SlideShare a Scribd company logo
1 of 7
Download to read offline
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 559
Protection of Secret Textual Data Using Steganography Based System
Khalid Buryk S Alqarni
Bishah University, Faculty of computing and Information Technology, Department of Cybersecurity, Bishah City,
Saudi Arabia
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract – Recently, capabilities of attackers have been
increased dramatically in terms of compromising secret data
exchanged amongusersovertheInternet. Usingcryptographic
approaches contribute to ensure confidentiality of data, but
they do not provide secrecy of communication between the
connected parties. Steganography can be used to strengthen
cryptographic approaches by hiding secret data within
innocent audios after passing an encryption stage. This adds
second level of protection against attacks as well as hidingthe
communication itself between sender and receiver. This work
proposed an enhanced steganography-based approach to
protect secret data by embedding within audio files.
Encryption using 3-DES is employed to createthefirstdefense,
while hiding in Least Significant Bit (LSB) creates the second
defense with respect of ensuring high matching betweencover
file and stego file, high resistance against attacks, and high
accuracy of retrieving the hidden data. The proposed
approach achieves better performance intermsofPSNR, SSIM,
and correlation.
Key Words: Cover_object, Hidden_Data, Stego_key,
Stego_object, LSB, Attacker.
1.INTRODUCTION
Steganography and the logic behind it. Steganography
is the technique of hidingsecretdatawithinanordinary,non-
secret, file or message in order to avoid detection. The logic
behind it is related to the fact that states "everything stored
on the computer is converted into zeros and ones", and thus,
it is possible to hide zerosand ones(secretdata)withinother
zeros and ones (other files) [1].
Terms in steganography domain. Secret data, which is
the data that requires protection against malicious actions,
such as illegal modification and unauthorized access. Cover-
Object, which is the file that hosts the secret data. Stego-
Object, which is the file that is generated as an output of
performing hiding process. Stego-Key,whichisthekeythatis
used for encrypting secret data [2].
Statement of problem. The problem is stated based on
the general scenario of encryption, as shown in Figure-1.
Fig -1: General scenario of encryption-based system.
Attackerscan be locatedbetweenthesenderandreceiver,
where the malicious goal is obtaining cipher data through
evadrosping the communication network. In this case,illegal
modification can be applied easily, which in turn means
losing of data integrity. Moreover, the communication
between the sender and receiver is revealed.
Researchquestions.Theresearchquestionscanbelisted
as follows:
1. How to ensure integrity of secret data?
2. How to hide thecommunicationbetweenthesender
and receiver?
Contribution. This paper provides the following
contribution in the field of steganography:
 Proposing two-level of protection using 3-DES
encryption and hiding within audio files.
 Selection of hiding location based on ensuring
lowest level of distortion caused by hiding
process.
 Providing extensiveexperimentstovalidatethe
proposed approach along with comparison
with similar works.
Organization of paper. The paper is structured so that
section 1 provides related work. Section 2 presents the
proposed approach. Section 3 shows the experimental
results. Finally, the paper is concluded in section 4.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 06 | Jun 2023 www.irjet.net p-ISSN: 2395-0072
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 560
2. RELATED WORK
This section provides the state of the art. Systems of
steganographycan be classified basedonthetypeofcover,as
shown in Figure 2.
Fig -2: Classification of steganography-based system.
2.1 Hiding based on images
The problem that authors of [3] handled is related to
small size of payload (hidden secret data) that can be
inserted in the cover file. The proposed system mainly
depends on spreading bits of secret data on all pixels of
image cover not only on LSB. they used pixel indicator
technique for randomizing. Protecting secret data based on
one level only is the main issue that the researchers of the
work [4] targeted. They strengthen steganography-based
level of protection by encryption level using AES algorithm.
However, the basic disadvantage is related to high
complexity in the processofextraction. Infrequencydomain,
an approach is presented in the work [5], where it uses DCT
transformation to hide the secret information in the high
frequency coefficients for the purpose of achieving stego-
image of high quality.
2.2 Hiding based on audios
In [6] a dual-protection approach is provided, where a
level of encryption for hiding data is created based on ASCII
coding before inserting the secret message within the signal
of audio file. Although[7]achievedsteganographydepending
on LSB, its final objective was providing testing environment
forsteganography systems that use audio files as covers.The
experiments conducted within the proposed environment
proved that LSB technique was weak against rotation and
compression attacks. In addition, LSB is simple in terms of
implementation and may include some code-based
vulnerabilities. Relying on modified Vigeneve cipher
algorithm, authors in work [8] took into consideration the
importance of adding a levelofsecuritytoprotectsecretdata.
However, they only applied this approach on textual data
ignoring other types of data. The system proposed in the
work [9] starts to convert the audio file into frequencies in
wave domain using DCT transformation. Then, secret data is
encrypted using Huffman encryption to be embedded in
converted audio file. Finally, embedding is performed. The
extraction phase is performed using IDCT transformation.
2.3 Hiding based on texts
Using Hidi text as cover, a steganography-basedsystemis
proposed in [10]. The key idea behind this system is to
replace the first letter of each word by a letter from secret
message. Special feature of this system is related to convert
numbers in cover into text to increase the space of hiding.
Similarly, [11] provided an approach to embed a secret
information within Arabic and Persian text file dependingon
several intersections between these two languages. In their
proposed work [12], researchers presented a scheme based
