SlideShare a Scribd company logo
1 of 6
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2845
HYBRID APPROACH FOR IMPROVING DATA SECURITY AND SIZE
REDUCTION IN IMAGE STEGANOGRAPHY
Mandeep Kaur1, Asst.Prof. Rupinder Kaur Randhawa2
1Mandeep Kaur, Dept.of Computer Science and Engineering, Baba Banda Singh Bahadur Engineering College,
Punjab, India
2Asst. Prof. Rupinder kaur Randhawa, Dept.of Computer Science and Engineering, Baba Banda Singh Bahadur
Engineering College, Punjab, India
------------------------------------------------------------------***------------------------------------------------------------------
Abstract – Image steganography is used to hide the secret
message under a cover image in order to enhance the security.
There are several proposed techniques which are focused on
the security issue in their work. In this paper, a new technique
is presented, implemented and analyzed. The proposedmethod
uses three different techniques such as Huffman encoding,
Deoxyribonucleic acid and State Transition. Initially, Huffman
is applied over the text for the compression, and then
Deoxyribonucleic acid is applied over the compressed data for
the encryption and lastly State Transition algorithm has used
for updating the location in the image. Theapplicationofthese
algorithms provides high security in comparison with the
traditional algorithms. The implementation of these
algorithms is done with respect to message bits. Total three
images are used for the evaluation of traditionalandproposed
techniques in which the message bit varies from fifty to
hundred. The simulation analysis concludes that the proposed
method is efficient, more secure and proficient in comparison
with other techniques such as LSBs, LF-DCT and MF-DCT. The
parameters PSNR and MSE are used for the evaluation of their
performance.
Keywords: Steganography, Cryptography, Huffman
Encoding, Deoxyribonucleic acid, State Transition.
1. INTRODUCTION
Steganography isthewordtakenfromthetwoGreek
words as “steganos” and “graphic” which mean “concealed”
and “writing” respectively. Jointly it referred as concealed
(hidden or covered) the message. Accordingly,
steganography is the process of hiding the message before
transmitting it to the receiver. Data can be hidden within
another digital medium such as text, image, audio or video.
With the application of this technique intruder will not be
able to suspect the existence of the message.
Basic idea or motivation behind implementation of
image steganography is to communicate between the
members without having fear of being attacked of messages.
Due to its advantages, it has been used in several areas
including military, intelligence operatives or bureaus. These
fields of espionage required a method which can hide their
critical data and no intermediate person can evaluate the
meaning of the data.
The main goal of using steganography istoavoidthe
attention of the attacker from the hidden information in the
transmitted as if attacker would come to know that there isa
hidden data into the sent messagethenobserverwill tryeach
possible idea so that he can read the hidden message.
Fig-1: Process of steganography
Steganography can be applied with cryptography.
Fig-1 shows the model of steganography process with
cryptography.
1.1 Techniques for Steganography
Steganography provides variousmethods whichcan
be used to embed the data with the cover object. Techniques
for the steganography are classified such as:
 Spatial Domain Methods:
In this type of Steganography method, data that needs to
be hidden is directly embed with the current intensity of the
pixels. Which resultant into the change of pixel values of the
image directly at the time of hiding data. Some of the spatial
domain techniques are:
(1) Least Significant Bit (LSB)
(2) Pixel value Differencing (PVD)
(3) Edges based Data Embedding Method (EBE)
(4) Random pixel embedding method (RPE)
(5) Mapping pixel to hidden data method
(6) Labeling or connectivity method
Select image to
hide data
Algorithm for
encrypting data
Image after
steganography
Secret message
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2846
(7) Pixel intensity based
(8) Texture based method
 Transform Domain Technique:
In this type of technique message is embedded in the
frequency domain of the cover object.Several algorithms and
transformations can be used to conceal the message into
image. Classifications on the transfer domain are mentioned
below:
(1) Discrete Fourier transformation technique (DFT)
(2) Discrete cosine transformation technique (DCT)
(3) Discrete Wavelet transformation technique (DWT)
(4) Lossless or reversible method (DCT)
(5) Embedding in coefficient bits
1.2 Data Compression
There are number of techniques available used for data
compression such as “Lossy” compression.Insuchtechnique
it provides help in reducing the actual amount of the data.
Basically, it reduces the size of the information by losing
redundant part of it. Image format JPEG uses Lossy
compression technique. Lost information can be restored
after performing decompression on the targeted image.
Alternatively, “Lossless” compression techniquedoesnot
discard any of the information fromtheoriginal image.There
are different techniques available for lossy and lossless
compression which can be chosen according to the
requirements.
Compression means reduction of redundant data but
retains the quality of the image. There are two types of
techniques that are used to compress the image.
A. Lossless compression technique
B. Lossy compression technique
2. LITERATURE SURVEY
R.S.A-EI et.al [13] describes discrete Cosine
Transform based steganography uses DC parts to hidesecret
bits in a sequence manner in Least significant Bits. Their
values indicate that the proposed tool provides a relatively a
high embedding storage with no visual damage in the
resulting image, whereas it enhances the security level and
manages the correctness of the hidden data. S. Esra et.al [14]
discussed about the storage and security problems of text
steganography that have been considered to do better by
propose scheme of a novel approach. The proposed scheme
has been reached to 7.042% for hidden messages that
contains 300 characters. Experimental results obtains that
the proposed scheme provides a significantaddition interms
of capacity. Q.T.Thach et.al [12] describesthework inneedto
find the modified pixels, or residuals, as an artifact of the
embedding process. This paper establishes an excellence
result that addresses shortcoming: shows that the expected
mean residuals contain enough data to order logically the
located payload provided that the size of the payload in each
stego image varies. S.H.J et.al [15] discussed aboutthreedata
hiding methods that are proposed, that are based upon the
features of DNA sequences. For each method, a
corresponding DNA sequence S is selected and the hidden
message M is incorporated into it so that S’ is produced. S’ is
then transfer to the receiver and the receiver is able to
recognize and extract the message M hidden in S’. Finally,
experimental results indicate a better performance of the
proposed methods in comparison to the performance of the
traditional methods.W.Kan et.al [19] describes technique is
based on manipulating the quantization table and quantized
discrete cosine transformation coefficients. Experimental
reports show that the proposed method attains both high
