data.
1. INTRODUCTION
Steganography is a method of hiding the information for
invisible communication. It is similar to cryptography,
where to secure communications from third parties by
make the data not understood, steganography techniques
is used to hide the message itself from an observer and
there is no knowledge of the existence of the message in
the first instant. In sometimes, the sended encrypted deets
will arise suspicion while invisible deets will not do
so. Both can be combined to produce better protection of
the deets. In this scenario, the steganography fails and the
deets cannot be find if a cryptography technique is used.
Hiding deets in audio format inside images is a new hiding
technique nowadays. An image with a secret information in
the form of audio inside can be easily spread over the
World Wide Web or in a news groups. To hide deets inside
an image without changing its visible nature, the main
source can be changed in noisy areas with many color
differences, so minimum attention will be need to the
modification.
2. OBJECTIVE
The objective of this project is to provide an efficient deets
concealing technique and encryption of the data in which
the image and the audio can be retrieved independently
without any loss. Hiding deets in image is the most
important technique of steganography. The method was to
conceal a secret deet in every nth letter of every word of a
text message. After the booming of Internet and various
types of digital file formats it got reduced in importance.
Text steganography using digital files is not used very often
because the text files have a very small amount of data
redundancies.
3. EXISTING SYSTEM
Cryptography is an existing physical technique that
scrambles the deets by rearranging and substitution of
body by making it unreadable to anyone except the
authorised person can capable of unscrambling it. With the
volume of sensitive Internet transaction that occurs daily,
the profit of securing the deets using cryptographic process
becoming a major goal for lot of organizations.
4. PROPOSED SYSTEM
Reversible encrypted deets concealing in encrypted audios
using chaos encryption, Asymmetric key encryption and
adaptive least significant bit replacement technique.
Steganography is used to hiding the cover deets in
unpredictable multimedia information and is often used in
secret communication between unknown parties.
Steganography is a method of encryption of hiding of deets
among the bits over a cover file, such as a text or an audio
file. This method replaced unused or insignificant bits with
the secret deets. Steganography is not as robust to attack
and hence the embedded deets are vulnerable to crack it.
5. BLOCK DIAGRAM
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2750
Fig -1: Block diagram
6. SYSTEM DESIGN
6.1. Encryption:
Encoding the contents of the deets in such a way that it
conceals its contents from the third person. Cipher text
results that it from plain text by applying the key for
encryption.
6.2. Decryption:
The process of recovering the cipher text to the plain text.
6.3. Key:
Encryption and decryption process usually make the use of
a key, and the coding method in decryption can be done
only by knowing the proper key. Hash function generates a
digest of the deets. Substitution of cipher text involves by
replacing an alphabet with another character of same
alphabet set. Mono-alphabet system uses a single alphabet
set for the substitution. Poly-alphabet system uses multiple
alphabet set for substitution.
7. METHODOLOGY
7.1. Encryption password:
The password doesn’t get embed in the image. The
password is used to influence how the hidden deets are to
be written. Then the end of user want to extract the
concealed deet, they must apply the password and the
password is used to hide the deets gets read back. If they
did not put the correct password, the deets retrieved will
not look right. If we put in enough error detective code, you
will detect it with relatively more probability whether the
deets was retrieved absolutely. The cover image save the
messages as a stego file. It will do the similar when user
want to extract the deets from stego image. The user needs
to give the right password.
7.2 Scanning:
A scanning pattern is a pattern by which the pixels are
accessed to embed the deets. Instead of embedding the first
k bit in first pixel, second k bits in second pixel and so on,
