This document summarizes a research paper that proposes a novel two-layer security mechanism combining cryptography and steganography techniques. The paper begins with an introduction discussing security issues with traditional cryptography and steganography methods. It then reviews related work in the fields. The proposed approach encrypts a secret message using AES encryption, splits the cipher file into frames, and embeds the cipher text in video frames using DCT-based steganography. Experimental results show the proposed approach achieves higher PSNR quality measurements than an existing HLSB technique, indicating better quality of stego frames. In addition, the proposed approach does not change file sizes compared to another existing approach.
Secure Data Hiding System by using AES Algorithm and Indicator Based LSB Methodijtsrd
Security of data is one of the most challenging problems in todays technological world. In order to secure the transmission of secret data over the public network Internet , numerous data security and hiding algorithms have been developed in the last decade. Steganography combined with cryptography can be one of the best choices for solving this problem. In this paper, the proposed framework is the dual layer of security, in which the first layer is to encrypt the secret text message using advanced encryption standard AES algorithm and in the second layer to embed this message using the indicator based least significant bit LSB method which is used to hide the encrypted text message into the cover image. It differs from the LSB algorithm in that it does not embed the bytes of the cover data sequentially but it embeds into one bit or two bits at once. Actually, it depends on indicators to determine where and how many bits to embed at a time. The Mean Square Error MSE and Peak Signal to Noise Ratio PSNR measure the imperceptibility of the system. Experimental results show that the stego image is usually indistinguishable from the cover image. Myo Ma Ma | Zar Zar Hnin | Yin Min Htwe "Secure Data Hiding System by using AES Algorithm and Indicator-Based LSB Method" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26500.pdfPaper URL: https://www.ijtsrd.com/computer-science/computer-security/26500/secure-data-hiding-system-by-using-aes-algorithm-and-indicator-based-lsb-method/myo-ma-ma
A Secure Data Communication System Using Cryptography and SteganographyIJCNCJournal
The information security has become one of the most significant problems in data communication. So it
becomes an inseparable part of data communication. In order to address this problem, cryptography and
steganography can be combined. This paper proposes a secure communication system. It employs
cryptographic algorithm together with steganography. The jointing of these techniques provides a robust
and strong communication system that able to withstand against attackers. In this paper, the filter bank
cipher is used to encrypt the secret text message, it provide high level of security, scalability and speed.
After that, a discrete wavelet transforms (DWT) based steganography is employed to hide the encrypted
message in the cover image by modifying the wavelet coefficients. The performance of the proposed system
is evaluated using peak signal to noise ratio (PSNR) and histogram analysis. The simulation results show
that, the proposed system provides high level of security.
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUEIJNSA Journal
Embedding a message in media files, also known as steganography, is a common approach to hide secret
information. It has been exploited by some criminals to confidentially exchange messages. As a countermeasure,
tools have been developed in order to detect hidden information form digital media such as text,
image, audio or video files. However the efficiency and performance of previous approaches still have
room for improvement. In this research, we focus on algorithm design for better efficiency of hidden message detection from PNG files. We employ three classic AI approaches including neural network, fuzzy logic, and genetic algorithm and evaluate their efficiency and performance in controlled experiments. Finally we introduce our message detection system for PNG files based on LSB approach and present its
usability in different case scenarios
A Robust Technique to Encrypt and Decrypt Confidential Data within Imageinventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUEIJNSA Journal
Embedding a message in media files, also known as steganography, is a common approach to hide secret
information. It has been exploited by some criminals to confidentially exchange messages. As a countermeasure, tools have been developed in order to detect hidden information form digital media such as text, image, audio or video files. However the efficiency and performance of previous approaches still have room for improvement. In this research, we focus on algorithm design for better efficiency of hidden message detection from PNG files. We employ three classic AI approaches including neural network, fuzzy logic, and genetic algorithm and evaluate their efficiency and performance in controlled experiments. Finally we introduce our message detection system for PNG files based on LSB approach and present its usability in different case scenarios.
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHYcsandit
Digital communication witnesses a noticeable and continuous development in many
applications in the Internet. Hence, a secure communication sessions must be provided. The
security of data transmitted across a global network has turned into a key factor on the network
performance measures. Cryptography and steganography are two important techniques that are
used to provide network security. In this paper, we conduct a comparative study of
steganography and cryptography. We survey a number of methods combining cryptography and
steganography techniques in one system. Moreover, we present a classification of these
methods, and compare them in terms of the algorithm used for encryption, the steganography
technique and the file type used for covering the information.
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITIONIJNSA Journal
Recently, the mode of living became more complicated without computer systems. The techniques of camouflage information have acquired a vital role with the requirement of intensifying trade of multimedia content. Steganography is the technique that utilizes disguise in a way that prohibits unauthorized access from suspicion of the existence of confidential information exchanged during communication channels between the connected parties. In this paper, an integrated image steganographic system is designed to conceal images, messages or together where the mainly deliberate the improvement of embedding capacity through embedding text with image simultaneously. For that purpose, used matrix partition to partition the secret image then embedded each partition separately after scrambling each pixel by replacing msb instead
of lsb to provide the second level of security furthermore to steganography. The simulation results clarify the better performance of the proposed algorithms.
Secure Data Hiding System by using AES Algorithm and Indicator Based LSB Methodijtsrd
Security of data is one of the most challenging problems in todays technological world. In order to secure the transmission of secret data over the public network Internet , numerous data security and hiding algorithms have been developed in the last decade. Steganography combined with cryptography can be one of the best choices for solving this problem. In this paper, the proposed framework is the dual layer of security, in which the first layer is to encrypt the secret text message using advanced encryption standard AES algorithm and in the second layer to embed this message using the indicator based least significant bit LSB method which is used to hide the encrypted text message into the cover image. It differs from the LSB algorithm in that it does not embed the bytes of the cover data sequentially but it embeds into one bit or two bits at once. Actually, it depends on indicators to determine where and how many bits to embed at a time. The Mean Square Error MSE and Peak Signal to Noise Ratio PSNR measure the imperceptibility of the system. Experimental results show that the stego image is usually indistinguishable from the cover image. Myo Ma Ma | Zar Zar Hnin | Yin Min Htwe "Secure Data Hiding System by using AES Algorithm and Indicator-Based LSB Method" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26500.pdfPaper URL: https://www.ijtsrd.com/computer-science/computer-security/26500/secure-data-hiding-system-by-using-aes-algorithm-and-indicator-based-lsb-method/myo-ma-ma
A Secure Data Communication System Using Cryptography and SteganographyIJCNCJournal
The information security has become one of the most significant problems in data communication. So it
becomes an inseparable part of data communication. In order to address this problem, cryptography and
steganography can be combined. This paper proposes a secure communication system. It employs
cryptographic algorithm together with steganography. The jointing of these techniques provides a robust
and strong communication system that able to withstand against attackers. In this paper, the filter bank
cipher is used to encrypt the secret text message, it provide high level of security, scalability and speed.