storage and high image quality without any damage.
G.X.Z.D.Yang et.al [4] discussed about discrete STA, there are
four basic operators like swap, shift, symmetry and
substitute as well as the “risk and restore in probability”
strategy. Firstly, main concern is on a parametricstudyof the
restore probability p1 and risk probability p2. To effectively
deal with the head pressure constraints, it investigates the
effect of penalty coefficient and finds enforcement on the
performance of the algorithm. Based on the experience
gained from the training of the Two-Loop network problem,
the discrete STA has successfully achieved the best known
results for the Hanoi and New York problems. S.K.Ket.al[16]
describes paper proposes a scheme by compressingencoded
data with the help of a subservient data and Huffman coding.
The encoded data is then compressed using a quantization
mechanism and Huffman coding. To quantize the image
subservient data obtained by the data owner is used. The
quantized values are then coded by the use of Huffman
coding. Experimental resultsshowthatthecompressionratio
distortion performance of this method is superior to the
traditional Techniques. T. Turkeret.al[18]discussedabout a
new data hiding technique is proposed based on hidden
sharing scheme with the DNA exclusive operator for color
images. Each input value of truth table is analyzed and
according to that analysis, highest PSNR value is selected for
secret sharing. The comparison of these techniquesindicates
that proposed techniques give the most successful result.
M.Samiha et.al [11] describes paper presents a
comprehensive analysis between the DNA-based play RSA,
AES ciphers, fair, and vigenere each combined with a DNA
hiding method. The conducted analysis results the
performance diversity of each combined method in terms of
security, speed, hidden storage in addition to both key size
and data size. J.Reza et.al [6] discussed about, improvement
of image compression through steganography. The first
scheme in addition to a steganographic algorithm with the
baseline DCT-based JPEG, while the next one uses this
steganographic algorithm with the DWT-based JPEG. In this
paper data compression is performed two times.
Experimental results shows for this promising method to
have wide potential /in image code.
3. PROBLEM FORMULATION
On the basis of literature survey it is found that the
technique that was widely used for the purpose of image
steganography was LSB (Least Significant Bit). The main
unsolved issue is pixel variation in the imagewhileusing LSB
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2847
(Least Significant Bit) technique. Many techniqueshavebeen
combined with LSB such as Laplacian Pyramid, Chaos,
genetic algorithm etc to provide a solution of variation of
pixel but have no positive impact on the issue. Another
problem is regarding the security of the data that is hidden
behind the image. Hence there is a requirement to develop
such a technique that can be able to secure thedata aswell as
maintain the effects of pixel variation in the image that occur
after hiding the data.
4. PROPOSED WORK
As steganography is the process of hidingthedata in
the image. Various techniques have been proposed but still
the security of the data that is one of the major concerns
while the data transferred is not achieved. So by studying
various techniques a new method is to be proposed in which
the security of the data is increased. Before hiding the data
first of all compression by Huffman Encoding technique will
be applied to the data and then DNA is applied forencrypting
the data. State Transition optimization is used for hiding the
data behind the image. By compressionandencryptionof the
data its security level is increased and is not easily
detectable. The proposed work aims to increase the security
of the hidden data by applying the HE, DNA and ST.
5. METHODOLOGY
The proposed work is divided into two parts first
one is to hide the data and second is to extract the hidden
data from stego image. The methodology for the proposed
work is given as:
 Data Embedding
1. Initially, select the cover image under whichdata will
be hidden. Correspondingly, enter the text which is
required to be hidden under the selected cover
image.
2. Apply State Transition technique over the entered
text for the hiding process. On the other side,
Huffman encoding has applied over the entered text.
3. Then Encryption has applied over the compressed
data and sends it forward for the hiding of data.
4. Once the compression, Encryption and hiding
processes are done, final stego image has acquired in
this stage.
Fig- 2: Block Diagram for data embedding
 Data Extraction
At sender’s side, text is hidden under cover image and at
receiver’s side it is uncover. The steps which are followed by
the process are given as:
1. In the beginning selects a stego image on which
operation has been performed.
2. Perform data extraction operation over the stego
image.
3. Then perform decryption of data or text using DNA
approach.
4. After decrypting the text, perform decompression
over the text using Huffman algorithm.
5. Obtain extracted text from the stego image.
Fig-3: Bock Diagram for data extraction
6. RESULTS AND DISCUSSIONS
This section of the paper concludes the objectivesof
the study in terms of results. Experiments have performed
using several techniques and their performances are
measured in terms of two parameters such as Peak Signal to
Noise Ratio and Mean Square Error.
For the simulation, three different images such as
Mandrill image, Lena image and Flower image has been
taken. Each image has measured over performance
parameters and different techniques i.e. 1-LSB, 2-LSB, LF-
DCT, MF-DCT and proposed are applied. The performance of
each technique with different images has shown below. The
comparison between different technique using different
images concludes the proficiency of the proposed technique
in terms of different existing techniques.
The graph below shows the PSNR of the Mandrill
image, where five different techniques are applied over a
single image. Among these techniques, MF-DCT produces
least PSNR value which shows the high amount of noise in
the image. Alternatively,proposedtechniqueoutperformsall
in terms of PSNR value as in this technique high amount of
data lays with respect to noise.
Select Cover
Image
Apply data hiding
by using ST
Final Stego Image
Enter Text
Apply DNA to
encrypt the data
Apply Huffman to
compress the
data
Select Stego Image
Extracted text
Perform decryption by applying DNA
Perform Data Extraction
Perform decompression by Huffman
algorithm
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2848
0 100 200 300 400 500 600 700 800 900 1000
35
40
45
50
55
60
65
70
Message Size
PSNR(dB)
Peak Signal to Noise Ratio(Mandrill Image)
1-LSB
2-LSB
LF-DCT
MF-DCT
Proposed
Chart-1: Comparison of different techniques in terms of
PSNR(MandrilImage)
0 100 200 300 400 500 600 700 800 900 1000
0
2
4
6
8
10
12
14
16
18
Message Size
Mean Square Error (Mandrill Image)
1-LSB
2-LSB
LF-DCT
MF-DCT
Proposed
Chart-2: Comparison of different techniques in terms of
MSE (Mandrill Image)
The chart 3 and 4 showstheperformanceparameter
PSNR and MSE applied on the Lena image. The techniques
are measured on the size of the message. In chart 3 , with
variations in the message size, each technique’s efficiency is
also varies. The proposed technique is superior to other