the deet bits are embed in pseudo-random order. We can
use three scan methods Raster scan method, snake scan,
and Z scan method. Each in both horizontal and vertical
position embedding schemes. In Raster horizontal
scanning, the concealed deets are embedded in row wise
manner. After embedding the deets in a row, the next row
is started scanning from the first pixel. In Raster scanning,
vertical scanning is done vertical and column wise manner.
7.3. Decryption method:
The activity of converting the deets from code into plain
text i.e., "a secret key or a password is required for
decryption". Decryption is the process for transformation
of data that has been unreadable and through encrypt back
to its unencrypted form. In decryption of data, the module
extracts and convert the garbled deets and transform it to
text to audio that are easily understandable and not only by
the reader, but it also by the system. Decryption process
may be accomplished by manually or automatically. It may
be also performed by a set of key or passwords.
7.4. S Box age:
The substitution of bytes one by one of the comparable
limited field is finished by the substitution tables. They
utilize the extended key capacities for the encryption and
decoding for the substitution.
7.5. Discover image:
In the s box age methodology the underlying advance is to
locate the opposite augmentation of all the limited field
components .The statement of locate the reverse is given in
the underlying advance, which is the information
parameter. The info byte and the modulo polynomial are to
be rearranged by ventures of the reversal method in the
posting.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2751
Hardware Requirements
 Processor : Any Processor above 2GHZ
 RAM : 2 GB
 Hard Disk : 250GB
 MATLAB is a logical programming language stage which
gives solid scientific help to actualizing of cutting edge
calculations. It is hence that MATLAB is generally utilized
by the picture handling and PC vision network. New
calculations are all around liable to be actualized first in
MATLAB, to be sure they may just be accessible in
MATLAB.
SAMPLE PICTURES:
3. CONCLUSION
The objective of the proposed steganography calculation
decline the blurred pixels in each edge so as to build the
installing limit. The proposed calculation is to improve the
implanting limit, keeps up the nature of the stego sound
progressively productive, basic, fitting and precise than
other calculation, just as it makes the mystery information
increasingly secure.
REFERENCES
1) R. Anderson and F. Petitcolas, "On the points of
confinement of steganography" IEEE Diary of Chose
Regions in Correspondences, Vol. 16, No. 4, May 1998.
2) Niels Provos, Dwindle Honeyman,"Hide and Look for: A
Prologue to Steganography," IEEE PC society, 2003.
3) K B Raja, Venugopal K R and L M Patnaik, "A Protected
Stegonographic Calculation utilizing LSB, DCT and Picture
Pressure on Crude Images",Technical Report, Bureau of
Software engineering and Building, College Visvesvaraya
School of Designing, Bangalore College, December 2004.
4) An outline of picture steganography by T. Morkel, J.H.P.
Eloff, M.S. Olivier. Data and PC Security Design (ICSA)
Exploration Gathering Branch of Software engineering
College of Pretoria, 0002, Pretoria, South Africa.
5) Johnson, N.F. Jajodia, S."Exploring Steganography: Seeing
the Inconspicuous", PC Diary, February 1998.
6)"Detecting LSB Steganography in Shading and Dark Scale
Pictures" Jessica Fridrich, Miroslav Goljan, and Rui Du State
College of New York, Binghamton.
7) Ran-Zan Wang, Chi-Tooth Lin, Ja-Chen Lin,"Hiding
information in pictures by ideal tolerably critical piece
substitution" IEE Electron. Lett. 36 (25) (2000) 20692070.
8)Hiding information in pictures by basic LSB substitution
by Chi-Kwong Chan, L.M. Cheng Bureau of PC Designing
and Data Innovation, City College of Hong Kong, Hong Kong
Got 17 May 2002.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2752
BIOGRAPHIES
Dhivya L
Pursuing Degree in Electronics and
Communication Engineering in
Jeppiaar SRR Engineering College,
Chennai, Tamil Nadu.
Susan Mano Derry V
M.E., Assistant Professor ECE in Jeppiaar SRR Engineering
college from Tamil Nadu, India.
Sudha S
Pursuing Degree in Electronics and
Communication Engineering in
Jeppiaar SRR Engineering College,
Chennai, Tamil Nadu.
Deebika G
Pursuing Degree in Electronics and
Communication Engineering in
Jeppiaar SRR Engineering College,
Chennai, Tamil Nadu.

