SlideShare a Scribd company logo
Swati Patil et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 3( Version 6), March 2014, pp.46-50
www.ijera.com 46 | P a g e
Modified Approach for Hiding Secret Data and Improving
Data Embedding Capacity
Swati Patil, Komal More
Department of Computer Engineering Dr. D.Y Patil College of Engineering, Ambi, Pune, India.
Department of Computer Engineering Dr. D.Y Patil College of Engineering, Ambi, Pune, India
Abstract
Security of the secret information has been a challenge when the large amount of data is exchanged on the
internet. A secure transfer of information can be very much achieved by steganography and Cryptography.
Steganography is a tool for hiding information inside an image. Cryptography is a tool which provides
encryption techniques for secure communication. In the traditional steganograhy techniques principle was either
to replace a special part of the frequency components of the carrier image, or to replace all the least significant
bits of a multi-valued image with the secret information. Our new steganography uses an image as the carrier
data, and we embed secret information in the bit-planes of the carrier. This technique makes use of the
characteristics of the human vision system whereby a human cannot perceive any shape information in a very
complicated binary pattern. We can replace all of the ―noise-like‖ regions in the bit-planes of the carrier
image with secret data without deteriorating the image quality.
Keywords- Bit Plane, BPCS, Hybrid Cryptography, LSB, Modified BPCS, Steganography.
I. Introduction
Information security is a major issue of concern
while exchanging a data in an open network, as
internet is not only a single network it is worldwide
collection of loosely network. Anyone can hack the
information and then make misuse from that or
corrupt it or we can say that anyone can destroy the
information if it is not fully secured or protected.
Steganography and Cryptography both plays a very
important role in information security.
Steganography is information security tool
which stores the secret information in any media file
in such way that no one else except the sender of the
information and the intended receiver can only
suspect the existence of any sort of information.
Cryptography is also an information security tool
which provides encryption techniques to hide the
secret information.
A good information hiding technique shall
include the following requirements:
1) Imperceptibility: the difference between the stego
medium and the original one must be very slight such
that the illegal party cannot detect the embedded
information.
2) Security: the illegal party cannot extract out the
hidden information even if he has detected that there
are some information concealed in the stego medium.
3) Capacity: the total number of secret message
which can be embedded in the medium.
4) Robustness: the stego medium shall be able to
resist general image processing.
The merits of BPCS-Steganography found by the
experiments are as follows.
1) The information hiding capacity of a true color
image is around 50%.
2) A sharpening operation on the dummy image
increases the embedding capacity quite a bit.
3) Customization of a BPCS - Steganography
program for each user is easy.
4) It is most secured technique and provides high
security.
5) Randomization of the secret data by a
compression operation makes the embedded data
more intangible.
1.1 Problem Statement
Focus in this paper is towards information or data
security when communication takes place.
1) Prevent form hacking.
2) To provide the better data security.
3) Improve data embedding capacity and maintain
quality.
In this paper we are putting forward different
algorithms for explaining encoding and decoding.
The structure of this paper is as follows:
Section I consist of introduction with problem
statement of the paper Section II presents the related
work Section III includes the Existing system Section
IV consist of the proposed system Section V
represent the example with experimental analysis and
Section VI consist of conclusion.
RESEARCH ARTICLE OPEN ACCESS
Swati Patil et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 3( Version 6), March 2014, pp.46-50
www.ijera.com 47 | P a g e
II. Related Work
Abbreviations
DES Data Encryption Standard.
RSA Rivest Shamir Adleman
LSB Least Significant Bit
BPCS Bit Plane Complexity Segmentation
2.1 Objectives
Focus in this paper is towards information
and data security during internet communication.
1) To provide the better data security.
2) Prevent form hacking.
3) Improve data embedding capacity and maintain
quality
2.2 LSB
Simple method in which the least significant
bits of the bytes in an image is replaced by bits of
secret message.
A large amount of data can be embedded by
LSB without observable changes. Very effective,
easy to implement, takes very less space but it has
low imperceptibility.
2.3 BPCS
In this segmentation of image are used by
measuring its complexity. It replaces the noisy
blocks of bit plan with the binary patterns mapped
from a secret data. Noisy blocks are determined with
help of complexity. It has Very large embedding
capacity.
2.4 Modified BPCS
It uses an image as the vessel data, and we
embed secret information in the bit-planes of the
vessel. This technique makes use of the
characteristics of the human vision system whereby a
human cannot perceive any shape information in a
very complicated binary pattern. We can replace all
of the “noise-like” regions in the bit-planes of the
vessel image with secret data without deteriorating
the image quality. Input data will be vessel image
and data to embed in byte format. Load the vessel
image into memory. Get width and height of the
memory image. Generate a threshold value.
III. Existing System
Information send through any network have
a chance to attack by hackers. After data embedding,
the quality of image may be affected.
Encryption provides an obvious approach to
information security, and encryption programs are
readily available. However, encryption clearly marks
a message as containing “secret” information, and
the encrypted message becomes subject to attack.
Furthermore, in many cases it is desirable to send
information without anyone even noticing that
information has been sent secret information.
IV. Proposed System
In steganography, data is hidden inside a
vessel or container that looks like it contains only
something else. A variety of vessels are possible,
such as digital images, sound clips, and even
executable files.
All of the traditional steganographic techniques have
limited information-hiding capacity. They can hide
only 10% (or less) of the data amounts of the vessel.
This Technique uses an image as the vessel data, and
we embed secret information in the bit-planes of the