After that, a discrete wavelet transforms (DWT) based steganography is employed to hide the encrypted
message in the cover image by modifying the wavelet coefficients. The performance of the proposed system
is evaluated using peak signal to noise ratio (PSNR) and histogram analysis. The simulation results show
that, the proposed system provides high level of security.
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUEIJNSA Journal
Embedding a message in media files, also known as steganography, is a common approach to hide secret
information. It has been exploited by some criminals to confidentially exchange messages. As a countermeasure,
tools have been developed in order to detect hidden information form digital media such as text,
image, audio or video files. However the efficiency and performance of previous approaches still have
room for improvement. In this research, we focus on algorithm design for better efficiency of hidden message detection from PNG files. We employ three classic AI approaches including neural network, fuzzy logic, and genetic algorithm and evaluate their efficiency and performance in controlled experiments. Finally we introduce our message detection system for PNG files based on LSB approach and present its
usability in different case scenarios
A Robust Technique to Encrypt and Decrypt Confidential Data within Imageinventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUEIJNSA Journal
Embedding a message in media files, also known as steganography, is a common approach to hide secret
information. It has been exploited by some criminals to confidentially exchange messages. As a countermeasure, tools have been developed in order to detect hidden information form digital media such as text, image, audio or video files. However the efficiency and performance of previous approaches still have room for improvement. In this research, we focus on algorithm design for better efficiency of hidden message detection from PNG files. We employ three classic AI approaches including neural network, fuzzy logic, and genetic algorithm and evaluate their efficiency and performance in controlled experiments. Finally we introduce our message detection system for PNG files based on LSB approach and present its usability in different case scenarios.
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHYcsandit
Digital communication witnesses a noticeable and continuous development in many
applications in the Internet. Hence, a secure communication sessions must be provided. The
security of data transmitted across a global network has turned into a key factor on the network
performance measures. Cryptography and steganography are two important techniques that are
used to provide network security. In this paper, we conduct a comparative study of
steganography and cryptography. We survey a number of methods combining cryptography and
steganography techniques in one system. Moreover, we present a classification of these
methods, and compare them in terms of the algorithm used for encryption, the steganography
technique and the file type used for covering the information.
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITIONIJNSA Journal
Recently, the mode of living became more complicated without computer systems. The techniques of camouflage information have acquired a vital role with the requirement of intensifying trade of multimedia content. Steganography is the technique that utilizes disguise in a way that prohibits unauthorized access from suspicion of the existence of confidential information exchanged during communication channels between the connected parties. In this paper, an integrated image steganographic system is designed to conceal images, messages or together where the mainly deliberate the improvement of embedding capacity through embedding text with image simultaneously. For that purpose, used matrix partition to partition the secret image then embedded each partition separately after scrambling each pixel by replacing msb instead
of lsb to provide the second level of security furthermore to steganography. The simulation results clarify the better performance of the proposed algorithms.
One of the reasons that intruders can be successful is that most of the information they acquire from a system is in a form that they can read and comprehend. Intruders may reveal the information to others, modify it to misrepresent an individual or organization, or use it to launch an attack. One solution to this problem is, through the use of Steganography. Steganography is a technique of hiding information in digital media. In contrast to cryptography, it is not to keep others from knowing the hidden information but it is to keep others from thinking that the information even exists. In this review paper we will understand what Steganography, Cryptography is and what are the advantages of using them? In last we will discuss our goal of this paper that what types of techniques worked on video Steganography?
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...IJNSA Journal
In today’s day and age when everything is done with the aid of computing technology, the need for confidential communication has drastically increased. Not only the sensitive data such as top intelligent secrets of our nation but personal information of common people needs to be secure. Several combinations of cryptography and steganography techniques in different ways are used by researchers over the past to protect the data being transmitted. Cryptography uses mathematical algorithms to convert the data into an incomprehensible form and Steganography, on the other hand hides the data in a carrier such as image, data, audio or video. Cryptography provides necessary mechanisms for providing accountability, accuracy and confidentiality in public communication mediums such as the Internet and steganography is used in other fields such as copyright, preventing e-document forging etc. We are of the opinion that this security mechanism can further be increased by incorporating the use of Huffman coding in order to reduce the data length. This paper is an effort in the direction to hide, secure and compress the data. It explains the executed procedure by applying various encryption techniques one by one and our aim is to get the best security out of the existing ones. The proposed technique is implemented in MATLAB2016a and the results shown in this paper that our technique is better approach then the conventional techniques.
Review paper on Data Security using Cryptography and Steganographyvivatechijri
One of the major problems faced by this digital world is Data Security. Data Security plays an important role in the field of information technology. As there are large advancements in internet technology, there has been huge text as well as multimedia data transfer over the internet. The communication channel available for data transfer from the transmitter to receiver is highly insecure. As the security of electronic data is a major issue and to achieve high security and confidentiality, the public and the private sectors use different kinds of techniques and methods to protect the data from unauthorized users. Cryptography and Steganography are the most popular and widely used technologies for security. Cryptography is the art of hiding information by encryption and steganography is a technique to hides data in the cover medium. Cryptography hides the readable and meaningful contents of the data. And the existence of the data is hidden by the Steganography technique.
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMijcisjournal
Steganography is the art of hiding confidential information (secret) within any media file (cover media) to
produce an amalgamated secret-cover media called stego media, so that the secret cannot be recognized or
recovered by unauthorized recipients. Many steganalysis techniques have been developed enabling
recognition of the existence of secrets within stego media and recovering it. Therefore, it is necessary to
develop more secure steganography algorithms. This paper presents a detailed description of a new secure
Block Permutation Image Steganography (BPIS) algorithm. The algorithm converts the secret message to a
binary sequence, divides the binary sequence into blocks, permutes the block using a key-based randomly
generated permutation, concatenates the permuted blocks forming a permuted binary sequence, and then
utilizes the Least-Significant-Bit (LSB) approach to embed the permuted binary sequence into BMP image
file. The algorithm performance is investigated through performing a number of experiments, and for each
experiment the PSNR (Peak Signal-to-Noise Ratio) between the stego and cover images is calculated. The
results show that the algorithm provides high image quality, and invisibility, and most importantly higher
security as secret cannot be recovered without knowing the permutation, which has a complexity of O(N!),
where N is the length of the permutation.