techniques as the PSNR of the proposed technique is quite
high.
0 100 200 300 400 500 600 700 800 900 1000
30
35
40
45
50
55
60
65
70
Message Size
PSNR(dB)
Peak Signal to Noise Ratio(Lena Image)
1-LSB
2-LSB
LF-DCT
MF-DCT
Proposed
Chart-3: Comparison of different techniques in terms of
PSNR (Lena Image)
The chart 4 reveals the MSE of each technique with
respect to message size. The LF-DCT exposes the high MSE
that means its efficiency is lower in comparison with other
techniques. The least MSE value is of proposed technique
which ensures that the proposed technique is better.
0 100 200 300 400 500 600 700 800 900 1000
0
5
10
15
20
25
30
Message Size
Mean Square Error (Lena Image)
1-LSB
2-LSB
LF-DCT
MF-DCT
Proposed
Chart-4: Comparison of different techniques in terms of
MSE (Lena Image)
0 100 200 300 400 500 600 700 800 900 1000
40
45
50
55
60
65
70
75
Message Size
PSNR(dB)
Peak Signal to Noise Ratio(Flower Image)
1-LSB
2-LSB
LF-DCT
MF-DCT
Proposed
Chart-5: Comparison of different techniques in terms of
PSNR (Flower Image)
The chart 5 and 6 depicts the PSNR and MSE
parameter in Flower image. And in both the parameters, the
result of the proposed technique is enhanced in comparison
with other techniques. In both charts, PSNR is higher and
MSE is low that confirms its stability,accuracy and
proficiency.
0 100 200 300 400 500 600 700 800 900 1000
0
1
2
3
4
5
6
7
Message Size
Mean Square Error (Flower Image)
1-LSB
2-LSB
LF-DCT
MF-DCT
Proposed
Chart- 6: Comparison of different techniques in terms of
MSE (Flower Image)
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2849
Table-1: Testing measurements of the proposed technique
The performance of the proposed technique and
existing techniques has measured which are indicatedinthe
above table. The acquired values from the results identified
the performance of individual technique and conclude that
proposed technique is more efficient in comparison with
other traditional techniques. The PSNR parameter of each
image is high in the proposed technique with respect to
traditional technique’s PSNR. Correspondingly, MSE is low
Image Used
Message Size
(Characters)
1-LSB MSE 1-LSB PSNR 2-LSB MSE
2-LSB
PSNR
Proposed
MSE
Proposed
PSNR
Mandrill
50 9 .7654 38 .234 9 .7804 38 .227
0.0089 68.6327
100
9 .7766
38 .229
9 .8017
38 .218
0.0204 65.0332
500 9 .8519
38 .196 9 .9584 38 .149 0.1106 57.6927
1000 9 .8543 38 .195 10 .158 38 .063 0.2193 54.7204
Lena
50 13 .227
36 .916 13 .237 36 .913 0.0097 68.2650
100
13 .234
36 .914 13 .258
36 .906 0.0241 64.3116
500 13 .33 36 .882 13 .422 36 .852 0.1179
57.4148
1000 13 .333 36 .882 13 .63 36 .786 0.2468 54.2071
Flower
50 3 .0462 43 .293 3 .0468 43 .292
0.0062 70.1890
100 3 .0468 43 .292
3 .0482
43 .29
0.0136 66.7940
500 3 .0525 43 .284 3 .0589 43 .275 0.0744 59.4153
1000 3 .0594 43 .274 3 .0732 43 .255 0.1499 56.3714
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2850
in the proposed technique for eachimageascomparedto the
existing techniques. Consequently, the proposed technique
surpasses the each existing technique.
7. CONCLUSION AND FUTURE SCOPE
The image steganography techniques have been
used to embed the secret message under the cover image.
The proposed technique has also performedthesimilartask
of stegangraphy with two different algorithms such as DNA
and Huffman. Whereas DNA algorithmisusedforhidingand
decryption of the text and Huffman is used for compression
and decompression of the entered data. The experimental
analysis concludes that the proposed technique surpasses
the other techniques and extracts the message accurately.
The comparison of the proposed technique with other
techniques has been performed which confirms that the
DNA based encryption technique provides high reliability
and security. DCT based steganography provides neutral
results and has distortion, 1-LSB and 2-LSB based
algorithms have least PSNR andhighMSEandhavemaximal
distortion. Consequently, proposedtechniqueresultantinto
low MSE and High PSNR whichconcludeslessdistortionand
high security.
For the future research, the present work can be
applied over the different media such as video. Moreover,
the State transition algorithm which is used for the
optimization in the proposed work can also be replaced
with the more superior optimization algorithm.
REFERENCES
[1] B.M.Baritha,V.Y,” LSB Based Audio Steganography
Based On Text Compression”, in International Conference on
Communication Technology and System Design, vol 30,Pp
703-710,2012.
[2] D.Prasenjit,D.Subhrajyoti,K.Nirmalaya,B.Baby,” An
Improved DNA based Dual Cover Steganography”, in
ICICT,vol 46,Pp 604-611,2016.
[3] E.N.N.EI, Z.R.A.S.AL,”New steganography algorithm to
conceal a large amount of secret message using hybrid
adaptive neural networks with modified adaptive genetic
algorithm”, in the Journal of systems and softwares, vol
86,Pp 1465-1481,2013.
[4] G.X.Z.D.Yang,S.A.R,“Optimal Designof WaterDistribution
Networks by Discrete State Transition Algorithm” Pp 1-14,
2013.
[5] J.I.F,D.K.A,Z.R.T.AI,S.R.R,”An efficient reversible data
hiding algorithm usingtwosteganographic images”,in Signal
Processing, vol 128,Pp 98-109,2016.
[6] J.Reza, Z.Djemel, R.M.Mehdi,” Increasing image
compression rate using steganography”, in Experts Systems
with Applications, vol 40, Pp 6918-6927, 2013.
[7] L.Hongjun, L.Da, K.Abdurahman,”A novel data hiding
method based on deoxyribonucleic acid coding”, in
Computers and Electrical Engineering,,vol 39,Pp 1164-
1173,2013.
[8] ] L.J.Fen,T.Y-Guo,H.Tao.Y.C-Fang,L.W-Bin,” LSB
steganographic payload location for JPEG-decompressed
images”, in Digital Signal Processing,Pp 1-11,2014.
[9] L.Y-Kai,”A data hidingschemebaseduponDCTcoefficient
modification”, in Computer Standards&Interfaces,vol 36,Pp
855-862,2014.
[10] M.P, K.T.Gireesh,” Relating the embedding efficiency of
LSB Steganography techniques in Spatial and Transform
domains”,in
ICACC,vol 93,Pp 878-885,2016.
[11] M.Samiha,S. Ahmed, N. Khaled,”DNA-based
cryptographic methods for data hiding in DNA media”, in
Biosystems, vol 150, Pp 110-118, 2016.
[12] Q.T.Thach,“Extracting hidden messages in
steganographic images” in Digital Investigation,vol 11,Pp
S40-S45, 2014.
[13] R.S.A-EI, “A comparative analysis of image
steganography based on DCT algorithm and steganography
tool to hide nuclear reactors confidential information” in
Computers and Electrical Engineering, Pp 1-20, 2016.
[14]S.Esra,I. Hakan, “A compression-based text
steganography method” in The Journal of Systems and
Softwares, vol 85,Pp 2385-2394, 2012.
[15] S.H.J, Ng.K.L, F.J.F, L.R.C.T, H.C.H, “Data hiding methods
based upon DNA sequences” in Information Sciences, vol
180,Pp 2196-2208, 2010.
[16]S.K.K,J.S.P,K.S.Kumar,” Efficient CompressionofSecured
Images using Subservient Data and Huffman Coding” in
RAEREST, vol 25,Pp 60-67,2016.
[17] S.K,P.P,T.Dr.P,M.Dr.C.M,”Dual Steganography approach
for secure data communication”,in International
Conferencing on Modelling,Optimisation andComputing,vol
38,Pp 412-417,2012.
[18] T.Turker, A.Engin,” A reversible data hiding algorithm
based on probabilistic DNA-XOR secret sharing scheme for
color images” in Displays, vol 41, Pp 1-8, 2016.
[19] W.Kan, L.Z-Ming, Hu.Y- Jian, “A high capacity lossless
data hiding scheme for JPEG images” in the Journal of
Systems and Software , Pp 1-11,2013.
[20] Z.Xiaojun, G.D.Yang, Y.Chunhua, G.Weihua,” Discrete
state transition algorithm for unconstrained integer
optimization problems”, in Neurocomputing, vol 173, Pp
864-874, 2016.