vessel. We can replace all of the “noise-like” regions
in the bit-planes of the vessel image with secret data
without deteriorating the image quality.
Fig. Flow of proposed system
4.1 Encoding
The encoding process follows the steps
listed below:
Step 1: Calculate the size of the secret data and
cover-image.
Step 2: Determine the total bytes from the RGB
pixels needed in cover-image to encode the secret
data.
bits per pixel=bits per byte x 3 (1)
Swati Patil et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 3( Version 6), March 2014, pp.46-50
www.ijera.com 48 | P a g e
number of pixel of cover=(cover lengh*8)/bit per
pixel (2)
number of pixel of data=(cover lengh*8)/bit per pixel
(3)
Step 3: The system reads the bytes of the secret data.
Convert the amount of bits of the secret data in
(3) from integer into binary string.
Step 4: Segment the pixel into three blocks which are
red, green and blue.
Step 5: Get the total LSB or LSBs needed for
encoding.
Step 6: Calculate the arrays from the first seven
pixels (from the 0th pixel to the 6thpixel) of the
bitmap cover-image to store the secret data details as
depicted in Table 3. The number of k pixels will be
used to store the file name of the secret data.
k=n-7 (4)
Denote:
k: Capacity of the file name used in term of pixels.
n: The kth pixel after the 6th pixel. The remaining
pixels of the cover-image will be used to store the
contents of the secret data.
Step 7: Calculate the number of LSB or LSBs in the
colour pixels of the cover-image that are being used
to encode data
x=8-m (5)
Total encoded LSBs=(s1- x1)+(s2- x2)+(s3- x3) (6)
Fig. Encoding process
The following computation obtains the total
encoded LSBs and the value of a new pixel with
encoded data:
Total encoded LSBs=(s1- x1)+(s2- x2)+(s3-
x3)
New pixel value with encoded data=original byte +
total encoded LSBs.
4.2 Decoding
After encoding secret data into the cover-
image, the secret data has to be decoded for retrieval.
The following are steps for decoding:
Step 1: Calculate the size of the stego-image.
Step 2: The system reads the bytes of the stego-
image.
Convert the amount of bits of the stego-image
from integer to binary string.
Step 3: Determine encoding method for the number
of LSBs to be used
Step 4: Calculate and identify the number of pixels
Stego image
Yes
No
Swati Patil et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 3( Version 6), March 2014, pp.46-50
www.ijera.com 49 | P a g e
in the stego-image and also the embedded secret data
respectively using 1, 2 and 3.
Step 5: Use the last three byte values 216, 224 and
232 to obtain the offset of the string. Each of the
values mentioned will deduct the LSB used in order
to discard unused bits for secret data embedding.
first offset=16-encoded LSB (7)
second offset=24-encoded LSB (8)
third offset=32-encoded LSB (9)
Step 6: Extract and combine the remaining LSB at
each pixel in the BMP-24 file in order to retrieve
back the original secret data.
decoded string= (7)+(8)+(9)
(10)
From 10, the decoded string is the secret data
retrieved.
Figure 8 shows the decoding process of the proposed
scheme when a receiver decodes a stego-image.
Fig. decoding process
V. Experimental Results
Consider following figure [a] is an original
Lena Image and considered embed text file capacity
is 90077bytes. Figure [b] is a stego-image with alpha
value 0.03 and bit plane sets as 3. Figure [c] is a
cover image with alpha as 0.03 and gamma as 0.5
after encryption and data compression as per
proposed method.
Hence observed results of the proposed
method produce more data embedded capacity and
also preserved the visibility of the image.
Figure Original image
Figure Modified BPCS stego image
Figure Proposed method stego image
The experiment prefers peak-signal to-noise
ratio (PSNR) as objective criteria of visual
imperceptibility. The definition of PSNR as follow:
PSNR = 10 * log10 ( Imax / MSE) db= 20 * log10 ( I
max / √MSE) db
No
Yes
Secret data
Swati Patil et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 3( Version 6), March 2014, pp.46-50
www.ijera.com 50 | P a g e
Where, Imax is equal to 255 for grayscale
images, and the mean squared error MSE is defined
[13] to be: MSE = (1/MN) * Σ(i=1) M Σ(j=1)
N(‫׀‬CI(i,j) – SI(i,j)‫׀‬ )
Where, M and N represent the number of
horizontal and vertical pixels respectively of the
cover(C) and stego(S) image. The greater the PSNR
is, the better the fidelity is, and the similar the two
images are shown above.
Following table shows the details about the
stego image
Ima
ge
Cap
acity
PSNR for
modified BPCS
PSNR for
modified BPCS
R G B R G B
Len
a
992
98
33.4 33 33.2 43.2 34.8 34.9
Table Experimental result of proposed method
VI. Conclusion
The proposed scheme contributes a multi-
layered embedding feature that enable senders to
encode secret data into several cover-images
sequentially to create a stealth camouflage to avoid
intruder's unwanted attention.
It provides two levels of security, hybrid
cryptography and steganography. If at all the intruder
suspects it is quite impossible for him to steal the
data because embedding byte positions are decided
based on modified BPCS approach. After the cipher
text is embedded, the degradation in image quality is
not apparent to normal human eye. Threshold is
customaries; hence sender can decide data hiding
capacity as well as quality of the image. This
approach can be extendable to send secret images in
carrier image. This steganography is a strong
information security technique, especially when
combined with hybrid encrypted embedded data
should be convinced.
References
[1] Yeshwanth srinivasan “high capacity data
hiding system using Bpcs steganography”
[2] Abhishek Patidar Gajendra Jagnade Laxmi
Madhuri Pranay Mehta Ronak Seth,” Data
Security Using Cryptosteganography in
Web Application” 2012
[3] Eiji Kawaguchi and Richard O. Eason,
“Principle and Applications of BPCS-
Steganography”, Kyushu Institute of
Technology, Kitakyushu, Japan–University
of Maine, Orono, Maine
[4] Lip Yee Por, Delina Beh, Tan Fong Ang,
and Sim Ying Ong” An Enhanced
Mechanism for Image Steganography Using
Sequential Colour Cycle Algorithm”
Malaysian Institute of Information
Technology, Universiti Kuala Lumpur,
Malaysia 2010
[5] Sheetal Mehta, Kaveri Dighe, Meera Jagtap,
Anju Ekre,” Web Based BPCS
Steganography”
[6] Tao Zhang Zhaohui Li Peipei Shi,”
Statistical Analysis Against improved BPCS
Steganography” Nankai University, College
of Information Technical Science Tianjin,
China 2010
[7] Sandeep Singh, Aman Singh,”A Review on
the Various Recent Steganography
Techniques”Department of Computer
Science Engineering, Lovely Professional
University Phagwara, Punjab, India 2013
[8] Smita Bansod, Vanita Mane, Leena Ragha
”Modified BPCS steganography using
Hybrid Cryptography for Improving Data
embedding Capacity” Information
Technology SAKEC, RAIT, Mumbai 2012