on cryptography using SSCE, where the secret key will be
directly exchanged between the sender and receiverforboth
hiding and extracting a secret message using RSA algorithm.
3. PROPOSED SYSTEM
The proposed system consists of two main phases, which
are hiding phase and extraction phase. Figure 3 provides the
structure of the proposed system.
Fig -3: Structure of proposed system.
3.1 Actions at sender side
The main action performed at the sender side is hiding. It
is expressed according to the following formula:
(Cover_Object) +(Hidden_Data) = Stego_Object (1)
To achieve double protection and to answer the first
research question, 3-DES encryption algorithm is employed.
The secret data is encrypted first before performing the
hiding process. As shown in Figure 4.
Fig -4: First level of protection.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 06 | Jun 2023 www.irjet.net p-ISSN: 2395-0072
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 561
3-DES algorithm works as follows: Triple DES operatesin
three steps: Encrypt-Decrypt-Encrypt (EDE). It works by
taking three 56-bit keys (K1, K2 and K3) known as a key
bundle and encrypting first with K1, decrypting next withK2
and encrypting a last time with K3. A Triple DES two-key
version exists, where the same algorithm runs three times
but K1 is used for the first and last steps [13]. Therefore, K1
will be the master key.
To answer the second researchquestion,LeastSignificant
Bit (LSB) technique is utilized. The key idea behind the LBS
technique is to hide the bits of secret data within the first bit
of each sample audio. The logic behind this based on the fact
that states "the start point of an audio includes some silence
spots during recording". This means that it is a suitable
location for hiding since it leads to lowest level of distortion.
LBS represents the secondlevelofprotection.Figure5shows
where LSB bits are located within a given audio file.
Fig -5: Location of LSB bits within an audio file.
As shown in Figure 5,LSB located in anarraythatweights
the least when compared to other locations, which in turn
means that if LBS bits are replaced or modified the damage
will be minimum. In contrast, any alternation in Most
SignificantBit(MSB)leadstomaximumdamageordistortion.
After determining the location of hiding which ensures
minimum distortion, hiding process starts as described
below. Figure 6 illustrates the first two steps.
Fig -6: First two steps in hiding process.
The first step is to define the LBS column withintheaudio
cover file. This is done by analyzing the audio file after
converting it to binary mod. The second step is to obtain the
bits of the secret data. This can be done by some skills in
programming or using some tools available on the Internet.
To achieve double level of protection, bits of secret data
are encrypted before hiding. However, attackers can obtain
the LSB column and modify it, which meansloosingintegrity.
To solve this problem, a randomization step is added, as
shown in Figure 7.
Fig -7: Third and fourth steps in hiding process.
Here, even the attacker tries to obtain LSB, he will face a
problem of reconstructing (or reforming) LSB in the correct
order. In other words, he needs to know the algorithm of
randomization.
3-DES algorithm has a key and also randomization
algorithm. There is a need for safely exchange the keys
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 06 | Jun 2023 www.irjet.net p-ISSN: 2395-0072
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 562
between sender and receiver. Inthiswork,thesamekeyused
for encryption is also used as a seed of the randomization
algorithm. RSA algorithm is employed for the purpose of
safely exchange the key (called Stego-key). RSA algorithm is
performed based on four steps (supported by Java
statements) [14]. As described below.
RSA algorithm
Step 1: Construction the RSA model
The process starts with selection of two prime numbers
(R and O), and then calculating their product W, as:
W=R*O (2)
Step 2: Derived Number (S)
Consider number (S) as a derived number that satisfies
the condition > 1 and less than (R-1) and (O-1). The primary
condition will be that there should be no common factor of
(R-1) and (O-1) except 1
Step 3: Public key
The specified pair of numbers (W) and (S) forms the RSA
public key and it is made public.
Step 4: Private Key
Private Key V is calculated from the numbers R, O and S.
The mathematical formula that adjusts the numbers is as
follows:
SV = 1 mod (R-1) (O-1) (3)
Encryption and decryption using RSA
Encryption Formula:
Consider a sender who sends the plainclearreadable
text MSG to someone whose public key is (W, S). To encrypt
the plain text MSG, we rely on the following expression:
CPH = RS mod W (4)
Decryption Formula:
The decryption process is very straightforward and
includes analytics for calculation in a systematic approach.
Receiver (K) has the private key , the result modulus will be
calculated as:
Plaintext = K mod W (5)
Figure 8 shows the whole process of hiding that achieves
two level of protection.
Fig -8: Comprehensive hiding process.
From mathematical point of view, hiding process is
expressed by the following formula:
Cover_Object+Hidden_Data+Stego_Key=Stego_Object (6)
3.1 Actions at receiver side
At the receiver side, extraction processisperformed.This
includes extracting LSB firstly. Then, revising the
randomization algorithm to reconstruct the correct LSB.
Finally, the constructedLSBisdecryptedusingStego-keythat
is safely exchanged using RSA algorithm. Extraction process
is expressed by the following formula from mathematical
perspective:
Stego_Object + Stego_Key = Hidden_Data (7)
4. Experimental results
This section provides the results based on some metrics
and along with comparison with some similar works.
4.1 Setup
The proposed steganography system is implemented
using Java programming language. The following screen
shows the main interface of the system.
Fig -9: The main interface of the proposed steganography
based system.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 06 | Jun 2023 www.irjet.net p-ISSN: 2395-0072
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 563
From programing point of view, Table 1 summarizes the
used classes.
Table -1: Used classes.
4.2 Security metrics
Three metrics are used forthepurposeof evaluatingthe
proposed system, as illustrated in Figure 10.
Fig -10: Used metrics.
PSNR [15] measures the Peak Signal to Noise Ratio. It
needs to calculate MSE. It is given by the following formula:
2
1 1
1
( )
M N
ij ij
i j
MSE
MN
g
f
 