More Related Content

What's hot

Review on Encrypted Image with Hidden Data Using AES Algorithm
Review on Encrypted Image with Hidden Data Using AES AlgorithmReview on Encrypted Image with Hidden Data Using AES Algorithm
Review on Encrypted Image with Hidden Data Using AES AlgorithmEECJOURNAL
 
Hiding text in audio using lsb based steganography
Hiding text in audio using lsb based steganographyHiding text in audio using lsb based steganography
Hiding text in audio using lsb based steganographyAlexander Decker
 
Hungarian-Puzzled Text with Dynamic Quadratic Embedding Steganography
Hungarian-Puzzled Text with Dynamic Quadratic Embedding SteganographyHungarian-Puzzled Text with Dynamic Quadratic Embedding Steganography
Hungarian-Puzzled Text with Dynamic Quadratic Embedding SteganographyIJECEIAES
 
Steganography using visual cryptography: Report
Steganography using visual cryptography: ReportSteganography using visual cryptography: Report
Steganography using visual cryptography: ReportAparna Nk
 
Conceptual design of edge adaptive steganography scheme based on advanced lsb...
Conceptual design of edge adaptive steganography scheme based on advanced lsb...Conceptual design of edge adaptive steganography scheme based on advanced lsb...
Conceptual design of edge adaptive steganography scheme based on advanced lsb...IAEME Publication
 
Android Based Image Steganography
Android Based Image SteganographyAndroid Based Image Steganography
Android Based Image Steganographyijtsrd
 
IRJET- An Overview of Steganography : Data Hiding Technique
IRJET-  	  An Overview of Steganography : Data Hiding TechniqueIRJET-  	  An Overview of Steganography : Data Hiding Technique
IRJET- An Overview of Steganography : Data Hiding TechniqueIRJET Journal
 
B03208016
B03208016B03208016
B03208016inventy
 
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...ijiert bestjournal
 
IRJET- Data Hiding in Digital Image using Steganography
IRJET-  	  Data Hiding in Digital Image using Steganography IRJET-  	  Data Hiding in Digital Image using Steganography
IRJET- Data Hiding in Digital Image using Steganography IRJET Journal
 
A RSA- DWT Based Visual Cryptographic Steganogrphy Technique by Mohit Goel
A RSA- DWT Based Visual Cryptographic Steganogrphy Technique by Mohit GoelA RSA- DWT Based Visual Cryptographic Steganogrphy Technique by Mohit Goel
A RSA- DWT Based Visual Cryptographic Steganogrphy Technique by Mohit GoelMohit Goel
 
Image Steganography V2 i11 0143
Image Steganography V2 i11 0143Image Steganography V2 i11 0143
Image Steganography V2 i11 0143Praneeta Dehare
 
Sample projectdocumentation
Sample projectdocumentationSample projectdocumentation
Sample projectdocumentationhlksd
 

What's hot (19)

Review on Encrypted Image with Hidden Data Using AES Algorithm
Review on Encrypted Image with Hidden Data Using AES AlgorithmReview on Encrypted Image with Hidden Data Using AES Algorithm
Review on Encrypted Image with Hidden Data Using AES Algorithm
 
A NOVEL APPROACHES TOWARDS STEGANOGRAPHY
A NOVEL APPROACHES TOWARDS STEGANOGRAPHYA NOVEL APPROACHES TOWARDS STEGANOGRAPHY
A NOVEL APPROACHES TOWARDS STEGANOGRAPHY
 
Hiding text in audio using lsb based steganography
Hiding text in audio using lsb based steganographyHiding text in audio using lsb based steganography
Hiding text in audio using lsb based steganography
 