More Related Content

What's hot

High performance intrusion detection using modified k mean & naïve bayes
High performance intrusion detection using modified k mean & naïve bayesHigh performance intrusion detection using modified k mean & naïve bayes
High performance intrusion detection using modified k mean & naïve bayeseSAT Journals
 
A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...ijsptm
 
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...eSAT Journals
 
IRJET- An Overview of Hiding Information in H.264/Avc Compressed Video
IRJET- An Overview of Hiding Information in H.264/Avc Compressed VideoIRJET- An Overview of Hiding Information in H.264/Avc Compressed Video
IRJET- An Overview of Hiding Information in H.264/Avc Compressed VideoIRJET Journal
 
Conditional entrench spatial domain steganography
Conditional entrench spatial domain steganographyConditional entrench spatial domain steganography
Conditional entrench spatial domain steganographysipij
 
Image steganography using least significant bit and secret map techniques
Image steganography using least significant bit and  secret map techniques Image steganography using least significant bit and  secret map techniques
Image steganography using least significant bit and secret map techniques IJECEIAES
 
An Architectural Approach of Data Hiding In Images Using Mobile Communication
An Architectural Approach of Data Hiding In Images Using Mobile CommunicationAn Architectural Approach of Data Hiding In Images Using Mobile Communication
An Architectural Approach of Data Hiding In Images Using Mobile Communicationiosrjce
 
A Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
A Secure & Optimized Data Hiding Technique Using DWT With PSNR ValueA Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
A Secure & Optimized Data Hiding Technique Using DWT With PSNR ValueIJERA Editor
 
IRJET- Encryption and Authentication of Image by using Data Hiding
IRJET- Encryption and Authentication of Image by using Data HidingIRJET- Encryption and Authentication of Image by using Data Hiding
IRJET- Encryption and Authentication of Image by using Data HidingIRJET Journal
 
Conceptual design of edge adaptive steganography scheme based on advanced lsb...
Conceptual design of edge adaptive steganography scheme based on advanced lsb...Conceptual design of edge adaptive steganography scheme based on advanced lsb...
Conceptual design of edge adaptive steganography scheme based on advanced lsb...IAEME Publication
 
Intelligent Handwritten Digit Recognition using Artificial Neural Network
Intelligent Handwritten Digit Recognition using Artificial Neural NetworkIntelligent Handwritten Digit Recognition using Artificial Neural Network
Intelligent Handwritten Digit Recognition using Artificial Neural NetworkIJERA Editor
 
A Survey on Different Data Hiding Techniques in Encrypted Images
A Survey on Different Data Hiding Techniques in Encrypted ImagesA Survey on Different Data Hiding Techniques in Encrypted Images
A Survey on Different Data Hiding Techniques in Encrypted Imagesijsrd.com
 
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...IRJET Journal
 
Using Cisco Network Components to Improve NIDPS Performance
Using Cisco Network Components to Improve NIDPS Performance Using Cisco Network Components to Improve NIDPS Performance
Using Cisco Network Components to Improve NIDPS Performance csandit
 
A Review on Reversible Data Hiding Scheme by Image Contrast Enhancement
A Review on Reversible Data Hiding Scheme by Image Contrast EnhancementA Review on Reversible Data Hiding Scheme by Image Contrast Enhancement
A Review on Reversible Data Hiding Scheme by Image Contrast EnhancementIJERA Editor
 
A Review on Text Mining in Data Mining
A Review on Text Mining in Data MiningA Review on Text Mining in Data Mining
A Review on Text Mining in Data Miningijsc
 
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...Dr. Amarjeet Singh
 

What's hot (19)

High performance intrusion detection using modified k mean & naïve bayes
High performance intrusion detection using modified k mean & naïve bayesHigh performance intrusion detection using modified k mean & naïve bayes
High performance intrusion detection using modified k mean & naïve bayes
 
A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...
 
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...
 
Ijariie1132
Ijariie1132Ijariie1132
Ijariie1132
 
IRJET- An Overview of Hiding Information in H.264/Avc Compressed Video
IRJET- An Overview of Hiding Information in H.264/Avc Compressed VideoIRJET- An Overview of Hiding Information in H.264/Avc Compressed Video
IRJET- An Overview of Hiding Information in H.264/Avc Compressed Video
 
Conditional entrench spatial domain steganography
Conditional entrench spatial domain steganographyConditional entrench spatial domain steganography
Conditional entrench spatial domain steganography
 
Image steganography using least significant bit and secret map techniques
Image steganography using least significant bit and  secret map techniques Image steganography using least significant bit and  secret map techniques
Image steganography using least significant bit and secret map techniques
 
An Architectural Approach of Data Hiding In Images Using Mobile Communication
An Architectural Approach of Data Hiding In Images Using Mobile CommunicationAn Architectural Approach of Data Hiding In Images Using Mobile Communication
An Architectural Approach of Data Hiding In Images Using Mobile Communication
 
A Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
A Secure & Optimized Data Hiding Technique Using DWT With PSNR ValueA Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
A Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
 
IRJET- Encryption and Authentication of Image by using Data Hiding
IRJET- Encryption and Authentication of Image by using Data HidingIRJET- Encryption and Authentication of Image by using Data Hiding
IRJET- Encryption and Authentication of Image by using Data Hiding
 
Conceptual design of edge adaptive steganography scheme based on advanced lsb...
Conceptual design of edge adaptive steganography scheme based on advanced lsb...Conceptual design of edge adaptive steganography scheme based on advanced lsb...
Conceptual design of edge adaptive steganography scheme based on advanced lsb...
 
Intelligent Handwritten Digit Recognition using Artificial Neural Network
Intelligent Handwritten Digit Recognition using Artificial Neural NetworkIntelligent Handwritten Digit Recognition using Artificial Neural Network
Intelligent Handwritten Digit Recognition using Artificial Neural Network
 
A Survey on Different Data Hiding Techniques in Encrypted Images
A Survey on Different Data Hiding Techniques in Encrypted ImagesA Survey on Different Data Hiding Techniques in Encrypted Images
A Survey on Different Data Hiding Techniques in Encrypted Images
 
G017444651
G017444651G017444651
G017444651
 
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
 
Using Cisco Network Components to Improve NIDPS Performance
Using Cisco Network Components to Improve NIDPS Performance Using Cisco Network Components to Improve NIDPS Performance
Using Cisco Network Components to Improve NIDPS Performance
 
A Review on Reversible Data Hiding Scheme by Image Contrast Enhancement
A Review on Reversible Data Hiding Scheme by Image Contrast EnhancementA Review on Reversible Data Hiding Scheme by Image Contrast Enhancement
A Review on Reversible Data Hiding Scheme by Image Contrast Enhancement
 