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...ijiert bestjournal
Steganography is the art of covered or hidden text message. The purpose of steganography is covert com munication- to hide the existence of a secret message from a th ird party. This paper is intnded as a high-level te chnical introduction to steganography for those unfamiliar with the field. It is directed at forensic computer examiners who need a practical understanding of steganography wit hout study into the mathematical,although referenc es are provided to many of the ongoing research for the pe rson who needs or wants additional detail covered b y audio- video file. Although in this paper gives a historic al context for steganography,the significance is o n digital applications use anti Forensics technique,focusing on hiding information in online audio and video fi les. Examples for tools of software that employ steganography to hide data inside of audio-video file as well as sof tware to detect such hidden files will also be presented. Suitable algorithm such as LSB is used for image steganograp hy suitable parameter of security and authentication is like PS NR,histogram are obtained at transmitter\sende and receiver side which are exactly identical,hence data security ca n be increased. This paper focus on the idea of com puter anti forensics technique and its use of video steganogra phy in both investigative and security manner.
Hungarian-Puzzled Text with Dynamic Quadratic Embedding SteganographyIJECEIAES
Least-Significant-Bit (LSB) is one of the popular and frequently used steganography techniques to hide a secret message in a digital medium. Its popularity is due to its simplicity in implementation and ease of use. However, such simplicity comes with vulnerabilities. An embedded secret message using the traditional LSB insertion is easily decodable when the stego image is suspected to be hiding a secret message. In this paper, we propose a novel secure and high quality LSB embedding technique. The security of the embedded payload is employed through introducing a novel quadratic embedding sequence. The embedding technique is also text dependent and has non-bounded inputs, making the possibilities of decoding infinite. Due to the exponential growth of and quadratic embedding, a novel cyclic technique is also introduced for the sequence that goes beyond the limits of the cover medium. The proposed method also aims to reduce the noise arising from embedding the secret message by reducing bits changed. This is done by partitioning the cover medium and the secret message into N partitions and artificially creating an assignment problem based on bit change criteria. The assignment problem will be solved using the Hungarian algorithm that will puzzle the secret message partition for an overall least bit change.
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...ijtsrd
Increase in the number of attack recorded during electronic exchange of information between the source and intended destination has indeed called for a more robust method for securing data transfer. Cryptography and steganography are well known and widely used techniques that manipulate information in order to cipher or hide their existence. Many different carrier file format scan be used but digital images are the most popular because of their frequency on the internet. The digital images are the most popular because of their frequency on the Web among all different carrier file formats. Image steganography, achieves the secrecy by embedding data into cover image and generating a stego-image. There are many types of steganography techniques each have their advantages and disadvantages. This paper discussed a technique used on the advanced LSB (least significant bit) and RSA algorithm. By matching data to an image, there is less chance of an attacker being able to use steganalysis to recover data. Before hiding the data in an image the application first encrypts it Priya Jain | Somesh Kumar | Raj Kumar Goel"A Survey on Enhancement of Text Security Using Steganography and Cryptographic Techniques" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-5 , August 2018, URL: http://www.ijtsrd.com/papers/ijtsrd15800.pdf http://www.ijtsrd.com/computer-science/computer-security/15800/a-survey-on-enhancement-of-text-security-using--steganography-and-cryptographic-techniques/priya-jain
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
The purpose of this study is to review and understand the decision making influences faced by female segment in choosing and purchasing specific Brands of Cars in the Muscat region of the Sultanate of Oman. The paper reports an empirical analysis by classifying female segments into cohorts based on the decision making characteristics which provides qualitative insights of the female car owner driver segment residing in Oman. The Car Manufacturers will benefit from the data collected, especially in helping to build good customer relationships with the segment and in determining factors impacting on the profitability.
One of the reasons that intruders can be successful is that most of the information they acquire from a system is in a form that they can read and comprehend. Intruders may reveal the information to others, modify it to misrepresent an individual or organization, or use it to launch an attack. One solution to this problem is, through the use of Steganography. Steganography is a technique of hiding information in digital media. In contrast to cryptography, it is not to keep others from knowing the hidden information but it is to keep others from thinking that the information even exists. In this review paper we will understand what Steganography, Cryptography is and what are the advantages of using them? In last we will discuss our goal of this paper that what types of techniques worked on video Steganography?
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...IJNSA Journal
In today’s day and age when everything is done with the aid of computing technology, the need for confidential communication has drastically increased. Not only the sensitive data such as top intelligent secrets of our nation but personal information of common people needs to be secure. Several combinations of cryptography and steganography techniques in different ways are used by researchers over the past to protect the data being transmitted. Cryptography uses mathematical algorithms to convert the data into an incomprehensible form and Steganography, on the other hand hides the data in a carrier such as image, data, audio or video. Cryptography provides necessary mechanisms for providing accountability, accuracy and confidentiality in public communication mediums such as the Internet and steganography is used in other fields such as copyright, preventing e-document forging etc. We are of the opinion that this security mechanism can further be increased by incorporating the use of Huffman coding in order to reduce the data length. This paper is an effort in the direction to hide, secure and compress the data. It explains the executed procedure by applying various encryption techniques one by one and our aim is to get the best security out of the existing ones. The proposed technique is implemented in MATLAB2016a and the results shown in this paper that our technique is better approach then the conventional techniques.
Review paper on Data Security using Cryptography and Steganographyvivatechijri
One of the major problems faced by this digital world is Data Security. Data Security plays an important role in the field of information technology. As there are large advancements in internet technology, there has been huge text as well as multimedia data transfer over the internet. The communication channel available for data transfer from the transmitter to receiver is highly insecure. As the security of electronic data is a major issue and to achieve high security and confidentiality, the public and the private sectors use different kinds of techniques and methods to protect the data from unauthorized users. Cryptography and Steganography are the most popular and widely used technologies for security. Cryptography is the art of hiding information by encryption and steganography is a technique to hides data in the cover medium. Cryptography hides the readable and meaningful contents of the data. And the existence of the data is hidden by the Steganography technique.
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMijcisjournal
Steganography is the art of hiding confidential information (secret) within any media file (cover media) to
produce an amalgamated secret-cover media called stego media, so that the secret cannot be recognized or
recovered by unauthorized recipients. Many steganalysis techniques have been developed enabling
recognition of the existence of secrets within stego media and recovering it. Therefore, it is necessary to
develop more secure steganography algorithms. This paper presents a detailed description of a new secure
Block Permutation Image Steganography (BPIS) algorithm. The algorithm converts the secret message to a
binary sequence, divides the binary sequence into blocks, permutes the block using a key-based randomly
generated permutation, concatenates the permuted blocks forming a permuted binary sequence, and then
utilizes the Least-Significant-Bit (LSB) approach to embed the permuted binary sequence into BMP image
file. The algorithm performance is investigated through performing a number of experiments, and for each
experiment the PSNR (Peak Signal-to-Noise Ratio) between the stego and cover images is calculated. The
results show that the algorithm provides high image quality, and invisibility, and most importantly higher
security as secret cannot be recovered without knowing the permutation, which has a complexity of O(N!),
where N is the length of the permutation.