More Related Content

What's hot

Image Encryption-Then-Compression System via Prediction Error Clustering and ...
Image Encryption-Then-Compression System via Prediction Error Clustering and ...Image Encryption-Then-Compression System via Prediction Error Clustering and ...
Image Encryption-Then-Compression System via Prediction Error Clustering and ...
AM Publications,India
 
DATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE FOR SECURE CLOUD STORAGE
DATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE  FOR SECURE CLOUD STORAGEDATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE  FOR SECURE CLOUD STORAGE
DATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE FOR SECURE CLOUD STORAGE
IJTRET-International Journal of Trendy Research in Engineering and Technology
 
An Architectural Approach of Data Hiding In Images Using Mobile Communication
An Architectural Approach of Data Hiding In Images Using Mobile CommunicationAn Architectural Approach of Data Hiding In Images Using Mobile Communication
An Architectural Approach of Data Hiding In Images Using Mobile Communication
iosrjce
 
Image encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithmImage encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithm
IAEME Publication
 
Improved LSB Steganograhy Technique for grayscale and RGB images
Improved LSB Steganograhy Technique for grayscale and RGB imagesImproved LSB Steganograhy Technique for grayscale and RGB images
Improved LSB Steganograhy Technique for grayscale and RGB images
IJERA Editor
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
inventy
 
Security System for Data Using Steganography and Cryptography (SSDSC)
Security System for Data Using Steganography and Cryptography (SSDSC) Security System for Data Using Steganography and Cryptography (SSDSC)
Security System for Data Using Steganography and Cryptography (SSDSC)
csandit
 
Ijariie1132
Ijariie1132Ijariie1132
Ijariie1132
IJARIIE JOURNAL
 
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...
IJCSEA Journal
 
5. article azojete vol 11 50 61 mala
5. article azojete vol 11 50 61 mala5. article azojete vol 11 50 61 mala
5. article azojete vol 11 50 61 mala
Oyeniyi Samuel
 
Stegonoraphy
StegonoraphyStegonoraphy
Stegonoraphy
Junus Sinuraya
 
DCT Based Secret Image Hiding In Video Sequence
DCT Based Secret Image Hiding In Video SequenceDCT Based Secret Image Hiding In Video Sequence
DCT Based Secret Image Hiding In Video Sequence
IJERA Editor
 