Hungarian-Puzzled Text with Dynamic Quadratic Embedding Steganography
Hungarian-Puzzled Text with Dynamic Quadratic Embedding SteganographyHungarian-Puzzled Text with Dynamic Quadratic Embedding Steganography
Hungarian-Puzzled Text with Dynamic Quadratic Embedding Steganography
 
Steganography using visual cryptography: Report
Steganography using visual cryptography: ReportSteganography using visual cryptography: Report
Steganography using visual cryptography: Report
 
Conceptual design of edge adaptive steganography scheme based on advanced lsb...
Conceptual design of edge adaptive steganography scheme based on advanced lsb...Conceptual design of edge adaptive steganography scheme based on advanced lsb...
Conceptual design of edge adaptive steganography scheme based on advanced lsb...
 
Android Based Image Steganography
Android Based Image SteganographyAndroid Based Image Steganography
Android Based Image Steganography
 
IRJET- An Overview of Steganography : Data Hiding Technique
IRJET-  	  An Overview of Steganography : Data Hiding TechniqueIRJET-  	  An Overview of Steganography : Data Hiding Technique
IRJET- An Overview of Steganography : Data Hiding Technique
 
Steganography
SteganographySteganography
Steganography
 
B03208016
B03208016B03208016
B03208016
 
PVD BASED STEGNO.
PVD BASED STEGNO.PVD BASED STEGNO.
PVD BASED STEGNO.
 
4.content (stenography)
4.content (stenography)4.content (stenography)
4.content (stenography)
 
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
 
IRJET- Data Hiding in Digital Image using Steganography
IRJET-  	  Data Hiding in Digital Image using Steganography IRJET-  	  Data Hiding in Digital Image using Steganography
IRJET- Data Hiding in Digital Image using Steganography
 
A RSA- DWT Based Visual Cryptographic Steganogrphy Technique by Mohit Goel
A RSA- DWT Based Visual Cryptographic Steganogrphy Technique by Mohit GoelA RSA- DWT Based Visual Cryptographic Steganogrphy Technique by Mohit Goel
A RSA- DWT Based Visual Cryptographic Steganogrphy Technique by Mohit Goel
 
Ijetcas14 355
Ijetcas14 355Ijetcas14 355
Ijetcas14 355
 
Stegonoraphy
StegonoraphyStegonoraphy
Stegonoraphy
 
Image Steganography V2 i11 0143
Image Steganography V2 i11 0143Image Steganography V2 i11 0143
Image Steganography V2 i11 0143
 
Sample projectdocumentation
Sample projectdocumentationSample projectdocumentation
Sample projectdocumentation
 

Similar to Concealing Data Using Steganography Techniques

MESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHYMESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHYIRJET Journal
 
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching AlgorithmIRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching AlgorithmIRJET Journal
 
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...IJERD Editor
 
IRJET- Reversible Image Data Hiding in an Encrypted Domain with High Level of...
IRJET- Reversible Image Data Hiding in an Encrypted Domain with High Level of...IRJET- Reversible Image Data Hiding in an Encrypted Domain with High Level of...
IRJET- Reversible Image Data Hiding in an Encrypted Domain with High Level of...IRJET Journal
 
Implementation of Steganographic Techniques and its Detection.
Implementation of Steganographic Techniques and its Detection.Implementation of Steganographic Techniques and its Detection.
Implementation of Steganographic Techniques and its Detection.IRJET Journal
 
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUEACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUEIRJET Journal
 
Conditional entrench spatial domain steganography
Conditional entrench spatial domain steganographyConditional entrench spatial domain steganography
Conditional entrench spatial domain steganographysipij
 
Text Embedded System using LSB Method
Text Embedded System using LSB MethodText Embedded System using LSB Method
Text Embedded System using LSB Methodijtsrd
 
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...IRJET Journal
 
IRJET- Application of Machine Learning for Data Security
IRJET-  	  Application of Machine Learning for Data SecurityIRJET-  	  Application of Machine Learning for Data Security
IRJET- Application of Machine Learning for Data SecurityIRJET Journal
 