A Review on Text Mining in Data Mining
A Review on Text Mining in Data MiningA Review on Text Mining in Data Mining
A Review on Text Mining in Data Mining
 
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
 

Similar to Hybrid Approach for Improving Data Security and Size Reduction in Image Steganography

A Literature Review on Image Steganography Using AES
A Literature Review on Image Steganography Using AESA Literature Review on Image Steganography Using AES
A Literature Review on Image Steganography Using AESIRJET Journal
 
MESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHYMESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHYIRJET Journal
 
A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...
A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...
A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...IJNSA Journal
 
A new image steganography algorithm based
A new image steganography algorithm basedA new image steganography algorithm based
A new image steganography algorithm basedIJNSA Journal
 
IJSRED-V2I2P12
IJSRED-V2I2P12IJSRED-V2I2P12
IJSRED-V2I2P12IJSRED
 
Iaetsd eliminating hidden data from an image
Iaetsd eliminating hidden data from an imageIaetsd eliminating hidden data from an image
Iaetsd eliminating hidden data from an imageIaetsd Iaetsd
 
Enhanced Efficient & Secure Steganography Algorithm with Low Distortion
Enhanced Efficient & Secure Steganography Algorithm with Low DistortionEnhanced Efficient & Secure Steganography Algorithm with Low Distortion
Enhanced Efficient & Secure Steganography Algorithm with Low DistortionIRJET Journal
 
PERFORMANCE ANALYSIS OF TEXT AND IMAGE STEGANOGRAPHY WITH RSA ALGORITHM IN CL...
PERFORMANCE ANALYSIS OF TEXT AND IMAGE STEGANOGRAPHY WITH RSA ALGORITHM IN CL...PERFORMANCE ANALYSIS OF TEXT AND IMAGE STEGANOGRAPHY WITH RSA ALGORITHM IN CL...
PERFORMANCE ANALYSIS OF TEXT AND IMAGE STEGANOGRAPHY WITH RSA ALGORITHM IN CL...ijseajournal
 
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...IRJET Journal
 
An Improved Noise Resistant Image Steganography Technique using Zero Cross Ed...
An Improved Noise Resistant Image Steganography Technique using Zero Cross Ed...An Improved Noise Resistant Image Steganography Technique using Zero Cross Ed...
An Improved Noise Resistant Image Steganography Technique using Zero Cross Ed...IRJET Journal
 
RSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT ApproachRSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT ApproachIJERA Editor
 
Hybrid information security system via combination of compression, cryptogra...
Hybrid information security system via combination of  compression, cryptogra...Hybrid information security system via combination of  compression, cryptogra...
Hybrid information security system via combination of compression, cryptogra...IJECEIAES
 
A Review of Comparison Techniques of Image Steganography
A Review of Comparison Techniques of Image SteganographyA Review of Comparison Techniques of Image Steganography
A Review of Comparison Techniques of Image SteganographyIOSR Journals
 
Review On Encrypting and Decrypting Message Via Image Slicing
Review On Encrypting and Decrypting Message Via Image SlicingReview On Encrypting and Decrypting Message Via Image Slicing
Review On Encrypting and Decrypting Message Via Image SlicingIRJET Journal
 
IRJET- Hybrid Approach to Text & Image Steganography using AES and LSB Te...
IRJET-  	  Hybrid Approach to Text & Image Steganography using AES and LSB Te...IRJET-  	  Hybrid Approach to Text & Image Steganography using AES and LSB Te...
IRJET- Hybrid Approach to Text & Image Steganography using AES and LSB Te...IRJET Journal
 
IRJET-Securing High Capacity Data Hiding using Combined Data Hiding Techniques
IRJET-Securing High Capacity Data Hiding using Combined Data Hiding TechniquesIRJET-Securing High Capacity Data Hiding using Combined Data Hiding Techniques
IRJET-Securing High Capacity Data Hiding using Combined Data Hiding TechniquesIRJET Journal
 
ADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUES
ADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUESADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUES
ADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUESIRJET Journal
 

Similar to Hybrid Approach for Improving Data Security and Size Reduction in Image Steganography (20)

A Literature Review on Image Steganography Using AES
A Literature Review on Image Steganography Using AESA Literature Review on Image Steganography Using AES
A Literature Review on Image Steganography Using AES
 
MESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHYMESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHY
 
A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...
A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...
A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...
 
A new image steganography algorithm based
A new image steganography algorithm basedA new image steganography algorithm based
A new image steganography algorithm based
 
IJSRED-V2I2P12
IJSRED-V2I2P12IJSRED-V2I2P12
IJSRED-V2I2P12
 
Iaetsd eliminating hidden data from an image
Iaetsd eliminating hidden data from an imageIaetsd eliminating hidden data from an image
Iaetsd eliminating hidden data from an image
 
Enhanced Efficient & Secure Steganography Algorithm with Low Distortion
Enhanced Efficient & Secure Steganography Algorithm with Low DistortionEnhanced Efficient & Secure Steganography Algorithm with Low Distortion
Enhanced Efficient & Secure Steganography Algorithm with Low Distortion
 
P017329498
P017329498P017329498
P017329498
 
PERFORMANCE ANALYSIS OF TEXT AND IMAGE STEGANOGRAPHY WITH RSA ALGORITHM IN CL...
PERFORMANCE ANALYSIS OF TEXT AND IMAGE STEGANOGRAPHY WITH RSA ALGORITHM IN CL...PERFORMANCE ANALYSIS OF TEXT AND IMAGE STEGANOGRAPHY WITH RSA ALGORITHM IN CL...
PERFORMANCE ANALYSIS OF TEXT AND IMAGE STEGANOGRAPHY WITH RSA ALGORITHM IN CL...
 
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
 
An Improved Noise Resistant Image Steganography Technique using Zero Cross Ed...
An Improved Noise Resistant Image Steganography Technique using Zero Cross Ed...An Improved Noise Resistant Image Steganography Technique using Zero Cross Ed...
An Improved Noise Resistant Image Steganography Technique using Zero Cross Ed...
 
RSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT ApproachRSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT Approach
 
L045056469
L045056469L045056469
L045056469
 
Hybrid information security system via combination of compression, cryptogra...
Hybrid information security system via combination of  compression, cryptogra...Hybrid information security system via combination of  compression, cryptogra...
Hybrid information security system via combination of compression, cryptogra...
 
A Review of Comparison Techniques of Image Steganography
A Review of Comparison Techniques of Image SteganographyA Review of Comparison Techniques of Image Steganography
A Review of Comparison Techniques of Image Steganography
 
Review On Encrypting and Decrypting Message Via Image Slicing
Review On Encrypting and Decrypting Message Via Image SlicingReview On Encrypting and Decrypting Message Via Image Slicing
Review On Encrypting and Decrypting Message Via Image Slicing
 
O017429398
O017429398O017429398
O017429398
 
IRJET- Hybrid Approach to Text & Image Steganography using AES and LSB Te...
IRJET-  	  Hybrid Approach to Text & Image Steganography using AES and LSB Te...IRJET-  	  Hybrid Approach to Text & Image Steganography using AES and LSB Te...
IRJET- Hybrid Approach to Text & Image Steganography using AES and LSB Te...
 