Text in Image Hiding using Developed LSB and Random Method
Text in Image Hiding using Developed LSB and  Random Method Text in Image Hiding using Developed LSB and  Random Method
Text in Image Hiding using Developed LSB and Random Method
IJECEIAES
 
Highly secure scalable compression of encrypted images
Highly secure scalable compression of encrypted imagesHighly secure scalable compression of encrypted images
Highly secure scalable compression of encrypted images
eSAT Journals
 
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED STEGANOGRAPHY AND CR...
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED  STEGANOGRAPHY AND CR...Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED  STEGANOGRAPHY AND CR...
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED STEGANOGRAPHY AND CR...
Budi Prasetiyo
 
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITION
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITIONDUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITION
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITION
IJNSA Journal
 
File Encryption and Hiding Application Based on AES and Append Insertion Steg...
File Encryption and Hiding Application Based on AES and Append Insertion Steg...File Encryption and Hiding Application Based on AES and Append Insertion Steg...
File Encryption and Hiding Application Based on AES and Append Insertion Steg...
TELKOMNIKA JOURNAL
 

What's hot (17)

Image Encryption-Then-Compression System via Prediction Error Clustering and ...
Image Encryption-Then-Compression System via Prediction Error Clustering and ...Image Encryption-Then-Compression System via Prediction Error Clustering and ...
Image Encryption-Then-Compression System via Prediction Error Clustering and ...
 
DATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE FOR SECURE CLOUD STORAGE
DATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE  FOR SECURE CLOUD STORAGEDATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE  FOR SECURE CLOUD STORAGE
DATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE FOR SECURE CLOUD STORAGE
 
An Architectural Approach of Data Hiding In Images Using Mobile Communication
An Architectural Approach of Data Hiding In Images Using Mobile CommunicationAn Architectural Approach of Data Hiding In Images Using Mobile Communication
An Architectural Approach of Data Hiding In Images Using Mobile Communication
 
Image encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithmImage encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithm
 
Improved LSB Steganograhy Technique for grayscale and RGB images
Improved LSB Steganograhy Technique for grayscale and RGB imagesImproved LSB Steganograhy Technique for grayscale and RGB images
Improved LSB Steganograhy Technique for grayscale and RGB images
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
Security System for Data Using Steganography and Cryptography (SSDSC)
Security System for Data Using Steganography and Cryptography (SSDSC) Security System for Data Using Steganography and Cryptography (SSDSC)
Security System for Data Using Steganography and Cryptography (SSDSC)
 
Ijariie1132
Ijariie1132Ijariie1132
Ijariie1132
 
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...
 
5. article azojete vol 11 50 61 mala
5. article azojete vol 11 50 61 mala5. article azojete vol 11 50 61 mala
5. article azojete vol 11 50 61 mala
 
Stegonoraphy
StegonoraphyStegonoraphy
Stegonoraphy
 
DCT Based Secret Image Hiding In Video Sequence
DCT Based Secret Image Hiding In Video SequenceDCT Based Secret Image Hiding In Video Sequence
DCT Based Secret Image Hiding In Video Sequence
 
Text in Image Hiding using Developed LSB and Random Method
Text in Image Hiding using Developed LSB and  Random Method Text in Image Hiding using Developed LSB and  Random Method
Text in Image Hiding using Developed LSB and Random Method
 
Highly secure scalable compression of encrypted images
Highly secure scalable compression of encrypted imagesHighly secure scalable compression of encrypted images
Highly secure scalable compression of encrypted images
 
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED STEGANOGRAPHY AND CR...
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED  STEGANOGRAPHY AND CR...Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED  STEGANOGRAPHY AND CR...
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED STEGANOGRAPHY AND CR...
 
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITION
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITIONDUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITION
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITION
 
File Encryption and Hiding Application Based on AES and Append Insertion Steg...
File Encryption and Hiding Application Based on AES and Append Insertion Steg...File Encryption and Hiding Application Based on AES and Append Insertion Steg...
File Encryption and Hiding Application Based on AES and Append Insertion Steg...
 