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming MachineIRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming MachineIRJET Journal
 

Similar to Concealing Data Using Steganography Techniques (20)

MESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHYMESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHY
 
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching AlgorithmIRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
 
A SURVEY ON IMAGE STEGANOGRAPHY TYPES AND HIDING TECHNIQUES
A SURVEY ON IMAGE STEGANOGRAPHY TYPES AND HIDING  TECHNIQUES A SURVEY ON IMAGE STEGANOGRAPHY TYPES AND HIDING  TECHNIQUES
A SURVEY ON IMAGE STEGANOGRAPHY TYPES AND HIDING TECHNIQUES
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
 
IRJET- Reversible Image Data Hiding in an Encrypted Domain with High Level of...
IRJET- Reversible Image Data Hiding in an Encrypted Domain with High Level of...IRJET- Reversible Image Data Hiding in an Encrypted Domain with High Level of...
IRJET- Reversible Image Data Hiding in an Encrypted Domain with High Level of...
 
Implementation of Steganographic Techniques and its Detection.
Implementation of Steganographic Techniques and its Detection.Implementation of Steganographic Techniques and its Detection.
Implementation of Steganographic Techniques and its Detection.
 
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUEACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE
 
It3116411644
It3116411644It3116411644
It3116411644
 
Conditional entrench spatial domain steganography
Conditional entrench spatial domain steganographyConditional entrench spatial domain steganography
Conditional entrench spatial domain steganography
 
Text Embedded System using LSB Method
Text Embedded System using LSB MethodText Embedded System using LSB Method
Text Embedded System using LSB Method
 
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...
 
G017444651
G017444651G017444651
G017444651
 
IRJET- Application of Machine Learning for Data Security
IRJET-  	  Application of Machine Learning for Data SecurityIRJET-  	  Application of Machine Learning for Data Security
IRJET- Application of Machine Learning for Data Security
 
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming MachineIRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
 
Ijmet 10 01_020
Ijmet 10 01_020Ijmet 10 01_020
Ijmet 10 01_020
 
Ijariie1132
Ijariie1132Ijariie1132
Ijariie1132
 
DATA HIDING IMAGES USING SPREAD SPECTRUM IN CLOUD COMPUTING
DATA HIDING IMAGES USING SPREAD SPECTRUM IN CLOUD COMPUTINGDATA HIDING IMAGES USING SPREAD SPECTRUM IN CLOUD COMPUTING
DATA HIDING IMAGES USING SPREAD SPECTRUM IN CLOUD COMPUTING
 
O017429398
O017429398O017429398
O017429398
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIkoyaldeepu123
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Effects of rheological properties on mixing
Effects of rheological properties on mixingEffects of rheological properties on mixing
Effects of rheological properties on mixingviprabot1
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage examplePragyanshuParadkar1
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 

Recently uploaded (20)

Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AI
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Effects of rheological properties on mixing
Effects of rheological properties on mixingEffects of rheological properties on mixing
Effects of rheological properties on mixing
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage example
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 