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...ijiert bestjournal
Steganography is the art of covered or hidden text message. The purpose of steganography is covert com munication- to hide the existence of a secret message from a th ird party. This paper is intnded as a high-level te chnical introduction to steganography for those unfamiliar with the field. It is directed at forensic computer examiners who need a practical understanding of steganography wit hout study into the mathematical,although referenc es are provided to many of the ongoing research for the pe rson who needs or wants additional detail covered b y audio- video file. Although in this paper gives a historic al context for steganography,the significance is o n digital applications use anti Forensics technique,focusing on hiding information in online audio and video fi les. Examples for tools of software that employ steganography to hide data inside of audio-video file as well as sof tware to detect such hidden files will also be presented. Suitable algorithm such as LSB is used for image steganograp hy suitable parameter of security and authentication is like PS NR,histogram are obtained at transmitter\sende and receiver side which are exactly identical,hence data security ca n be increased. This paper focus on the idea of com puter anti forensics technique and its use of video steganogra phy in both investigative and security manner.
Hungarian-Puzzled Text with Dynamic Quadratic Embedding SteganographyIJECEIAES
Least-Significant-Bit (LSB) is one of the popular and frequently used steganography techniques to hide a secret message in a digital medium. Its popularity is due to its simplicity in implementation and ease of use. However, such simplicity comes with vulnerabilities. An embedded secret message using the traditional LSB insertion is easily decodable when the stego image is suspected to be hiding a secret message. In this paper, we propose a novel secure and high quality LSB embedding technique. The security of the embedded payload is employed through introducing a novel quadratic embedding sequence. The embedding technique is also text dependent and has non-bounded inputs, making the possibilities of decoding infinite. Due to the exponential growth of and quadratic embedding, a novel cyclic technique is also introduced for the sequence that goes beyond the limits of the cover medium. The proposed method also aims to reduce the noise arising from embedding the secret message by reducing bits changed. This is done by partitioning the cover medium and the secret message into N partitions and artificially creating an assignment problem based on bit change criteria. The assignment problem will be solved using the Hungarian algorithm that will puzzle the secret message partition for an overall least bit change.
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...ijtsrd
Increase in the number of attack recorded during electronic exchange of information between the source and intended destination has indeed called for a more robust method for securing data transfer. Cryptography and steganography are well known and widely used techniques that manipulate information in order to cipher or hide their existence. Many different carrier file format scan be used but digital images are the most popular because of their frequency on the internet. The digital images are the most popular because of their frequency on the Web among all different carrier file formats. Image steganography, achieves the secrecy by embedding data into cover image and generating a stego-image. There are many types of steganography techniques each have their advantages and disadvantages. This paper discussed a technique used on the advanced LSB (least significant bit) and RSA algorithm. By matching data to an image, there is less chance of an attacker being able to use steganalysis to recover data. Before hiding the data in an image the application first encrypts it Priya Jain | Somesh Kumar | Raj Kumar Goel"A Survey on Enhancement of Text Security Using Steganography and Cryptographic Techniques" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-5 , August 2018, URL: http://www.ijtsrd.com/papers/ijtsrd15800.pdf http://www.ijtsrd.com/computer-science/computer-security/15800/a-survey-on-enhancement-of-text-security-using--steganography-and-cryptographic-techniques/priya-jain
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
The purpose of this study is to review and understand the decision making influences faced by female segment in choosing and purchasing specific Brands of Cars in the Muscat region of the Sultanate of Oman. The paper reports an empirical analysis by classifying female segments into cohorts based on the decision making characteristics which provides qualitative insights of the female car owner driver segment residing in Oman. The Car Manufacturers will benefit from the data collected, especially in helping to build good customer relationships with the segment and in determining factors impacting on the profitability.
The efficacy of Lemon (Citrus lemonirisso) juice on wound healing of albino wistar rat was investigated; also the potential haemostatic mechanism associated with administration of the extract was investigated. Results showed that lemon juice extract decreased haemoglobin concentration, packed cell volume while it has no significant effect on platelet count, white blood cell count and white cell differential counts in albino rats. Furthermore, the bleeding and clotting times were shortened and the period of healing of wound using lemon juice could possess some elements that is affecting the haemostatic mechanism.
The rapid growth of Hospitality businesses in Nigeria is increasing at an alarming rate. It is sad to note that majority of these investors have little or no knowledge of the impact that their investment has on the environment. This is because most investors only carry out feasibility study on the profit forfeiting the sustainability of the business which depends on the environment. Today hospitality investors in Nigeria have refused to answer this question “are the activities of hospitality business environmental friendly? At this point it is pertinent to note that the sustainability of any hospitality business anchors largely on environmental sustainability. In other words, all hospitality business needs the environment to strive. Therefore, in view of the above, this paper critically diagnosed the activities of Soarak hotel and casino Lagos towards environmental sustainability. Its primary objective is to identify the impact of soarak hotel on its immediate surroundings. This research made extensive use of interview and questionnaire as instruments of data collection. In conclusion, the paper recommends sustainable measures to mitigate the activities of hospitality business on the environment.
The global economic recession has posed new challenges to the world coupled with the challenges of new energy technology in response to global warming has dwindled the economy of so many nations today. Particularly petro-mono economy countries like Nigeria whose revenue base depends mostly on proceeds from crude oil exportation. Overdependence on crude oil is a sign of blunt future consequentially if the oil mine dries up. What would be the fate of the economy? Therefore it is time for Nigeria to spread the tentacles of her economic prowess to other service sectors such as Tourism for sustainable economic exploitation. Tourism is one of the most promising drivers of growth for the world economy. As a development vehicle, tourism resources are inexhaustible unlike crude oil. Nigeria specifically Awka has vast tourism potentials awaiting development. Little wonder the administration of former President Olusegun Obansanjo the set machinery in motion to turn the sector into a major revenue earner. The machinery included the introduction of various festivals across the country for the promotion of its rich cultural heritage to woo foreign tourists. With her appealing tourism resources, this paper advocates the development and exploitation of these resources for wealth creation.
Air pollution is a global environmental challenge that has continued to receive worldwide attention despite the recent decline in concentration of atmospheric pollutants following stringent environmental protection regulations. The major source of this pollution remains fossil fuels; hence the urgent need for cleaner energy sources. This study presents a review of the models applied in monitoring ambient air quality. The primary aim of air pollution modeling is to identify and quantitatively characterize pollutant emission at its source and subsequent dispersion through the atmosphere, subject to meteorological conditions, physical and chemical transformations. The common models and model assumptions for modeling air pollution and quality were critically reviewed and analyzed in this work for application in both forecasting and estimation of air pollutants on the basis of considered causes and in air quality assessment and air pollution control.