 

2
10
10
L
PSNRindB Log
MSE
 (8)
To measure the quality of our proposed system,
correlation [16] is used, which measures the similarity
between the cover and stego_object. It is given by the
following formula:
file
audio
of
size
all
change
of
ammoun
corr






 (9)
Bit Error Rate [17] which calculates the amount of noise
caused by hiding. It is given by the following formula:
send
bits
of
number
total
errors
of
number
BER
_
_
_
_
_
_
 (10)
4.3 Results
We used song audio file (downloadedfromtheInterne)to
represent the cover. To ensure covering all types of secret
data, a text file is written manually (containing 5 lines taken
from thisarticle),another song audio file,andanimagetaken
by mobile phone. Table 2 provides the obtained results.
Table -2: Results.
Stego_object
Original audio
PSNR Correlation
Bit error
rate
Stego_T 59.582 97.52 0.443
Setgo_G 58.988 81.68 0.779
Stego_A 58.246 65.98 0.841
As shown in Table 2, the lowest BER is generated when
hiding secret data as texts. Actually, most type of secret data
is textual form. To evaluate the ability of hiding of the
proposed system without increasing the level of BER
dramatically, the text file of the secret data is duplicated.
Table 3 summarizes the results.
Table -3: Results under duplicated text file of secret data.
Text file
order
Size in
byte
PSNR Correlation
Bit error
rate
1 150 60.582 98.52 0.453
2 300 58.989 98.11 0.389
3 450 57.658 95.26 0.352
4 600 56.472 94.89 0.324
Table 2 shows that there is a small amount of increasing
in the BER. This means that the proposed system is suitable
for hiding secret data of textual form.
Visually, the audios (cover and Stego-object) are evaluated
based on the wave form, as shown in Figure 11.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 06 | Jun 2023 www.irjet.net p-ISSN: 2395-0072
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 564
Fig -11: Wave forms.
Figure 11 shows that there is a small change in the wave
of original audio (cover) and the Stego-object when hiding
textual secret data. This supports the results obtained and
summarized in Table 3.
5. CONCLUSION
In this work, a double-level protection technique is
proposed using encryption and steganography. The first line
of defence is represented by encryption of secret data before
hiding. The second line of defence is represented by hiding
process. An additional confusion isaddedtofacetheabilityof
attacker when it comes to talking about obtaining the LSB
bits from the Stego-object. Results showed that theproposed
system provides lower level of BER and it is suitable for
hiding textual secret data.
As a future work, the proposed system will be enhanced
based on deep learning techniques to discover the best
location of hiding.
REFERENCES
[1] Chanu, Yambem Jina, Themrichon Tuithung, and Kh
Manglem Singh. "A short survey on image
steganography and steganalysis techniques." 2012 3rd
National Conference on Emerging Trends and
Applications in Computer Science. IEEE, 2012.‫‏‬
[2] Hashim,Mohammed,MOHD SHAFRYMOHDRAHIM,and
ALI ABDULRAHEEM ALWAN. "A REVIEW AND OPEN
ISSUES OF MULTIFARIOUS IMAGE STEGANOGRAPHY
TECHNIQUES IN SPATIAL DOMAIN." Journal of
Theoretical & Applied Information Technology 96.4
(2018).‫‏‬
[3] Pan, Yi-Lun, and Ja-Ling Wu. "Rate-Distortion-Based
Stego: A Large-Capacity Secure Steganography Scheme
for Hiding Digital Images." Entropy 24.7 (2022): 982.‫‏‬
[4] Sakshi, Sakshi, et al. "LeastSignificantBit Steganography
for Text and Image hiding." 2022 3rd International
Conference on Intelligent EngineeringandManagement
(ICIEM). IEEE, 2022.‫‏‬
[5] Xu, Youmin, et al. "Robust invertible image
steganography." Proceedings of the IEEE/CVF
Conference on Computer Vision and Pattern
Recognition. 2022.‫‏‬
[6] Abdulkadhim, Hussein Abdulameer, and Jinan Nsaif
Shehab. "Audio steganographybasedonleastsignificant
bits algorithm with 4D grid multi-wing hyper-chaotic
system." International Journal of Electrical and
Computer Engineering (IJECE) 12.1 (2022): 320-330.‫‏‬
[7] Mahmoud, Mahmoud M., and Huwaida T. Elshoush.
"Enhancing LSB Using Binary MessageSizeEncodingfor
High Capacity, Transparent and Secure Audio
Steganography–An Innovative Approach." IEEE Access
10 (2022): 29954-29971.‫‏‬
[8] Geleta, Margarita, et al. "Pixinwav: Residual
steganography for hiding pixels in audio." ICASSP2022-
2022 IEEE International Conference on Acoustics,
Speech and Signal Processing (ICASSP). IEEE, 2022.‫‏‬
[9] Abood, Enas Wahab, et al. "Audio steganography with
enhanced LSB method for securing encrypted text with
bit cycling." Bulletin of Electrical Engineering and
Informatics 11.1 (2022): 185-194.‫‏‬
[10] Thabit, Reema, et al. "CSNTSteg: Color spacing
normalization text steganography model to improve
capacity and invisibility of hidden data." IEEE Access 10
(2022): 65439-65458.‫‏‬
[11] Osman, Omnia Mohammed, et al. "Hybrid multistage
framework for data manipulation by combining
cryptography and steganography." Bulletin of Electrical