Concealing Data Using Steganography Techniques

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2749 Concealing of Deets using Steganography Technique Sudha S1, Deebika G2, Dhivya L3, Assistant Professor Susan Mano Derry V4 1,2,3Students, Dept. of Electronics Engineering, Jeppiaar SRR Engineering College, Chennai, Tamil Nadu 4Assistant Professor, Dept. of Electronics Engineering, Jeppiaar SRR Engineering College, Chennai, Tamil Nadu ----------------------------------------------------------------------***--------------------------------------------------------------------- Abstract –The project proposes the enhancement of security system for secret data communication through multi plane image data embedding in image. A given input audio is converted to any one plane process. After plane separation, the data hider will conceal the secret data into the image pixels. The data hiding technique uses the AES replacement algorithm for concealing the secret message bits into the input image. In the data extraction module, the secret data will be extracted by using relevant key for choosing the image pixels STEGO image to get the information about the data. Finally the performance of this proposal in Color Image and data hiding will be analyzed based on audio and data. Key Words: Security, Multiplane image, AES replacement algorithm, STEGO image, data hiding, audio and data. 1. INTRODUCTION Steganography is a method of hiding the information for invisible communication. It is similar to cryptography, where to secure communications from third parties by make the data not understood, steganography techniques is used to hide the message itself from an observer and there is no knowledge of the existence of the message in the first instant. In sometimes, the sended encrypted deets will arise suspicion while invisible deets will not do so. Both can be combined to produce better protection of the deets. In this scenario, the steganography fails and the deets cannot be find if a cryptography technique is used. Hiding deets in audio format inside images is a new hiding technique nowadays. An image with a secret information in the form of audio inside can be easily spread over the World Wide Web or in a news groups. To hide deets inside an image without changing its visible nature, the main source can be changed in noisy areas with many color differences, so minimum attention will be need to the modification. 2. OBJECTIVE The objective of this project is to provide an efficient deets concealing technique and encryption of the data in which the image and the audio can be retrieved independently without any loss. Hiding deets in image is the most important technique of steganography. The method was to conceal a secret deet in every nth letter of every word of a text message. After the booming of Internet and various types of digital file formats it got reduced in importance. Text steganography using digital files is not used very often because the text files have a very small amount of data redundancies. 3. EXISTING SYSTEM Cryptography is an existing physical technique that scrambles the deets by rearranging and substitution of body by making it unreadable to anyone except the authorised person can capable of unscrambling it. With the volume of sensitive Internet transaction that occurs daily, the profit of securing the deets using cryptographic process becoming a major goal for lot of organizations. 4. PROPOSED SYSTEM Reversible encrypted deets concealing in encrypted audios using chaos encryption, Asymmetric key encryption and adaptive least significant bit replacement technique. Steganography is used to hiding the cover deets in unpredictable multimedia information and is often used in secret communication between unknown parties. Steganography is a method of encryption of hiding of deets among the bits over a cover file, such as a text or an audio file. This method replaced unused or insignificant bits with the secret deets. Steganography is not as robust to attack and hence the embedded deets are vulnerable to crack it. 5. BLOCK DIAGRAM
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2750 Fig -1: Block diagram 6. SYSTEM DESIGN 6.1. Encryption: Encoding the contents of the deets in such a way that it conceals its contents from the third person. Cipher text results that it from plain text by applying the key for encryption. 6.2. Decryption: The process of recovering the cipher text to the plain text. 6.3. Key: Encryption and decryption process usually make the use of a key, and the coding method in decryption can be done only by knowing the proper key. Hash function generates a digest of the deets. Substitution of cipher text involves by replacing an alphabet with another character of same alphabet set. Mono-alphabet system uses a single alphabet set for the substitution. Poly-alphabet system uses multiple alphabet set for substitution. 