It has been observed that anthropogenic activities namely, farming, tree harvesting, seasonal fire regimes, introduction of exotic tree species like Eucalyptus and Greviella, and collection of herbs for medicinal use are going on and form a major threat for the orchid Polystachya fusiformis (Thou.) Lindl. This study determined the relative abundance and distribution of the species Polystachya fusiformis (Thou.) Lindl. in the Manga range ecosystem of Kisii, Western Kenya during two flowering seasons. Other results of the present study were analyzed with SPSS version 17 for paired sample correlations, OriginPro7 t-Test and ANOVA, Minitab 16 chi-square test. From the analysis there is a significant correlation between altitude and number of orchid population clusters with a p-value of 0.008 in the distribution of Polystachya fusiformis (Thou.) Lindl. which led to rejection of the null hypothesis. The Levene’s test for equal variance shows that at α 0.05 there is a significant difference between altitude and number of clusters as indicated by the P value of 0.00004. Of the 88 sites sampled, only 41sites had orchid clusters. Principal component analysis using Unscrambler 9.7 indicated that many of the orchid population clusters fell within the range of one or two orchid population clusters. The score plots from the two Hoteling’s outputs show how well data is distributed including sample patterns, groupings, similarities and differences during the study. The two analyses illustrated how fire affects the orchid population on fire prone sites of the range. Orchid population clusters progressively increased with increase with altitude range (from 1800m to 1850m) above sea level, but number of orchid population clusters decreased towards 1950m. Sites with minimal anthropogenic disturbances (1796m, 1830m, 1854m, 1886m, and 1890m) had a higher number of orchid population clusters.
Barley is one of the most important traditional crops in Ethiopia which is a major center of genetic diversity for barley along with other crop plants species. Two hundred seven accessions and 18 released varieties were laid down in 15*15 simple lattice design and planted in 2008 main cropping season (June to Nov) at Kokate. The objective of the study was to conduct the morphological characterization and to determine the nature and degree of variability in morpho- agronomic traits of landrace of barley in southern Ethiopia collections. The proportion of genotypes in kernel row number were 26.6, 15.3, 16.6, 41.5 and 0.4% for two rowed with lateral floret, two rowed deficient, irregular, six rowed with awns on lateral floret and branched heads, respectively. Genotypes with white kernel color (57.5%) and amber (normal) lemma color (50%) were dominant. The highest diversity indices pooled over the characters within zones/ special woredas were recorded for accessions sampled from Dawro (H’= 0.75 ± 0.05) followed by Sheka (H’=0.74 ± 0.07), Gamgofa (H’ =0.70 ± 0.05) and Keffa (H’= 0.70 ± 0.08). These zones can be used for in situ conservation for barley landraces as representatives of southern Ethiopian high lands. The barley genotypes were clustered into five distinct groups of various sizes based on 8 qualitative traits. The estimates of diversity index (H’) for each trait in each of the three altitudinal class has shown that polymorphism was common in varying degrees for most traits, implying the existence of a wide range of variation in the materials.
Stress has become a major concern of the modern times as it can cause harm to employee’s health and performance. Work related stress costs organization billions of dollars each year through sickness, turnover and absenteeism. So it becomes necessary for every organization to know the factor causing stress among the employees as well as how they cope up with stress to make the employee more participative and productive. The Research study titled “A STUDY ON STRESS MANAGEMENT AMONG EMPLOYEES AT SAKTHI FINANCE LIMITED, COIMBATORE” was conducted to find out the factor causing stress among employees and to know how they cope up with stress. The Research design used was a descriptive research. The primary data has been collected through a questionnaire method. The sample design used in the study was Convenience Sampling Technique with a sample size of 60. The collected data has been analysed through various tools like Percentage Analysis, Chi- Square Test & ANOVAs, and Factor Analysis.
Images Steganography using Pixel Value Difference and Histogram AnalysisNortheastern University
A new data hiding method is proposed in this project , which can increase the steganographic security of a data hiding scheme .In this method a cover image is first mapped into a 1D pixels sequence by Hilbert filling curve and then it has been divided into non-overlapping embedding units .The division is made such that it gives two consecutive pixel values .As human eye has limited tolerance when it comes to texture and edge areas than in smooth areas , and as the difference between the pixel pairs in those areas are larger , therefore the method exploites pixel value difference (PVD) to solve out overflow underflow problem .
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY IJCNCJournal
The information security has become one of the most significant problems in data communication. So it
becomes an inseparable part of data communication. In order to address this problem, cryptography and
steganography can be combined. This paper proposes a secure communication system. It employs
cryptographic algorithm together with steganography. The jointing of these techniques provides a robust
and strong communication system that able to withstand against attackers. In this paper, the filter bank
cipher is used to encrypt the secret text message, it provide high level of security, scalability and speed.
After that, a discrete wavelet transforms (DWT) based steganography is employed to hide the encrypted
message in the cover image by modifying the wavelet coefficients. The performance of the proposed system
is evaluated using peak signal to noise ratio (PSNR) and histogram analysis. The simulation results show
that, the proposed system provides high level of security.
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMijcisjournal
Steganography is the art of hiding confidential information (secret) within any media file (cover media) to
produce an amalgamated secret-cover media called stego media, so that the secret cannot be recognized or
recovered by unauthorized recipients. Many steganalysis techniques have been developed enabling
recognition of the existence of secrets within stego media and recovering it. Therefore, it is necessary to
develop more secure steganography algorithms. This paper presents a detailed description of a new secure
Block Permutation Image Steganography (BPIS) algorithm. The algorithm converts the secret message to a
binary sequence, divides the binary sequence into blocks, permutes the block using a key-based randomly
generated permutation, concatenates the permuted blocks forming a permuted binary sequence, and then
utilizes the Least-Significant-Bit (LSB) approach to embed the permuted binary sequence into BMP image
file. The algorithm performance is investigated through performing a number of experiments, and for each
experiment the PSNR (Peak Signal-to-Noise Ratio) between the stego and cover images is calculated. The
results show that the algorithm provides high image quality, and invisibility, and most importantly higher
security as secret cannot be recovered without knowing the permutation, which has a complexity of O(N!),
where N is the length of the permutation.
The project proposes the enhancement of security system for secret data
communication through video file using adaptive data hiding with cryptographic
technique. A given input video file is converted into frame sequences and then
Encrypted the video using Chaos Encryption algorithm. And one of frame will be
selected to conceal the secret data for secured data communication. The proposed
technique also uses RC7 Encryption for encrypting a secret text data into cipher text
to avoid data hacking issues. After data encryption, the data hider will conceal the
secret encrypted data into the selected frame using adaptive LSB embedding
algorithm. Although encryption achieves certain security effects, they make the secret
messages unreadable and unnatural or meaningless. These unnatural messages
usually attract some unintended observers’ attention. The data hiding technique uses
the adaptive LSB replacement algorithm for concealing the secret message bits into
the image. In the data extraction module, the secret data will be extracted by using
relevant key for choosing the pixel coefficients and it will be decrypted to get original
data using encryption key. Finally the performance of this proposal in data encryption
and hiding will be analysed based on image and data recovery.