Viewers also liked

Dv25732742
Dv25732742Dv25732742
Dv25732742
IJERA Editor
 
Jn2416531655
Jn2416531655Jn2416531655
Jn2416531655
IJERA Editor
 
Jb2516071610
Jb2516071610Jb2516071610
Jb2516071610
IJERA Editor
 
Dl25667670
Dl25667670Dl25667670
Dl25667670
IJERA Editor
 
Mq2521722176
Mq2521722176Mq2521722176
Mq2521722176
IJERA Editor
 
Cr24608612
Cr24608612Cr24608612
Cr24608612
IJERA Editor
 
Ky2519111913
Ky2519111913Ky2519111913
Ky2519111913
IJERA Editor
 
Ff35913917
Ff35913917Ff35913917
Ff35913917
IJERA Editor
 
Ok2423462359
Ok2423462359Ok2423462359
Ok2423462359
IJERA Editor
 
Kl2417741781
Kl2417741781Kl2417741781
Kl2417741781
IJERA Editor
 
Be26377381
Be26377381Be26377381
Be26377381
IJERA Editor
 
J26048056
J26048056J26048056
J26048056
IJERA Editor
 
Kh3418561861
Kh3418561861Kh3418561861
Kh3418561861
IJERA Editor
 
Nc342352340
Nc342352340Nc342352340
Nc342352340
IJERA Editor
 
J25043046
J25043046J25043046
J25043046
IJERA Editor
 
Gh2511431153
Gh2511431153Gh2511431153
Gh2511431153
IJERA Editor
 
Hu2615271543
Hu2615271543Hu2615271543
Hu2615271543
IJERA Editor
 
Mq2420912096
Mq2420912096Mq2420912096
Mq2420912096
IJERA Editor
 
Cf24544550
Cf24544550Cf24544550
Cf24544550
IJERA Editor
 
Lt2419681970
Lt2419681970Lt2419681970
Lt2419681970
IJERA Editor
 

Viewers also liked (20)

Dv25732742
Dv25732742Dv25732742
Dv25732742
 
Jn2416531655
Jn2416531655Jn2416531655
Jn2416531655
 
Jb2516071610
Jb2516071610Jb2516071610
Jb2516071610
 
Dl25667670
Dl25667670Dl25667670
Dl25667670
 
Mq2521722176
Mq2521722176Mq2521722176
Mq2521722176
 
Cr24608612
Cr24608612Cr24608612
Cr24608612
 
Ky2519111913
Ky2519111913Ky2519111913
Ky2519111913
 
Ff35913917
Ff35913917Ff35913917
Ff35913917
 
Ok2423462359
Ok2423462359Ok2423462359
Ok2423462359
 
Kl2417741781
Kl2417741781Kl2417741781
Kl2417741781
 
Be26377381
Be26377381Be26377381
Be26377381
 
J26048056
J26048056J26048056
J26048056
 
Kh3418561861
Kh3418561861Kh3418561861
Kh3418561861
 
Nc342352340
Nc342352340Nc342352340
Nc342352340
 
J25043046
J25043046J25043046
J25043046
 
Gh2511431153
Gh2511431153Gh2511431153
Gh2511431153
 
Hu2615271543
Hu2615271543Hu2615271543
Hu2615271543
 
Mq2420912096
Mq2420912096Mq2420912096
Mq2420912096
 
Cf24544550
Cf24544550Cf24544550
Cf24544550
 
Lt2419681970
Lt2419681970Lt2419681970
Lt2419681970
 

Similar to H43064650

11.data security using cryptosteganography in web application
11.data security using cryptosteganography in web application11.data security using cryptosteganography in web application
11.data security using cryptosteganography in web application
Alexander Decker
 
SECURITY SYSTEM FOR DATA USING STEGANOGRAPHY AND CRYPTOGRAPHY (SSDSC)
SECURITY SYSTEM FOR DATA USING STEGANOGRAPHY AND CRYPTOGRAPHY (SSDSC) SECURITY SYSTEM FOR DATA USING STEGANOGRAPHY AND CRYPTOGRAPHY (SSDSC)
SECURITY SYSTEM FOR DATA USING STEGANOGRAPHY AND CRYPTOGRAPHY (SSDSC)
cscpconf
 
MESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHYMESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHY
IRJET Journal
 
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUESELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
ijcisjournal
 
DATA HIDING IMAGES USING SPREAD SPECTRUM IN CLOUD COMPUTING
DATA HIDING IMAGES USING SPREAD SPECTRUM IN CLOUD COMPUTINGDATA HIDING IMAGES USING SPREAD SPECTRUM IN CLOUD COMPUTING
DATA HIDING IMAGES USING SPREAD SPECTRUM IN CLOUD COMPUTING
International Journal of Technical Research & Application
 
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUEACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE
IRJET Journal
 
Review paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and SteganographyReview paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and Steganography
vivatechijri
 
P017329498
P017329498P017329498
P017329498
IOSR Journals
 
IRJET- Application of Machine Learning for Data Security
IRJET-  	  Application of Machine Learning for Data SecurityIRJET-  	  Application of Machine Learning for Data Security
IRJET- Application of Machine Learning for Data Security
IRJET Journal
 
Protection of Secret Textual Data Using Steganography Based System
Protection of Secret Textual Data Using Steganography Based SystemProtection of Secret Textual Data Using Steganography Based System
Protection of Secret Textual Data Using Steganography Based System
IRJET Journal
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
IJERD Editor
 
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
IRJET Journal
 
11.secure data transmission by using steganography
11.secure data transmission by using steganography11.secure data transmission by using steganography
11.secure data transmission by using steganography
Alexander Decker
 
Secure data transmission by using steganography
Secure data transmission by using steganographySecure data transmission by using steganography
Secure data transmission by using steganography
Alexander Decker
 
IRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography TechniqueIRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography Technique
IRJET Journal
 
IRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography TechniqueIRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography Technique
IRJET Journal
 
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
IOSR Journals
 
C010511420
C010511420C010511420
C010511420
IOSR Journals
 
Survey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular FormSurvey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular Form
ijsrd.com
 
It3116411644
It3116411644It3116411644
It3116411644
IJERA Editor
 

Similar to H43064650 (20)

11.data security using cryptosteganography in web application
11.data security using cryptosteganography in web application11.data security using cryptosteganography in web application
11.data security using cryptosteganography in web application
 
SECURITY SYSTEM FOR DATA USING STEGANOGRAPHY AND CRYPTOGRAPHY (SSDSC)
SECURITY SYSTEM FOR DATA USING STEGANOGRAPHY AND CRYPTOGRAPHY (SSDSC) SECURITY SYSTEM FOR DATA USING STEGANOGRAPHY AND CRYPTOGRAPHY (SSDSC)
SECURITY SYSTEM FOR DATA USING STEGANOGRAPHY AND CRYPTOGRAPHY (SSDSC)
 
MESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHYMESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHY
 
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUESELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
 
DATA HIDING IMAGES USING SPREAD SPECTRUM IN CLOUD COMPUTING
DATA HIDING IMAGES USING SPREAD SPECTRUM IN CLOUD COMPUTINGDATA HIDING IMAGES USING SPREAD SPECTRUM IN CLOUD COMPUTING
DATA HIDING IMAGES USING SPREAD SPECTRUM IN CLOUD COMPUTING
 
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUEACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE
 
Review paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and SteganographyReview paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and Steganography
 
P017329498
P017329498P017329498
P017329498
 
IRJET- Application of Machine Learning for Data Security
IRJET-  	  Application of Machine Learning for Data SecurityIRJET-  	  Application of Machine Learning for Data Security
IRJET- Application of Machine Learning for Data Security
 
Protection of Secret Textual Data Using Steganography Based System
Protection of Secret Textual Data Using Steganography Based SystemProtection of Secret Textual Data Using Steganography Based System
Protection of Secret Textual Data Using Steganography Based System
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
 
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
 
11.secure data transmission by using steganography
11.secure data transmission by using steganography11.secure data transmission by using steganography
11.secure data transmission by using steganography
 
Secure data transmission by using steganography
Secure data transmission by using steganographySecure data transmission by using steganography
Secure data transmission by using steganography
 
IRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography TechniqueIRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography Technique
 
IRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography TechniqueIRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography Technique
 
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
 
C010511420
C010511420C010511420
C010511420
 
Survey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular FormSurvey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular Form
 
It3116411644
It3116411644It3116411644
It3116411644
 

Recently uploaded

Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
Project Management Semester Long Project - Acuity
Project Management Semester Long Project - AcuityProject Management Semester Long Project - Acuity
Project Management Semester Long Project - Acuity
jpupo2018
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 

Recently uploaded (20)

Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
Project Management Semester Long Project - Acuity
Project Management Semester Long Project - AcuityProject Management Semester Long Project - Acuity
Project Management Semester Long Project - Acuity
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 