Engineering and Informatics 11.1 (2022): 327-335.‫‏‬
[12] Roy, Sangita, and Manini Manasmita. "A novel approach
to format based text steganography." proceedings ofthe
2011 international conference on communication,
Computing & Security. 2011.‫‏‬
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 06 | Jun 2023 www.irjet.net p-ISSN: 2395-0072
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 565
[13] Ardiansyah, Giovani, Christy Atika Sari, and Eko Hari
Rachmawanto. "Hybrid method using 3-DES, DWT and
LSB for secure image steganography algorithm." 2017
2nd International conferences on Information
Technology, Information Systems and Electrical
Engineering (ICITISEE). IEEE, 2017.‫‏‬
[14] Zhou, Xin, and Xiaofei Tang. "Research and
implementation of RSA algorithm for encryption and
decryption." Proceedings of 2011 6th international
forum on strategic technology. Vol. 2. IEEE, 2011.‫‏‬
[15] Sara, Umme, Morium Akter, and Mohammad Shorif
Uddin. "Image quality assessment through FSIM, SSIM,
MSE and PSNR—a comparative study." Journal of
Computer and Communications 7.3 (2019): 8-18.‫‏‬
[16] Kasetty, Praveen Kumar, and Aniruddha Kanhe. "Covert
speech communication through audio steganography
using DWT and SVD." 2020 11th International
Conference on Computing, Communication and
Networking Technologies (ICCCNT). IEEE, 2020.‫‏‬
BIOGRAPHY
Khalid: received the B.S. degree
in computersciencefromBishah
University in 2016, and the M.S.
degrees in cybersecurity from
Bishah University in 2022. His
current research interests
include information security,
IoT, artificial intelligence and
deep learning.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 06 | Jun 2023 www.irjet.net p-ISSN: 2395-0072
[17] AlSabhany, Ahmed A., et al. "Digital audio
steganography: Systematic review, classification, and
analysis of the current state of the art." Computer
Science Review 38 (2020): 100316.‫‏‬

More Related Content

Similar to Protection of Secret Textual Data Using Steganography Based System

Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...IJECEIAES
 
MESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHYMESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHYIRJET Journal
 
Dft based individual extraction of steganographic compression of images
Dft based individual extraction of steganographic compression of imagesDft based individual extraction of steganographic compression of images
Dft based individual extraction of steganographic compression of imageseSAT Journals
 
Dft based individual extraction of steganographic compression of images
Dft based individual extraction of steganographic compression of imagesDft based individual extraction of steganographic compression of images
Dft based individual extraction of steganographic compression of imageseSAT Publishing House
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
 
Secure Image Hiding Algorithm using Cryptography and Steganography
Secure Image Hiding Algorithm using Cryptography and SteganographySecure Image Hiding Algorithm using Cryptography and Steganography
Secure Image Hiding Algorithm using Cryptography and SteganographyIOSR Journals
 
RSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT ApproachRSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT ApproachIJERA Editor
 
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...Dr. Amarjeet Singh
 
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithmHybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithmIJECEIAES
 
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...
IRJET -  	  Multi Authority based Integrity Auditing and Proof of Storage wit...IRJET -  	  Multi Authority based Integrity Auditing and Proof of Storage wit...
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...IRJET Journal
 
Image Steganography With Encryption
Image Steganography With EncryptionImage Steganography With Encryption
Image Steganography With Encryptionvaishali kataria
 
Image Steganography With Encryption
Image Steganography With EncryptionImage Steganography With Encryption
Image Steganography With Encryptionvaishali kataria
 
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and SteganographyIRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and SteganographyIRJET Journal
 
An improved geo encryption algorithm in location based services
An improved geo encryption algorithm in location based servicesAn improved geo encryption algorithm in location based services
An improved geo encryption algorithm in location based serviceseSAT Journals
 
Review paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and SteganographyReview paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and Steganographyvivatechijri
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 

Similar to Protection of Secret Textual Data Using Steganography Based System (20)

Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...
 