IRJET-Securing High Capacity Data Hiding using Combined Data Hiding Techniques
IRJET-Securing High Capacity Data Hiding using Combined Data Hiding TechniquesIRJET-Securing High Capacity Data Hiding using Combined Data Hiding Techniques
IRJET-Securing High Capacity Data Hiding using Combined Data Hiding Techniques
 
ADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUES
ADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUESADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUES
ADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUES
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...Call Girls in Nagpur High Profile
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 

Recently uploaded (20)

Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 

Hybrid Approach for Improving Data Security and Size Reduction in Image Steganography

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2845 HYBRID APPROACH FOR IMPROVING DATA SECURITY AND SIZE REDUCTION IN IMAGE STEGANOGRAPHY Mandeep Kaur1, Asst.Prof. Rupinder Kaur Randhawa2 1Mandeep Kaur, Dept.of Computer Science and Engineering, Baba Banda Singh Bahadur Engineering College, Punjab, India 2Asst. Prof. Rupinder kaur Randhawa, Dept.of Computer Science and Engineering, Baba Banda Singh Bahadur Engineering College, Punjab, India ------------------------------------------------------------------***------------------------------------------------------------------ Abstract – Image steganography is used to hide the secret message under a cover image in order to enhance the security. There are several proposed techniques which are focused on the security issue in their work. In this paper, a new technique is presented, implemented and analyzed. The proposedmethod uses three different techniques such as Huffman encoding, Deoxyribonucleic acid and State Transition. Initially, Huffman is applied over the text for the compression, and then Deoxyribonucleic acid is applied over the compressed data for the encryption and lastly State Transition algorithm has used for updating the location in the image. Theapplicationofthese algorithms provides high security in comparison with the traditional algorithms. The implementation of these algorithms is done with respect to message bits. Total three images are used for the evaluation of traditionalandproposed techniques in which the message bit varies from fifty to hundred. The simulation analysis concludes that the proposed method is efficient, more secure and proficient in comparison with other techniques such as LSBs, LF-DCT and MF-DCT. The parameters PSNR and MSE are used for the evaluation of their performance. Keywords: Steganography, Cryptography, Huffman Encoding, Deoxyribonucleic acid, State Transition. 1. INTRODUCTION Steganography isthewordtakenfromthetwoGreek words as “steganos” and “graphic” which mean “concealed” and “writing” respectively. Jointly it referred as concealed (hidden or covered) the message. Accordingly, steganography is the process of hiding the message before transmitting it to the receiver. Data can be hidden within another digital medium such as text, image, audio or video. With the application of this technique intruder will not be able to suspect the existence of the message. Basic idea or motivation behind implementation of image steganography is to communicate between the members without having fear of being attacked of messages. Due to its advantages, it has been used in several areas including military, intelligence operatives or bureaus. These fields of espionage required a method which can hide their critical data and no intermediate person can evaluate the meaning of the data. The main goal of using steganography istoavoidthe attention of the attacker from the hidden information in the transmitted as if attacker would come to know that there isa hidden data into the sent messagethenobserverwill tryeach possible idea so that he can read the hidden message. Fig-1: Process of steganography Steganography can be applied with cryptography. Fig-1 shows the model of steganography process with cryptography. 1.1 Techniques for Steganography Steganography provides variousmethods whichcan be used to embed the data with the cover object. Techniques for the steganography are classified such as:  Spatial Domain Methods: In this type of Steganography method, data that needs to be hidden is directly embed with the current intensity of the pixels. Which resultant into the change of pixel values of the image directly at the time of hiding data. Some of the spatial domain techniques are: (1) Least Significant Bit (LSB) (2) Pixel value Differencing (PVD) (3) Edges based Data Embedding Method (EBE) (4) Random pixel embedding method (RPE) (5) Mapping pixel to hidden data method (6) Labeling or connectivity method Select image to hide data Algorithm for encrypting data Image after steganography Secret message
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2846 (7) Pixel intensity based (8) Texture based method  Transform Domain Technique: In this type of technique message is embedded in the frequency domain of the cover object.Several algorithms and transformations can be used to conceal the message into image. Classifications on the transfer domain are mentioned below: (1) Discrete Fourier transformation technique (DFT) (2) Discrete cosine transformation technique (DCT) (3) Discrete Wavelet transformation technique (DWT) (4) Lossless or reversible method (DCT) (5) Embedding in coefficient bits 1.2 Data Compression There are number of techniques available used for data compression such as “Lossy” compression.Insuchtechnique it provides help in reducing the actual amount of the data. Basically, it reduces the size of the information by losing redundant part of it. Image format JPEG uses Lossy compression technique. Lost information can be restored after performing decompression on the targeted image. Alternatively, “Lossless” compression techniquedoesnot discard any of the information fromtheoriginal image.There are different techniques available for lossy and lossless compression which can be chosen according to the requirements. Compression means reduction of redundant data but retains the quality of the image. There are two types of techniques that are used to compress the image. A. Lossless compression technique B. Lossy compression technique 2. LITERATURE SURVEY R.S.A-EI et.al [13] describes discrete Cosine Transform based steganography uses DC parts to hidesecret bits in a sequence manner in Least significant Bits. Their values indicate that the proposed tool provides a relatively a high embedding storage with no visual damage in the resulting image, whereas it enhances the security level and manages the correctness of the hidden data. S. Esra et.al [14] discussed about the storage and security problems of text steganography that have been considered to do better by propose scheme of a novel approach. The proposed scheme has been reached to 7.042% for hidden messages that contains 300 characters. Experimental results obtains that the proposed scheme provides a significantaddition interms of capacity. Q.T.Thach et.al [12] describesthework inneedto find the modified pixels, or residuals, as an artifact of the embedding process. This paper establishes an excellence result that addresses shortcoming: shows that the expected mean residuals contain enough data to order logically the located payload provided that the size of the payload in each stego image varies. S.H.J et.al [15] discussed aboutthreedata hiding methods that are proposed, that are based upon the features of DNA sequences. For each method, a corresponding DNA sequence S is selected and the hidden