For increase network security of messages sent on
internet the steganography is mostly preferred. To transmit data
secretly steganography is used in open system environment. In
this paper discussed the reviews of image steganography and the
general framework of image steganography using different
method. Steganography is nothing but art of hide information
behind the other information without leaving remarkable track
on original message.
COMBINING JPEG STEGANOGRAPHY AND SUBSTITUTION ENCRYPTION FOR SECURE DATA COMM...cscpconf
The Internet is a method of communication to distribute information to the masses. Digital
image are excellent carriers for hidden information. Steganography and cryptography are
technologies that are used for secret and secured communications. In both the methods, secret
message is exchanged between two groups, sender and receiver. The main purpose in
cryptography is to make massage concept unintelligible, while steganography aims to hide
secret message. We propose a method of combining steganography, cryptography for secret
data communication. In this paper, we propose a high-performance JPEG steganography along
with a substitution encryption methodology. This approach uses the discrete cosine transform
(DCT) technique which used in the frequency domain for hiding data within image. It is very
difficult to detect hidden message in frequency domain and for this reason we use
steganography based on DCT. From the experimental results, we obtain that the proposed
method has a larger message capacity. Experimental results show that the correlation and
entropy values of the image with encrypted data before the insertion are similar to the values of
correlation and entropy after the insertion thus reduces the chance of the confidential message
being detected and enables secret communication. The image that contains the hidden data will
be used by the receiver to reconstruct the same secret message after extracting it. The
effectiveness of the proposed method has been estimated by computing Mean square error (MSE) and Peak Signal to Noise Ratio (PSNR). Experimental results show the method provides high security and the information is safe from various attacks.
Secure Message Transmission using Image Steganography on Desktop Basedijtsrd
The rapid increase in our technology has made easier for us to send and receive data over internet at most affordable way. There are many transmission medias like emails, facebook, twitter, etc” ¦ which led way for the intruders to modify and misuse the information what we share over the internet. So in order to overcome these kinds of issues many methods has been implemented such as Cryptography, Steganography and Digital watermarking to safeguard our data transmissions in a most prominent way. In this paper, hiding text inside a digital image using Stegano tool for secure data transmissions has been described. Sidharth Sai S | N. Priya "Secure Message Transmission using Image Steganography on Desktop Based" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-1 , December 2020, URL: https://www.ijtsrd.com/papers/ijtsrd38067.pdf Paper URL : https://www.ijtsrd.com/computer-science/computer-security/38067/secure-message-transmission-using-image-steganography-on-desktop-based/sidharth-sai-s
Hybrid information security system via combination of compression, cryptogra...IJECEIAES
Today, the world is experiencing a new paradigm characterized by dynamism and rapid change due to revolutions that have gone through information and digital communication technologies, this raised many security and capacity concerns about information security transmitted via the Internet network. Cryptography and steganography are two of the most extensively that are used to ensure information security. Those techniques alone are not suitable for high security of information, so in this paper, we proposed a new system was proposed of hiding information within the image to optimize security and capacity. This system provides a sequence of steps by compressing the secret image using discrete wavelet transform (DWT) algorithm, then using the advanced encryption standard (AES) algorithm for encryption compressed data. The least significant bit (LSB) technique has been applied to hide the encrypted data. The results show that the proposed system is able to optimize the stego-image quality (PSNR value of 47.8 dB) and structural similarity index (SSIM value of 0.92). In addition, the results of the experiment proved that the combination of techniques maintains stego-image quality by 68%, improves system performance by 44%, and increases the size of secret data compared to using each technique alone. This study may contribute to solving the problem of the security and capacity of information when sent over the internet.
Image Steganography Techniques: An OverviewCSCJournals
Steganography is one of the methods used for the hidden exchange of information. It is the art and science of invisible communication, which strives to hide the existence of the communicated message. In this way, if successfully it is achieved, the message does not attract attention from eavesdroppers and attackers. Using steganography, information can be hidden in different embedding mediums, known as carriers. These carriers can be images, audio files, video files, and text files. The focus in this paper is on the use of an image file as a carrier, and hence, the taxonomy of current steganographic techniques for image files has been presented. These techniques are analyzed and discussed in terms of their ability to hide information in image files, the amount of the information that can be hidden, and the robustness to different image processing attacks.
Steganography using Interpolation and LSB with Cryptography on Video Images-A...Editor IJCATR
Stegnography is the most common term used in the IT industry, which specifically means, "covered writing" and is derived
from the Greek language. Stegnography is defined as the art and science of invisible communication i.e. it hides the existence of the
communication between the sender and the receiver. In distinction to Cryptography, where the opponent is permitted to detect,
interrupt and alter messages without being able to breach definite security grounds guaranteed by the cryptosystem, the prime
objective of Stegnography is to conceal messages inside other risk-free messages in a manner that does not agree to any enemy to even
sense that there is any second message present. Nowadays, it is an emerging area which is used for secured data transmission over any
public medium such as internet. In this research a novel approach of image stegnography based on LSB (Least Significant Bit)
insertion and cryptography method for the lossless jpeg images has been projected. This paper is comprising an application which
ranks images in a users library on the basis of their appropriateness as cover objects for some facts. Here, the data is matched to an
image, so there is a less possibility of an invader being able to employ steganalysis to recuperate the data. Furthermore, the application
first encrypts the data by means of cryptography and message bits that are to be hidden are embedded into the image using Least
Significant Bits insertion technique. Moreover, interpolation is used to increase the density
Steganography using Interpolation and LSB with Cryptography on Video Images -...Editor IJCATR
Steg
nography is the most common term used in
the IT industry, which specifically means, "covered writing" and is derive
d
from the Greek language. Steg
nography is defined as the art and science of invisible communication i.e. it hides the existence of the
communication between the sender and the rece
iver. In distinction to Cryptography, where the opponent is permitted to detect,
interrupt and alter messages without being able to breach definite security grounds guaranteed by the cryptosyst
em, the prime
objective of Steg
nography is to conceal messages
inside other risk
-
free messages in a manner that does not agree to any enemy to even
sense that there is any second message present. Nowadays,
it is an emerging area which is used for secured data transmission over any
public medium such as internet. In th
is research a novel approach of image
steg
nography
based on LSB (Least Significant Bit)
insertion and cryptography method for the lossless jpeg images has been projected. This paper is comprising an application wh
ich
ranks images in a users library on the
basis of their appropriateness as cover objects for some facts. Here, the data is matched to an
image, so there is a less possibility of an invader being able to employ steganalysis to recuperate the data. Furthermore, th
e application
first encrypts the da
ta by means of cryptography and message bits that are to be hidden are embedded into the image using Least
Significant Bits insertion technique. Moreover, interpolation is used to increase the density
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITIONIJNSA Journal
Recently, the mode of living became more complicated without computer systems. The techniques of
camouflage information have acquired a vital role with the requirement of intensifying trade of multimedia
content. Steganography is the technique that utilizes disguise in a way that prohibits unauthorized access
from suspicion of the existence of confidential information exchanged during communication channels
between the connected parties. In this paper, an integrated image steganographic system is designed to
conceal images, messages or together where the mainly deliberate the improvement of embedding capacity
through embedding text with image simultaneously. For that purpose, used matrix partition to partition the
secret image then embedded each partition separately after scrambling each pixel by replacing msb instead
of lsb to provide the second level of security furthermore to steganography. The simulation results clarify
the better performance of the proposed algorithms.