H43064650

  • 1. Swati Patil et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 3( Version 6), March 2014, pp.46-50 www.ijera.com 46 | P a g e Modified Approach for Hiding Secret Data and Improving Data Embedding Capacity Swati Patil, Komal More Department of Computer Engineering Dr. D.Y Patil College of Engineering, Ambi, Pune, India. Department of Computer Engineering Dr. D.Y Patil College of Engineering, Ambi, Pune, India Abstract Security of the secret information has been a challenge when the large amount of data is exchanged on the internet. A secure transfer of information can be very much achieved by steganography and Cryptography. Steganography is a tool for hiding information inside an image. Cryptography is a tool which provides encryption techniques for secure communication. In the traditional steganograhy techniques principle was either to replace a special part of the frequency components of the carrier image, or to replace all the least significant bits of a multi-valued image with the secret information. Our new steganography uses an image as the carrier data, and we embed secret information in the bit-planes of the carrier. This technique makes use of the characteristics of the human vision system whereby a human cannot perceive any shape information in a very complicated binary pattern. We can replace all of the ―noise-like‖ regions in the bit-planes of the carrier image with secret data without deteriorating the image quality. Keywords- Bit Plane, BPCS, Hybrid Cryptography, LSB, Modified BPCS, Steganography. I. Introduction Information security is a major issue of concern while exchanging a data in an open network, as internet is not only a single network it is worldwide collection of loosely network. Anyone can hack the information and then make misuse from that or corrupt it or we can say that anyone can destroy the information if it is not fully secured or protected. Steganography and Cryptography both plays a very important role in information security. Steganography is information security tool which stores the secret information in any media file in such way that no one else except the sender of the information and the intended receiver can only suspect the existence of any sort of information. Cryptography is also an information security tool which provides encryption techniques to hide the secret information. A good information hiding technique shall include the following requirements: 1) Imperceptibility: the difference between the stego medium and the original one must be very slight such that the illegal party cannot detect the embedded information. 2) Security: the illegal party cannot extract out the hidden information even if he has detected that there are some information concealed in the stego medium. 3) Capacity: the total number of secret message which can be embedded in the medium. 4) Robustness: the stego medium shall be able to resist general image processing. The merits of BPCS-Steganography found by the experiments are as follows. 1) The information hiding capacity of a true color image is around 50%. 2) A sharpening operation on the dummy image increases the embedding capacity quite a bit. 3) Customization of a BPCS - Steganography program for each user is easy. 4) It is most secured technique and provides high security. 5) Randomization of the secret data by a compression operation makes the embedded data more intangible. 1.1 Problem Statement Focus in this paper is towards information or data security when communication takes place. 1) Prevent form hacking. 2) To provide the better data security. 3) Improve data embedding capacity and maintain quality. In this paper we are putting forward different algorithms for explaining encoding and decoding. The structure of this paper is as follows: Section I consist of introduction with problem statement of the paper Section II presents the related work Section III includes the Existing system Section IV consist of the proposed system Section V represent the example with experimental analysis and Section VI consist of conclusion. RESEARCH ARTICLE OPEN ACCESS
  • 2. Swati Patil et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 3( Version 6), March 2014, pp.46-50 www.ijera.com 47 | P a g e II. Related Work Abbreviations DES Data Encryption Standard. RSA Rivest Shamir Adleman LSB Least Significant Bit BPCS Bit Plane Complexity Segmentation 2.1 Objectives Focus in this paper is towards information and data security during internet communication. 1) To provide the better data security. 2) Prevent form hacking. 3) Improve data embedding capacity and maintain quality 2.2 LSB Simple method in which the least significant bits of the bytes in an image is replaced by bits of secret message. A large amount of data can be embedded by LSB without observable changes. Very effective, easy to implement, takes very less space but it has low imperceptibility. 2.3 BPCS In this segmentation of image are used by measuring its complexity. It replaces the noisy blocks of bit plan with the binary patterns mapped from a secret data. Noisy blocks are determined with help of complexity. It has Very large embedding capacity. 2.4 Modified BPCS It uses an image as the vessel data, and we embed secret information in the bit-planes of the vessel. This technique makes use of the characteristics of the human vision system whereby a human cannot perceive any shape information in a very complicated binary pattern. We can replace all of the “noise-like” regions in the bit-planes of the vessel image with secret data without deteriorating the image quality. Input data will be vessel image and data to embed in byte format. Load the vessel image into memory. Get width and height of the memory image. Generate a threshold value. III. Existing System Information send through any network have a chance to attack by hackers. After data embedding, the quality of image may be affected. Encryption provides an obvious approach to information security, and encryption programs are readily available. However, encryption clearly marks a message as containing “secret” information, and the encrypted message becomes subject to attack. Furthermore, in many cases it is desirable to send information without anyone even noticing that information has been sent secret information. IV. Proposed System In steganography, data is hidden inside a vessel or container that looks like it contains only something else. A variety of vessels are possible, such as digital images, sound clips, and even executable files. All of the traditional steganographic techniques have limited information-hiding capacity. They can hide only 10% (or less) of the data amounts of the vessel. This Technique uses an image as the vessel data, and we embed secret information in the bit-planes of the vessel. We can replace all of the “noise-like” regions in the bit-planes of the vessel image with secret data without deteriorating the image quality. Fig. Flow of proposed system 4.1 Encoding The encoding process follows the steps listed below: Step 1: Calculate the size of the secret data and cover-image. Step 2: Determine the total bytes from the RGB pixels needed in cover-image to encode the secret data. bits per pixel=bits per byte x 3 (1)