7. METHODOLOGY 7.1. Encryption password: The password doesn’t get embed in the image. The password is used to influence how the hidden deets are to be written. Then the end of user want to extract the concealed deet, they must apply the password and the password is used to hide the deets gets read back. If they did not put the correct password, the deets retrieved will not look right. If we put in enough error detective code, you will detect it with relatively more probability whether the deets was retrieved absolutely. The cover image save the messages as a stego file. It will do the similar when user want to extract the deets from stego image. The user needs to give the right password. 7.2 Scanning: A scanning pattern is a pattern by which the pixels are accessed to embed the deets. Instead of embedding the first k bit in first pixel, second k bits in second pixel and so on, the deet bits are embed in pseudo-random order. We can use three scan methods Raster scan method, snake scan, and Z scan method. Each in both horizontal and vertical position embedding schemes. In Raster horizontal scanning, the concealed deets are embedded in row wise manner. After embedding the deets in a row, the next row is started scanning from the first pixel. In Raster scanning, vertical scanning is done vertical and column wise manner. 7.3. Decryption method: The activity of converting the deets from code into plain text i.e., "a secret key or a password is required for decryption". Decryption is the process for transformation of data that has been unreadable and through encrypt back to its unencrypted form. In decryption of data, the module extracts and convert the garbled deets and transform it to text to audio that are easily understandable and not only by the reader, but it also by the system. Decryption process may be accomplished by manually or automatically. It may be also performed by a set of key or passwords. 7.4. S Box age: The substitution of bytes one by one of the comparable limited field is finished by the substitution tables. They utilize the extended key capacities for the encryption and decoding for the substitution. 7.5. Discover image: In the s box age methodology the underlying advance is to locate the opposite augmentation of all the limited field components .The statement of locate the reverse is given in the underlying advance, which is the information parameter. The info byte and the modulo polynomial are to be rearranged by ventures of the reversal method in the posting.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2751 Hardware Requirements  Processor : Any Processor above 2GHZ  RAM : 2 GB  Hard Disk : 250GB  MATLAB is a logical programming language stage which gives solid scientific help to actualizing of cutting edge calculations. It is hence that MATLAB is generally utilized by the picture handling and PC vision network. New calculations are all around liable to be actualized first in MATLAB, to be sure they may just be accessible in MATLAB. SAMPLE PICTURES: 3. CONCLUSION The objective of the proposed steganography calculation decline the blurred pixels in each edge so as to build the installing limit. The proposed calculation is to improve the implanting limit, keeps up the nature of the stego sound progressively productive, basic, fitting and precise than other calculation, just as it makes the mystery information increasingly secure. REFERENCES 1) R. Anderson and F. Petitcolas, "On the points of confinement of steganography" IEEE Diary of Chose Regions in Correspondences, Vol. 16, No. 4, May 1998. 2) Niels Provos, Dwindle Honeyman,"Hide and Look for: A Prologue to Steganography," IEEE PC society, 2003. 3) K B Raja, Venugopal K R and L M Patnaik, "A Protected Stegonographic Calculation utilizing LSB, DCT and Picture Pressure on Crude Images",Technical Report, Bureau of Software engineering and Building, College Visvesvaraya School of Designing, Bangalore College, December 2004. 4) An outline of picture steganography by T. Morkel, J.H.P. Eloff, M.S. Olivier. Data and PC Security Design (ICSA) Exploration Gathering Branch of Software engineering College of Pretoria, 0002, Pretoria, South Africa. 5) Johnson, N.F. Jajodia, S."Exploring Steganography: Seeing the Inconspicuous", PC Diary, February 1998. 6)"Detecting LSB Steganography in Shading and Dark Scale Pictures" Jessica Fridrich, Miroslav Goljan, and Rui Du State College of New York, Binghamton. 7) Ran-Zan Wang, Chi-Tooth Lin, Ja-Chen Lin,"Hiding information in pictures by ideal tolerably critical piece substitution" IEE Electron. Lett. 36 (25) (2000) 20692070. 8)Hiding information in pictures by basic LSB substitution by Chi-Kwong Chan, L.M. Cheng Bureau of PC Designing and Data Innovation, City College of Hong Kong, Hong Kong Got 17 May 2002.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2752 BIOGRAPHIES Dhivya L Pursuing Degree in Electronics and Communication Engineering in Jeppiaar SRR Engineering College, Chennai, Tamil Nadu. Susan Mano Derry V M.E., Assistant Professor ECE in Jeppiaar SRR Engineering college from Tamil Nadu, India. Sudha S Pursuing Degree in Electronics and Communication Engineering in Jeppiaar SRR Engineering College, Chennai, Tamil Nadu. Deebika G Pursuing Degree in Electronics and Communication Engineering in Jeppiaar SRR Engineering College, Chennai, Tamil Nadu.