An important topic in the exchange of confidential messages over the internet is the security of information conveyance. For instance, the producers and consumers of digital products are keen to know that their products are authentic and can be differentiated from those that are invalid. The science of encryption is the art of embedding data in audio files, images, videos or content in a way that would meet the above security needs. Steganography is a branch of data hiding science which aims to reach a describe level of security in the exchange of private military and commercial data which is not clear. This system is proposed to hide the text information files within the image based on the LSB method in order to meet security requirement such as confidential and integrity. The least significant bit is the bit which is farthest to the right and holds the least value in a multi bit binary number. This system is implemented by using C programming. Win Win Maw | San San Lwin "Text Embedded System using LSB Method" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26696.pdf Paper URL: https://www.ijtsrd.com/engineering/information-technology/26696/text-embedded-system-using-lsb-method/win-win-maw
"Heart failure is a typical clinical accompanied by symptoms syndrome (e.g. shortness of breath, ankle swelling and fatigue) that lead to structural or functional abnormalities of the heart (e.g. high venous pressure, pulmonary edema and peripheral edema).
In recent years, the significant role of B-type natriuretic peptide has been revealed in the pathogenesis of heart disease and the use of the drug sacubitril/valsartan has started. It has a positive effect on the regulation of the level of B-type natriuretic peptide in the body. It is obviously seen from the the world literature that natriuretic peptides play an important role in the pathophysiology of heart failure. For this reason, many studies suggest that the importance of natriuretic peptides in the diagnosis and treatment of heart failure is recommended.
Due to this, we tried to investigate the effects of a comprehensive medication therapy with a combination of sacubitril/valsartan in the patients with chronic heart failure."
Parallel generators of pseudo random numbers with control of calculation errors
T0 numtq0nju=
1. International Journal of Science and Research (IJSR)
ISSN (Online): 2319-7064
Impact Factor (2012): 3.358
Advanced Technique for Comprehensive Data
Security
Pramendra Kumar1, Vijay Kumar Sharma2
1M.Tech Scholar, Department of Computer Science, RIET, Bhankrota, Jaipur, Rajasthan, India
2Asst. Prof., Department of Computer Science, RIET, Bhankrota, Jaipur, Rajasthan, India
Abstract: In any communication, security is the most important task. With the advancement of technology and the wide use of World
Wide Web for communication increase the challenges of security. Most of the classical security method are based on cryptography and
stegnography techniques, but every time these technologies may not be reliable for communication of secrete information over a long
distance. Where cipher text may easily arouse attackers‘suspicion, the biggest concern in the field of steganography is the rapid
advancement of research in steganalysis, the counter-technology of steganography. This merely means that steganography needs to add
security services to its current repertoire, while not increasing the number of problems. However, in recent years, a lot of research has
taken place in direction to trim down the security issues by contributing various approaches but different terrains pose separate
challenges. These inadequacies of modern as well as traditional security methods, motivates to design a novel security system that
improve the level of security. In this context, this paper has proposed a novel two layer security mechanism by combining the concepts of
both, cryptography and stegnography techniques.
Keywords: Cryptography, Stegnography, Security, Data hiding, Encryption
1. Introduction
From the past few decades, because of no boundary barriers
of distance, easy accessing and the fast delivery of
information the online web based system is more popular as
a new communication media in between the end users.
However, these online systems are vulnerable to a variety of
well-known cyber-attacks. Cyber world needs high level of
safeguard for expensive data during transmission over the
open communication channel. The typical idea of security
clearly assumes disjointing of users and attackers to provide
safeguard against unauthorized access of secrete
information. This need of security produce explosive growth
of the field of information hiding which covers applications
such as copyright protection for digital media, Cryptography,
Steganography, Digital Watermarking and finger printing.
All these applications of information hiding are quite
diverse. However, the secrete information might be secure
with the modern security techniques but most of the security
methods are based on the cryptographic techniques. The aim
of cryptography is to provide secure solutions to a set of
parties who wish to carry out a distributed task and either do
not trust each other or fear an external adversarial threat. The
security method of cryptography encrypt plain text to
generate cipher text, where the cyber attacker easily arouse
these text and intercepts the communication between two
separate users to modify, inject, or drop any communication
packet [1, 2, 3]. The cryptography has several problems
like;
The information that has been encrypted might be
accidently utilized on something that was not meant to be
encrypted, and the person who was meant to obtain the
message may not be able to read the message sent to them
at all.
Sometimes encryption may not be strong enough, and
therefore, others may be able to easily intercept and
interpret information.
The encryption might be used in order for criminals to be
able to easily and effortlessly perform crimes.
Another drawback of cryptography is the limitations that
have been enforced by certain governments,
Many governments have created laws to either limit the
strength of cryptographic systems or to prohibit it
altogether and sometimes even the possession of a
cryptographic algorithm - is illegal in certain countries.
To improve these limitations and to reduce the issues of
cryptographic methods an alternative mechanism, the
steganography has use widely. This is a powerful security
tool that provides a high level of security, particularly when
it is combined with encryption [4].Generally the concepts of
this techniques differ from the cryptography, where the
cryptography method converted the information in a
encrypted form that an eavesdropper and cannot be
understand, the Steganography technique embeds hidden
content in unremarkable cover media so as not to arouse an
eavesdropper’s suspicion in some cases, sending encrypted
information may draw attention, while invisible information
will not.