Ijcnc050208
Ijcnc050208Ijcnc050208
Ijcnc050208
 
MESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHYMESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHY
 
Dft based individual extraction of steganographic compression of images
Dft based individual extraction of steganographic compression of imagesDft based individual extraction of steganographic compression of images
Dft based individual extraction of steganographic compression of images
 
Dft based individual extraction of steganographic compression of images
Dft based individual extraction of steganographic compression of imagesDft based individual extraction of steganographic compression of images
Dft based individual extraction of steganographic compression of images
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
 
Ijariie1132
Ijariie1132Ijariie1132
Ijariie1132
 
H43064650
H43064650H43064650
H43064650
 
Secure Image Hiding Algorithm using Cryptography and Steganography
Secure Image Hiding Algorithm using Cryptography and SteganographySecure Image Hiding Algorithm using Cryptography and Steganography
Secure Image Hiding Algorithm using Cryptography and Steganography
 
RSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT ApproachRSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT Approach
 
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
 
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithmHybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
 
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...
IRJET -  	  Multi Authority based Integrity Auditing and Proof of Storage wit...IRJET -  	  Multi Authority based Integrity Auditing and Proof of Storage wit...
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...
 
Image Steganography With Encryption
Image Steganography With EncryptionImage Steganography With Encryption
Image Steganography With Encryption
 
Image Steganography With Encryption
Image Steganography With EncryptionImage Steganography With Encryption
Image Steganography With Encryption
 
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and SteganographyIRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
 
An improved geo encryption algorithm in location based services
An improved geo encryption algorithm in location based servicesAn improved geo encryption algorithm in location based services
An improved geo encryption algorithm in location based services
 
Review paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and SteganographyReview paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and Steganography
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 

Recently uploaded (20)

HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 

Protection of Secret Textual Data Using Steganography Based System

  • 1. © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 559 Protection of Secret Textual Data Using Steganography Based System Khalid Buryk S Alqarni Bishah University, Faculty of computing and Information Technology, Department of Cybersecurity, Bishah City, Saudi Arabia ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract – Recently, capabilities of attackers have been increased dramatically in terms of compromising secret data exchanged amongusersovertheInternet. Usingcryptographic approaches contribute to ensure confidentiality of data, but they do not provide secrecy of communication between the connected parties. Steganography can be used to strengthen cryptographic approaches by hiding secret data within innocent audios after passing an encryption stage. This adds second level of protection against attacks as well as hidingthe communication itself between sender and receiver. This work proposed an enhanced steganography-based approach to protect secret data by embedding within audio files. Encryption using 3-DES is employed to createthefirstdefense, while hiding in Least Significant Bit (LSB) creates the second defense with respect of ensuring high matching betweencover file and stego file, high resistance against attacks, and high accuracy of retrieving the hidden data. The proposed approach achieves better performance intermsofPSNR, SSIM, and correlation. Key Words: Cover_object, Hidden_Data, Stego_key, Stego_object, LSB, Attacker. 1.INTRODUCTION Steganography and the logic behind it. Steganography is the technique of hidingsecretdatawithinanordinary,non- secret, file or message in order to avoid detection. The logic behind it is related to the fact that states "everything stored on the computer is converted into zeros and ones", and thus, it is possible to hide zerosand ones(secretdata)withinother zeros and ones (other files) [1]. Terms in steganography domain. Secret data, which is the data that requires protection against malicious actions, such as illegal modification and unauthorized access. Cover- Object, which is the file that hosts the secret data. Stego- Object, which is the file that is generated as an output of performing hiding process. Stego-Key,whichisthekeythatis used for encrypting secret data [2]. Statement of problem. The problem is stated based on the general scenario of encryption, as shown in Figure-1. Fig -1: General scenario of encryption-based system. Attackerscan be locatedbetweenthesenderandreceiver, where the malicious goal is obtaining cipher data through evadrosping the communication network. In this case,illegal modification can be applied easily, which in turn means losing of data integrity. Moreover, the communication between the sender and receiver is revealed. Researchquestions.Theresearchquestionscanbelisted as follows: 1. How to ensure integrity of secret data? 2. How to hide thecommunicationbetweenthesender and receiver? Contribution. This paper provides the following contribution in the field of steganography:  Proposing two-level of protection using 3-DES encryption and hiding within audio files.  Selection of hiding location based on ensuring lowest level of distortion caused by hiding process.  Providing extensiveexperimentstovalidatethe proposed approach along with comparison with similar works. Organization of paper. The paper is structured so that section 1 provides related work. Section 2 presents the proposed approach. Section 3 shows the experimental results. Finally, the paper is concluded in section 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 06 | Jun 2023 www.irjet.net p-ISSN: 2395-0072
  • 2. © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 560 2. RELATED WORK This section provides the state of the art. Systems of steganographycan be classified basedonthetypeofcover,as shown in Figure 2. Fig -2: Classification of steganography-based system. 2.1 Hiding based on images The problem that authors of [3] handled is related to small size of payload (hidden secret data) that can be inserted in the cover file. The proposed system mainly depends on spreading bits of secret data on all pixels of image cover not only on LSB. they used pixel indicator technique for randomizing. Protecting secret data based on one level only is the main issue that the researchers of the work [4] targeted. They strengthen steganography-based level of protection by encryption level using AES algorithm. However, the basic disadvantage is related to high complexity in the processofextraction. Infrequencydomain, an approach is presented in the work [5], where it uses DCT transformation to hide the secret information in the high frequency coefficients for the purpose of achieving stego- image of high quality. 2.2 Hiding based on audios In [6] a dual-protection approach is provided, where a level of encryption for hiding data is created based on ASCII coding before inserting the secret message within the signal of audio file. Although[7]achievedsteganographydepending on LSB, its final objective was providing testing environment forsteganography systems that use audio files as covers.The experiments conducted within the proposed environment proved that LSB technique was weak against rotation and compression attacks. In addition, LSB is simple in terms of implementation and may include some code-based vulnerabilities. Relying on modified Vigeneve cipher algorithm, authors in work [8] took into consideration the importance of adding a levelofsecuritytoprotectsecretdata. However, they only applied this approach on textual data ignoring other types of data. The system proposed in the work [9] starts to convert the audio file into frequencies in wave domain using DCT transformation. Then, secret data is encrypted using Huffman encryption to be embedded in converted audio file. Finally, embedding is performed. The extraction phase is performed using IDCT transformation. 2.3 Hiding based on texts Using Hidi text as cover, a steganography-basedsystemis proposed in [10]. The key idea behind this system is to replace the first letter of each word by a letter from secret message. Special feature of this system is related to convert numbers in cover into text to increase the space of hiding. Similarly, [11] provided an approach to embed a secret information within Arabic and Persian text file dependingon several intersections between these two languages. In their proposed work [12], researchers presented a scheme based on cryptography using SSCE, where the secret key will be directly exchanged between the sender and receiverforboth hiding and extracting a secret message using RSA algorithm. 3. PROPOSED SYSTEM The proposed system consists of two main phases, which are hiding phase and extraction phase. Figure 3 provides the structure of the proposed system. Fig -3: Structure of proposed system. 3.1 Actions at sender side The main action performed at the sender side is hiding. It is expressed according to the following formula: (Cover_Object) +(Hidden_Data) = Stego_Object (1) To achieve double protection and to answer the first research question, 3-DES encryption algorithm is employed. The secret data is encrypted first before performing the hiding process. As shown in Figure 4. Fig -4: First level of protection. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 06 | Jun 2023 www.irjet.net p-ISSN: 2395-0072