message M is incorporated into it so that S’ is produced. S’ is then transfer to the receiver and the receiver is able to recognize and extract the message M hidden in S’. Finally, experimental results indicate a better performance of the proposed methods in comparison to the performance of the traditional methods.W.Kan et.al [19] describes technique is based on manipulating the quantization table and quantized discrete cosine transformation coefficients. Experimental reports show that the proposed method attains both high storage and high image quality without any damage. G.X.Z.D.Yang et.al [4] discussed about discrete STA, there are four basic operators like swap, shift, symmetry and substitute as well as the “risk and restore in probability” strategy. Firstly, main concern is on a parametricstudyof the restore probability p1 and risk probability p2. To effectively deal with the head pressure constraints, it investigates the effect of penalty coefficient and finds enforcement on the performance of the algorithm. Based on the experience gained from the training of the Two-Loop network problem, the discrete STA has successfully achieved the best known results for the Hanoi and New York problems. S.K.Ket.al[16] describes paper proposes a scheme by compressingencoded data with the help of a subservient data and Huffman coding. The encoded data is then compressed using a quantization mechanism and Huffman coding. To quantize the image subservient data obtained by the data owner is used. The quantized values are then coded by the use of Huffman coding. Experimental resultsshowthatthecompressionratio distortion performance of this method is superior to the traditional Techniques. T. Turkeret.al[18]discussedabout a new data hiding technique is proposed based on hidden sharing scheme with the DNA exclusive operator for color images. Each input value of truth table is analyzed and according to that analysis, highest PSNR value is selected for secret sharing. The comparison of these techniquesindicates that proposed techniques give the most successful result. M.Samiha et.al [11] describes paper presents a comprehensive analysis between the DNA-based play RSA, AES ciphers, fair, and vigenere each combined with a DNA hiding method. The conducted analysis results the performance diversity of each combined method in terms of security, speed, hidden storage in addition to both key size and data size. J.Reza et.al [6] discussed about, improvement of image compression through steganography. The first scheme in addition to a steganographic algorithm with the baseline DCT-based JPEG, while the next one uses this steganographic algorithm with the DWT-based JPEG. In this paper data compression is performed two times. Experimental results shows for this promising method to have wide potential /in image code. 3. PROBLEM FORMULATION On the basis of literature survey it is found that the technique that was widely used for the purpose of image steganography was LSB (Least Significant Bit). The main unsolved issue is pixel variation in the imagewhileusing LSB
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2847 (Least Significant Bit) technique. Many techniqueshavebeen combined with LSB such as Laplacian Pyramid, Chaos, genetic algorithm etc to provide a solution of variation of pixel but have no positive impact on the issue. Another problem is regarding the security of the data that is hidden behind the image. Hence there is a requirement to develop such a technique that can be able to secure thedata aswell as maintain the effects of pixel variation in the image that occur after hiding the data. 4. PROPOSED WORK As steganography is the process of hidingthedata in the image. Various techniques have been proposed but still the security of the data that is one of the major concerns while the data transferred is not achieved. So by studying various techniques a new method is to be proposed in which the security of the data is increased. Before hiding the data first of all compression by Huffman Encoding technique will be applied to the data and then DNA is applied forencrypting the data. State Transition optimization is used for hiding the data behind the image. By compressionandencryptionof the data its security level is increased and is not easily detectable. The proposed work aims to increase the security of the hidden data by applying the HE, DNA and ST. 5. METHODOLOGY The proposed work is divided into two parts first one is to hide the data and second is to extract the hidden data from stego image. The methodology for the proposed work is given as:  Data Embedding 1. Initially, select the cover image under whichdata will be hidden. Correspondingly, enter the text which is required to be hidden under the selected cover image. 2. Apply State Transition technique over the entered text for the hiding process. On the other side, Huffman encoding has applied over the entered text. 3. Then Encryption has applied over the compressed data and sends it forward for the hiding of data. 4. Once the compression, Encryption and hiding processes are done, final stego image has acquired in this stage. Fig- 2: Block Diagram for data embedding  Data Extraction At sender’s side, text is hidden under cover image and at receiver’s side it is uncover. The steps which are followed by the process are given as: 1. In the beginning selects a stego image on which operation has been performed. 2. Perform data extraction operation over the stego image. 3. Then perform decryption of data or text using DNA approach. 4. After decrypting the text, perform decompression over the text using Huffman algorithm. 5. Obtain extracted text from the stego image. Fig-3: Bock Diagram for data extraction 6. RESULTS AND DISCUSSIONS This section of the paper concludes the objectivesof the study in terms of results. Experiments have performed using several techniques and their performances are measured in terms of two parameters such as Peak Signal to Noise Ratio and Mean Square Error. For the simulation, three different images such as Mandrill image, Lena image and Flower image has been taken. Each image has measured over performance parameters and different techniques i.e. 1-LSB, 2-LSB, LF- DCT, MF-DCT and proposed are applied. The performance of each technique with different images has shown below. The comparison between different technique using different images concludes the proficiency of the proposed technique in terms of different existing techniques. The graph below shows the PSNR of the Mandrill image, where five different techniques are applied over a single image. Among these techniques, MF-DCT produces least PSNR value which shows the high amount of noise in the image. Alternatively,proposedtechniqueoutperformsall in terms of PSNR value as in this technique high amount of data lays with respect to noise. Select Cover Image Apply data hiding by using ST Final Stego Image Enter Text Apply DNA to encrypt the data Apply Huffman to compress the data Select Stego Image Extracted text Perform decryption by applying DNA Perform Data Extraction Perform decompression by Huffman algorithm