  • 3. Swati Patil et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 3( Version 6), March 2014, pp.46-50 www.ijera.com 48 | P a g e number of pixel of cover=(cover lengh*8)/bit per pixel (2) number of pixel of data=(cover lengh*8)/bit per pixel (3) Step 3: The system reads the bytes of the secret data. Convert the amount of bits of the secret data in (3) from integer into binary string. Step 4: Segment the pixel into three blocks which are red, green and blue. Step 5: Get the total LSB or LSBs needed for encoding. Step 6: Calculate the arrays from the first seven pixels (from the 0th pixel to the 6thpixel) of the bitmap cover-image to store the secret data details as depicted in Table 3. The number of k pixels will be used to store the file name of the secret data. k=n-7 (4) Denote: k: Capacity of the file name used in term of pixels. n: The kth pixel after the 6th pixel. The remaining pixels of the cover-image will be used to store the contents of the secret data. Step 7: Calculate the number of LSB or LSBs in the colour pixels of the cover-image that are being used to encode data x=8-m (5) Total encoded LSBs=(s1- x1)+(s2- x2)+(s3- x3) (6) Fig. Encoding process The following computation obtains the total encoded LSBs and the value of a new pixel with encoded data: Total encoded LSBs=(s1- x1)+(s2- x2)+(s3- x3) New pixel value with encoded data=original byte + total encoded LSBs. 4.2 Decoding After encoding secret data into the cover- image, the secret data has to be decoded for retrieval. The following are steps for decoding: Step 1: Calculate the size of the stego-image. Step 2: The system reads the bytes of the stego- image. Convert the amount of bits of the stego-image from integer to binary string. Step 3: Determine encoding method for the number of LSBs to be used Step 4: Calculate and identify the number of pixels Stego image Yes No
  • 4. Swati Patil et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 3( Version 6), March 2014, pp.46-50 www.ijera.com 49 | P a g e in the stego-image and also the embedded secret data respectively using 1, 2 and 3. Step 5: Use the last three byte values 216, 224 and 232 to obtain the offset of the string. Each of the values mentioned will deduct the LSB used in order to discard unused bits for secret data embedding. first offset=16-encoded LSB (7) second offset=24-encoded LSB (8) third offset=32-encoded LSB (9) Step 6: Extract and combine the remaining LSB at each pixel in the BMP-24 file in order to retrieve back the original secret data. decoded string= (7)+(8)+(9) (10) From 10, the decoded string is the secret data retrieved. Figure 8 shows the decoding process of the proposed scheme when a receiver decodes a stego-image. Fig. decoding process V. Experimental Results Consider following figure [a] is an original Lena Image and considered embed text file capacity is 90077bytes. Figure [b] is a stego-image with alpha value 0.03 and bit plane sets as 3. Figure [c] is a cover image with alpha as 0.03 and gamma as 0.5 after encryption and data compression as per proposed method. Hence observed results of the proposed method produce more data embedded capacity and also preserved the visibility of the image. Figure Original image Figure Modified BPCS stego image Figure Proposed method stego image The experiment prefers peak-signal to-noise ratio (PSNR) as objective criteria of visual imperceptibility. The definition of PSNR as follow: PSNR = 10 * log10 ( Imax / MSE) db= 20 * log10 ( I max / √MSE) db No Yes Secret data
  • 5. Swati Patil et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 3( Version 6), March 2014, pp.46-50 www.ijera.com 50 | P a g e Where, Imax is equal to 255 for grayscale images, and the mean squared error MSE is defined [13] to be: MSE = (1/MN) * Σ(i=1) M Σ(j=1) N(‫׀‬CI(i,j) – SI(i,j)‫׀‬ ) Where, M and N represent the number of horizontal and vertical pixels respectively of the cover(C) and stego(S) image. The greater the PSNR is, the better the fidelity is, and the similar the two images are shown above. Following table shows the details about the stego image Ima ge Cap acity PSNR for modified BPCS PSNR for modified BPCS R G B R G B Len a 992 98 33.4 33 33.2 43.2 34.8 34.9 Table Experimental result of proposed method VI. Conclusion The proposed scheme contributes a multi- layered embedding feature that enable senders to encode secret data into several cover-images sequentially to create a stealth camouflage to avoid intruder's unwanted attention. It provides two levels of security, hybrid cryptography and steganography. If at all the intruder suspects it is quite impossible for him to steal the data because embedding byte positions are decided based on modified BPCS approach. After the cipher text is embedded, the degradation in image quality is not apparent to normal human eye. Threshold is customaries; hence sender can decide data hiding capacity as well as quality of the image. This approach can be extendable to send secret images in carrier image. This steganography is a strong information security technique, especially when combined with hybrid encrypted embedded data should be convinced. References [1] Yeshwanth srinivasan “high capacity data hiding system using Bpcs steganography” [2] Abhishek Patidar Gajendra Jagnade Laxmi Madhuri Pranay Mehta Ronak Seth,” Data Security Using Cryptosteganography in Web Application” 2012 [3] Eiji Kawaguchi and Richard O. Eason, “Principle and Applications of BPCS- Steganography”, Kyushu Institute of Technology, Kitakyushu, Japan–University of Maine, Orono, Maine [4] Lip Yee Por, Delina Beh, Tan Fong Ang, and Sim Ying Ong” An Enhanced Mechanism for Image Steganography Using Sequential Colour Cycle Algorithm” Malaysian Institute of Information Technology, Universiti Kuala Lumpur, Malaysia 2010 [5] Sheetal Mehta, Kaveri Dighe, Meera Jagtap, Anju Ekre,” Web Based BPCS Steganography” [6] Tao Zhang Zhaohui Li Peipei Shi,” Statistical Analysis Against improved BPCS Steganography” Nankai University, College of Information Technical Science Tianjin, China 2010 [7] Sandeep Singh, Aman Singh,”A Review on the Various Recent Steganography Techniques”Department of Computer Science Engineering, Lovely Professional University Phagwara, Punjab, India 2013 [8] Smita Bansod, Vanita Mane, Leena Ragha ”Modified BPCS steganography using Hybrid Cryptography for Improving Data embedding Capacity” Information Technology SAKEC, RAIT, Mumbai 2012