  • 3. © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 561 3-DES algorithm works as follows: Triple DES operatesin three steps: Encrypt-Decrypt-Encrypt (EDE). It works by taking three 56-bit keys (K1, K2 and K3) known as a key bundle and encrypting first with K1, decrypting next withK2 and encrypting a last time with K3. A Triple DES two-key version exists, where the same algorithm runs three times but K1 is used for the first and last steps [13]. Therefore, K1 will be the master key. To answer the second researchquestion,LeastSignificant Bit (LSB) technique is utilized. The key idea behind the LBS technique is to hide the bits of secret data within the first bit of each sample audio. The logic behind this based on the fact that states "the start point of an audio includes some silence spots during recording". This means that it is a suitable location for hiding since it leads to lowest level of distortion. LBS represents the secondlevelofprotection.Figure5shows where LSB bits are located within a given audio file. Fig -5: Location of LSB bits within an audio file. As shown in Figure 5,LSB located in anarraythatweights the least when compared to other locations, which in turn means that if LBS bits are replaced or modified the damage will be minimum. In contrast, any alternation in Most SignificantBit(MSB)leadstomaximumdamageordistortion. After determining the location of hiding which ensures minimum distortion, hiding process starts as described below. Figure 6 illustrates the first two steps. Fig -6: First two steps in hiding process. The first step is to define the LBS column withintheaudio cover file. This is done by analyzing the audio file after converting it to binary mod. The second step is to obtain the bits of the secret data. This can be done by some skills in programming or using some tools available on the Internet. To achieve double level of protection, bits of secret data are encrypted before hiding. However, attackers can obtain the LSB column and modify it, which meansloosingintegrity. To solve this problem, a randomization step is added, as shown in Figure 7. Fig -7: Third and fourth steps in hiding process. Here, even the attacker tries to obtain LSB, he will face a problem of reconstructing (or reforming) LSB in the correct order. In other words, he needs to know the algorithm of randomization. 3-DES algorithm has a key and also randomization algorithm. There is a need for safely exchange the keys International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 06 | Jun 2023 www.irjet.net p-ISSN: 2395-0072
  • 4. © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 562 between sender and receiver. Inthiswork,thesamekeyused for encryption is also used as a seed of the randomization algorithm. RSA algorithm is employed for the purpose of safely exchange the key (called Stego-key). RSA algorithm is performed based on four steps (supported by Java statements) [14]. As described below. RSA algorithm Step 1: Construction the RSA model The process starts with selection of two prime numbers (R and O), and then calculating their product W, as: W=R*O (2) Step 2: Derived Number (S) Consider number (S) as a derived number that satisfies the condition > 1 and less than (R-1) and (O-1). The primary condition will be that there should be no common factor of (R-1) and (O-1) except 1 Step 3: Public key The specified pair of numbers (W) and (S) forms the RSA public key and it is made public. Step 4: Private Key Private Key V is calculated from the numbers R, O and S. The mathematical formula that adjusts the numbers is as follows: SV = 1 mod (R-1) (O-1) (3) Encryption and decryption using RSA Encryption Formula: Consider a sender who sends the plainclearreadable text MSG to someone whose public key is (W, S). To encrypt the plain text MSG, we rely on the following expression: CPH = RS mod W (4) Decryption Formula: The decryption process is very straightforward and includes analytics for calculation in a systematic approach. Receiver (K) has the private key , the result modulus will be calculated as: Plaintext = K mod W (5) Figure 8 shows the whole process of hiding that achieves two level of protection. Fig -8: Comprehensive hiding process. From mathematical point of view, hiding process is expressed by the following formula: Cover_Object+Hidden_Data+Stego_Key=Stego_Object (6) 3.1 Actions at receiver side At the receiver side, extraction processisperformed.This includes extracting LSB firstly. Then, revising the randomization algorithm to reconstruct the correct LSB. Finally, the constructedLSBisdecryptedusingStego-keythat is safely exchanged using RSA algorithm. Extraction process is expressed by the following formula from mathematical perspective: Stego_Object + Stego_Key = Hidden_Data (7) 4. Experimental results This section provides the results based on some metrics and along with comparison with some similar works. 4.1 Setup The proposed steganography system is implemented using Java programming language. The following screen shows the main interface of the system. Fig -9: The main interface of the proposed steganography based system. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 06 | Jun 2023 www.irjet.net p-ISSN: 2395-0072