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2848 0 100 200 300 400 500 600 700 800 900 1000 35 40 45 50 55 60 65 70 Message Size PSNR(dB) Peak Signal to Noise Ratio(Mandrill Image) 1-LSB 2-LSB LF-DCT MF-DCT Proposed Chart-1: Comparison of different techniques in terms of PSNR(MandrilImage) 0 100 200 300 400 500 600 700 800 900 1000 0 2 4 6 8 10 12 14 16 18 Message Size Mean Square Error (Mandrill Image) 1-LSB 2-LSB LF-DCT MF-DCT Proposed Chart-2: Comparison of different techniques in terms of MSE (Mandrill Image) The chart 3 and 4 showstheperformanceparameter PSNR and MSE applied on the Lena image. The techniques are measured on the size of the message. In chart 3 , with variations in the message size, each technique’s efficiency is also varies. The proposed technique is superior to other techniques as the PSNR of the proposed technique is quite high. 0 100 200 300 400 500 600 700 800 900 1000 30 35 40 45 50 55 60 65 70 Message Size PSNR(dB) Peak Signal to Noise Ratio(Lena Image) 1-LSB 2-LSB LF-DCT MF-DCT Proposed Chart-3: Comparison of different techniques in terms of PSNR (Lena Image) The chart 4 reveals the MSE of each technique with respect to message size. The LF-DCT exposes the high MSE that means its efficiency is lower in comparison with other techniques. The least MSE value is of proposed technique which ensures that the proposed technique is better. 0 100 200 300 400 500 600 700 800 900 1000 0 5 10 15 20 25 30 Message Size Mean Square Error (Lena Image) 1-LSB 2-LSB LF-DCT MF-DCT Proposed Chart-4: Comparison of different techniques in terms of MSE (Lena Image) 0 100 200 300 400 500 600 700 800 900 1000 40 45 50 55 60 65 70 75 Message Size PSNR(dB) Peak Signal to Noise Ratio(Flower Image) 1-LSB 2-LSB LF-DCT MF-DCT Proposed Chart-5: Comparison of different techniques in terms of PSNR (Flower Image) The chart 5 and 6 depicts the PSNR and MSE parameter in Flower image. And in both the parameters, the result of the proposed technique is enhanced in comparison with other techniques. In both charts, PSNR is higher and MSE is low that confirms its stability,accuracy and proficiency. 0 100 200 300 400 500 600 700 800 900 1000 0 1 2 3 4 5 6 7 Message Size Mean Square Error (Flower Image) 1-LSB 2-LSB LF-DCT MF-DCT Proposed Chart- 6: Comparison of different techniques in terms of MSE (Flower Image)
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2849 Table-1: Testing measurements of the proposed technique The performance of the proposed technique and existing techniques has measured which are indicatedinthe above table. The acquired values from the results identified the performance of individual technique and conclude that proposed technique is more efficient in comparison with other traditional techniques. The PSNR parameter of each image is high in the proposed technique with respect to traditional technique’s PSNR. Correspondingly, MSE is low Image Used Message Size (Characters) 1-LSB MSE 1-LSB PSNR 2-LSB MSE 2-LSB PSNR Proposed MSE Proposed PSNR Mandrill 50 9 .7654 38 .234 9 .7804 38 .227 0.0089 68.6327 100 9 .7766 38 .229 9 .8017 38 .218 0.0204 65.0332 500 9 .8519 38 .196 9 .9584 38 .149 0.1106 57.6927 1000 9 .8543 38 .195 10 .158 38 .063 0.2193 54.7204 Lena 50 13 .227 36 .916 13 .237 36 .913 0.0097 68.2650 100 13 .234 36 .914 13 .258 36 .906 0.0241 64.3116 500 13 .33 36 .882 13 .422 36 .852 0.1179 57.4148 1000 13 .333 36 .882 13 .63 36 .786 0.2468 54.2071 Flower 50 3 .0462 43 .293 3 .0468 43 .292 0.0062 70.1890 100 3 .0468 43 .292 3 .0482 43 .29 0.0136 66.7940 500 3 .0525 43 .284 3 .0589 43 .275 0.0744 59.4153 1000 3 .0594 43 .274 3 .0732 43 .255 0.1499 56.3714
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2850 in the proposed technique for eachimageascomparedto the existing techniques. Consequently, the proposed technique surpasses the each existing technique. 7. CONCLUSION AND FUTURE SCOPE The image steganography techniques have been used to embed the secret message under the cover image. The proposed technique has also performedthesimilartask of stegangraphy with two different algorithms such as DNA and Huffman. Whereas DNA algorithmisusedforhidingand decryption of the text and Huffman is used for compression and decompression of the entered data. The experimental analysis concludes that the proposed technique surpasses the other techniques and extracts the message accurately. The comparison of the proposed technique with other techniques has been performed which confirms that the DNA based encryption technique provides high reliability and security. DCT based steganography provides neutral results and has distortion, 1-LSB and 2-LSB based algorithms have least PSNR andhighMSEandhavemaximal distortion. Consequently, proposedtechniqueresultantinto low MSE and High PSNR whichconcludeslessdistortionand high security. For the future research, the present work can be applied over the different media such as video. Moreover, the State transition algorithm which is used for the optimization in the proposed work can also be replaced with the more superior optimization algorithm. REFERENCES [1] B.M.Baritha,V.Y,” LSB Based Audio Steganography Based On Text Compression”, in International Conference on Communication Technology and System Design, vol 30,Pp 703-710,2012. [2] D.Prasenjit,D.Subhrajyoti,K.Nirmalaya,B.Baby,” An Improved DNA based Dual Cover Steganography”, in ICICT,vol 46,Pp 604-611,2016. [3] E.N.N.EI, Z.R.A.S.AL,”New steganography algorithm to conceal a large amount of secret message using hybrid adaptive neural networks with modified adaptive genetic algorithm”, in the Journal of systems and softwares, vol 86,Pp 1465-1481,2013. [4] G.X.Z.D.Yang,S.A.R,“Optimal Designof WaterDistribution Networks by Discrete State Transition Algorithm” Pp 1-14, 2013. [5] J.I.F,D.K.A,Z.R.T.AI,S.R.R,”An efficient reversible data hiding algorithm usingtwosteganographic images”,in Signal Processing, vol 128,Pp 98-109,2016. [6] J.Reza, Z.Djemel, R.M.Mehdi,” Increasing image compression rate using steganography”, in Experts Systems with Applications, vol 40, Pp 6918-6927, 2013. [7] L.Hongjun, L.Da, K.Abdurahman,”A novel data hiding method based on deoxyribonucleic acid coding”, in Computers and Electrical Engineering,,vol 39,Pp 1164- 1173,2013. [8] ] L.J.Fen,T.Y-Guo,H.Tao.Y.C-Fang,L.W-Bin,” LSB steganographic payload location for JPEG-decompressed images”, in Digital Signal Processing,Pp 1-11,2014. [9] L.Y-Kai,”A data hidingschemebaseduponDCTcoefficient modification”, in Computer Standards&Interfaces,vol 36,Pp 855-862,2014. [10] M.P, K.T.Gireesh,” Relating the embedding efficiency of LSB Steganography techniques in Spatial and Transform domains”,in ICACC,vol 93,Pp 878-885,2016. [11] M.Samiha,S. Ahmed, N. Khaled,”DNA-based cryptographic methods for data hiding in DNA media”, in Biosystems, vol 150, Pp 110-118, 2016. [12] Q.T.Thach,“Extracting hidden messages in steganographic images” in Digital Investigation,vol 11,Pp S40-S45, 2014. [13] R.S.A-EI, “A comparative analysis of image steganography based on DCT algorithm and steganography tool to hide nuclear reactors confidential information” in Computers and Electrical Engineering, Pp 1-20, 2016. [14]S.Esra,I. Hakan, “A compression-based text steganography method” in The Journal of Systems and Softwares, vol 85,Pp 2385-2394, 2012. [15] S.H.J, Ng.K.L, F.J.F, L.R.C.T, H.C.H, “Data hiding methods based upon DNA sequences” in Information Sciences, vol 180,Pp 2196-2208, 2010. [16]S.K.K,J.S.P,K.S.Kumar,” Efficient CompressionofSecured Images using Subservient Data and Huffman Coding” in RAEREST, vol 25,Pp 60-67,2016. [17] S.K,P.P,T.Dr.P,M.Dr.C.M,”Dual Steganography approach for secure data communication”,in International Conferencing on Modelling,Optimisation andComputing,vol 38,Pp 412-417,2012. [18] T.Turker, A.Engin,” A reversible data hiding algorithm based on probabilistic DNA-XOR secret sharing scheme for color images” in Displays, vol 41, Pp 1-8, 2016. [19] W.Kan, L.Z-Ming, Hu.Y- Jian, “A high capacity lossless data hiding scheme for JPEG images” in the Journal of Systems and Software , Pp 1-11,2013. [20] Z.Xiaojun, G.D.Yang, Y.Chunhua, G.Weihua,” Discrete state transition algorithm for unconstrained integer optimization problems”, in Neurocomputing, vol 173, Pp 864-874, 2016.