  • 5. © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 563 From programing point of view, Table 1 summarizes the used classes. Table -1: Used classes. 4.2 Security metrics Three metrics are used forthepurposeof evaluatingthe proposed system, as illustrated in Figure 10. Fig -10: Used metrics. PSNR [15] measures the Peak Signal to Noise Ratio. It needs to calculate MSE. It is given by the following formula: 2 1 1 1 ( ) M N ij ij i j MSE MN g f      2 10 10 L PSNRindB Log MSE  (8) To measure the quality of our proposed system, correlation [16] is used, which measures the similarity between the cover and stego_object. It is given by the following formula: file audio of size all change of ammoun corr        (9) Bit Error Rate [17] which calculates the amount of noise caused by hiding. It is given by the following formula: send bits of number total errors of number BER _ _ _ _ _ _  (10) 4.3 Results We used song audio file (downloadedfromtheInterne)to represent the cover. To ensure covering all types of secret data, a text file is written manually (containing 5 lines taken from thisarticle),another song audio file,andanimagetaken by mobile phone. Table 2 provides the obtained results. Table -2: Results. Stego_object Original audio PSNR Correlation Bit error rate Stego_T 59.582 97.52 0.443 Setgo_G 58.988 81.68 0.779 Stego_A 58.246 65.98 0.841 As shown in Table 2, the lowest BER is generated when hiding secret data as texts. Actually, most type of secret data is textual form. To evaluate the ability of hiding of the proposed system without increasing the level of BER dramatically, the text file of the secret data is duplicated. Table 3 summarizes the results. Table -3: Results under duplicated text file of secret data. Text file order Size in byte PSNR Correlation Bit error rate 1 150 60.582 98.52 0.453 2 300 58.989 98.11 0.389 3 450 57.658 95.26 0.352 4 600 56.472 94.89 0.324 Table 2 shows that there is a small amount of increasing in the BER. This means that the proposed system is suitable for hiding secret data of textual form. Visually, the audios (cover and Stego-object) are evaluated based on the wave form, as shown in Figure 11. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 06 | Jun 2023 www.irjet.net p-ISSN: 2395-0072
  • 6. © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 564 Fig -11: Wave forms. Figure 11 shows that there is a small change in the wave of original audio (cover) and the Stego-object when hiding textual secret data. This supports the results obtained and summarized in Table 3. 5. CONCLUSION In this work, a double-level protection technique is proposed using encryption and steganography. The first line of defence is represented by encryption of secret data before hiding. The second line of defence is represented by hiding process. An additional confusion isaddedtofacetheabilityof attacker when it comes to talking about obtaining the LSB bits from the Stego-object. Results showed that theproposed system provides lower level of BER and it is suitable for hiding textual secret data. As a future work, the proposed system will be enhanced based on deep learning techniques to discover the best location of hiding. REFERENCES [1] Chanu, Yambem Jina, Themrichon Tuithung, and Kh Manglem Singh. "A short survey on image steganography and steganalysis techniques." 2012 3rd National Conference on Emerging Trends and Applications in Computer Science. IEEE, 2012.‫‏‬ [2] Hashim,Mohammed,MOHD SHAFRYMOHDRAHIM,and ALI ABDULRAHEEM ALWAN. "A REVIEW AND OPEN ISSUES OF MULTIFARIOUS IMAGE STEGANOGRAPHY TECHNIQUES IN SPATIAL DOMAIN." Journal of Theoretical & Applied Information Technology 96.4 (2018).‫‏‬ [3] Pan, Yi-Lun, and Ja-Ling Wu. "Rate-Distortion-Based Stego: A Large-Capacity Secure Steganography Scheme for Hiding Digital Images." Entropy 24.7 (2022): 982.‫‏‬ [4] Sakshi, Sakshi, et al. "LeastSignificantBit Steganography for Text and Image hiding." 2022 3rd International Conference on Intelligent EngineeringandManagement (ICIEM). IEEE, 2022.‫‏‬ [5] Xu, Youmin, et al. "Robust invertible image steganography." Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition. 2022.‫‏‬ [6] Abdulkadhim, Hussein Abdulameer, and Jinan Nsaif Shehab. "Audio steganographybasedonleastsignificant bits algorithm with 4D grid multi-wing hyper-chaotic system." International Journal of Electrical and Computer Engineering (IJECE) 12.1 (2022): 320-330.‫‏‬ [7] Mahmoud, Mahmoud M., and Huwaida T. Elshoush. "Enhancing LSB Using Binary MessageSizeEncodingfor High Capacity, Transparent and Secure Audio Steganography–An Innovative Approach." IEEE Access 10 (2022): 29954-29971.‫‏‬ [8] Geleta, Margarita, et al. "Pixinwav: Residual steganography for hiding pixels in audio." ICASSP2022- 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, 2022.‫‏‬ [9] Abood, Enas Wahab, et al. "Audio steganography with enhanced LSB method for securing encrypted text with bit cycling." Bulletin of Electrical Engineering and Informatics 11.1 (2022): 185-194.‫‏‬ [10] Thabit, Reema, et al. "CSNTSteg: Color spacing normalization text steganography model to improve capacity and invisibility of hidden data." IEEE Access 10 (2022): 65439-65458.‫‏‬ [11] Osman, Omnia Mohammed, et al. "Hybrid multistage framework for data manipulation by combining cryptography and steganography." Bulletin of Electrical Engineering and Informatics 11.1 (2022): 327-335.‫‏‬ [12] Roy, Sangita, and Manini Manasmita. "A novel approach to format based text steganography." proceedings ofthe 2011 international conference on communication, Computing & Security. 2011.‫‏‬ International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 06 | Jun 2023 www.irjet.net p-ISSN: 2395-0072
  • 7. © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 565 [13] Ardiansyah, Giovani, Christy Atika Sari, and Eko Hari Rachmawanto. "Hybrid method using 3-DES, DWT and LSB for secure image steganography algorithm." 2017 2nd International conferences on Information Technology, Information Systems and Electrical Engineering (ICITISEE). IEEE, 2017.‫‏‬ [14] Zhou, Xin, and Xiaofei Tang. "Research and implementation of RSA algorithm for encryption and decryption." Proceedings of 2011 6th international forum on strategic technology. Vol. 2. IEEE, 2011.‫‏‬ [15] Sara, Umme, Morium Akter, and Mohammad Shorif Uddin. "Image quality assessment through FSIM, SSIM, MSE and PSNR—a comparative study." Journal of Computer and Communications 7.3 (2019): 8-18.‫‏‬ [16] Kasetty, Praveen Kumar, and Aniruddha Kanhe. "Covert speech communication through audio steganography using DWT and SVD." 2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT). IEEE, 2020.‫‏‬ BIOGRAPHY Khalid: received the B.S. degree in computersciencefromBishah University in 2016, and the M.S. degrees in cybersecurity from Bishah University in 2022. His current research interests include information security, IoT, artificial intelligence and deep learning. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 06 | Jun 2023 www.irjet.net p-ISSN: 2395-0072 [17] AlSabhany, Ahmed A., et al. "Digital audio steganography: Systematic review, classification, and analysis of the current state of the art." Computer Science Review 38 (2020): 100316.‫‏‬