Traditional steganography techniques rely on the encoding
system’s secrecy to secure the information. The system able
to provide security but have a problem that if attacker known
than it is simple enough to expose the entire received media
passing by to check for hidden messages ultimately, such a
steganographic system fails. Beside this problem in
steganography the image and video codec are block-based
and possible bit-errors usually destroy the data only in a
single block or even all the blocks in the rest of the row of
macro blocks (slice). These block errors decrease the visual
quality drastically. Hence, the concealment of such block
losses is a realistic situation in many cases, except for the
damage of some header information. On the other hand, the
majority of steganographic systems uses images as cover
media because people often transmit digital pictures over
email and other Internet communication but this techniques
in same case may produce the same results as previous one
that shows the single security technique either cryptography
Volume 3 Issue 10, October 2014
www.ijsr.net
Paper ID: OCT14465 1319
Licensed Under Creative Commons Attribution CC BY
2. International Journal of Science and Research (IJSR)
ISSN (Online): 2319-7064
Impact Factor (2012): 3.358
or steganography is not a turnkey solution to secure the
secrete information over the open system. For a strong
system it is always better to use both cryptography and
steganography together. In this context, this paper has
proposed a novel two layer security mechanism by
combining the concepts of both, cryptography and
stegnography technique.
2. Related Work
A novel image adaptive stegnographic technique have
proposed in [5], in which the integer wavelet transform
domain called as the Robust Image Adaptive Steganography
using Integer Wavelet Transform. According to information
theoretic prescriptions for parallel Gaussian models of
images, data should be hidden in low and mid frequencies
ranges of the host image, which have large energies.[6]
worked out the specific design principles and elements of
steganographic schemes for the JPEG format and their
security. The detect ability is evaluated experimentally using
a state of art blind steganalyser.
A novel approach has been proposed a combination of three
different LSB insertion algorithms [7] on GIF image through
stegcure system. The unique feature about the stegcure is
being able to integrate three algorithms in one
Steganography system. By implementing public key
infrastructure, unauthorized user is forbidden from
intercepting the transmission of the covert data during a
communication because the stego key is only known by the
sender and the receiver. [8] Proposed a work which deals
with public- key Steganography in presence of passive
warden. The main aim is to hide the secret information
within cover documents without giving the warden any clue
and without any preliminary secret key sharing. This work
explores the use of trellis coded quantization technique to
design more efficient public key scheme.
LSB based steganography algorithm presented [9] with high
data hiding capacity as four LSB’s are used to hide data,
high confidentiality as distortions which can cause
suspicions for the intruders, are removed through filtering
techniques and two level high security is applied. A security
model is proposed which imposes the concept of secrecy
over privacy for text messages [10]. The proposed model
combines cryptography; steganography and along with an
extra layer of security has been imposed in between them. A
noval approach has been proposed a scheme embeds a
larger-sized secret image while maintaining acceptable
image quality of the stego-image [11] and also improved
image hiding scheme for gray scale images based on wet
paper coding.
Author describe in [12], a steganographic model which
utilizes cover video files to conceal the presence of other
sensitive data regardless of its format. The model presented
is based on pixel-wise manipulation of colored raw video
files to embed the secret data. The paper also presents a
quantitative evaluation of the model using four types of
secret data. The model is evaluated in terms of both the
average reduction in Peak Signal to Noise Ratio (PSNR)
compared to the original cover video; as well as the Mean
Square Error (MSE) measured between the original and
steganographic files averaged over all video frames.
The paper [13] proposes a new method for the real-time
hiding of information used in compressed video Bit streams.
The method is based on the real-time hiding of information
in audio steganography. This method of steganography is
very similar to the two discussions of image steganography
and video steganography. A new compressed video secure
steganography (CVSS) algorithm is proposed. In this
algorithm, embedding and detection operations are both
executed entirely in the compressed domain, with no need
for the decompression process. In order to make faithful and
secure communication, a dual layer hiding technique [14]
proposed.
The paper [15] presents hiding the data behind the image
then encrypts the image byusing hyper-chaos encryption
algorithm. In this algorithm, shuffling matrix and diffusing
matrix are generated based on Chen’s hyper-chaotic system.
Firstly, the Chen’s hyper-chaotic system is used to shuffle
the position of the image pixels, and then use Chen’s hyper-chaotic
system to confuse the relationship between the
original image and the cipher image.
A novel steganography technique mainly based on joint
photographic expert group (JPEG) is proposed in [16]. This
technique is based on 2-D Block-DCT, where DCT is used
to transform original image (cover image) blocks from
spatial domain to frequency domain. The proposed method
provides acceptable image quality and a large message
capacity. Overall, the proposed method matches the
requirement of steganography with a larger message capacity
and good image quality. The method has larger message
capacity than Jpeg-Jsteg method. To ensure the security
against the steganalysis attack, a new steganographic
algorithm for 8bit(grayscale) or 24 bit (color image) is
presented in paper [17], based on Logical operation.
Algorithm embedded MSB of secret image in to LSB of
cover image. In this n LSB of cover image, from a byte is
replaced by n MSB of secret image. The image quality of the
stego-image can be greatly improved with low extra
computational complexity. The worst case mean-square-error
between the stego-image and the cover-image is
derived. A steganography technique which embeds the secret
messages in frequency domain proposed in [18].Unlike the
space domain approaches, secret messages are embedded in
the high frequency coefficients resulted from Discrete
Wavelet Transform. In proposed method cryptography
algorithm is used to convert the secret messages to an
unreadable form before embedding. Algorithms keep the
messages from stealing, destroying from unintended users on
the internet and hence provide satisfactory security.
Blowfish algorithm is used for encryption and decryption of
text message using a secret-key block cipher. Designed to
increase security and to improve performance algorithm uses
a variable key size up to 448 bits.
A practical steganographic implementation ST-FMM [19]
proposed to hide text inside grey scale images. Using the
Five Modulus Method secret message is hidden inside the
cover image. FMM consists of transforming all the pixels
Volume 3 Issue 10, October 2014
www.ijsr.net
Paper ID: OCT14465 1320
Licensed Under Creative Commons Attribution CC BY
3. International Journal of Science and Research (IJSR)
ISSN (Online): 2319-7064
Impact Factor (2012): 3.358
within the 55 window size into its corresponding multiples
of 5. After that, the secret message is hidden inside the 55
window as a non-multiples of 5. Since the modulus of non-multiples
of 5 are 1,2,3 and 4, therefore; if the reminder is
one of these, then this pixel represents a secret character.
The secret key that has to be sent is the window size. The
main advantage of this novel algorithm is to keep the size of
the cover image constant while the secret message increased
in size. Peak signal-to-noise ratio is captured for each of the
images tested. Based on the PSNR value of each images, the
stego image has high PSNR value. Hence this new
steganography algorithm is very efficient to hide the data
inside the image.
3. Proposed Work
To apply the security for important data at the time of
communication over unsecured channels the proposed
approach provide two layer of security by combining the
functionality of cryptography & stegonagrphy. The figure 1
presents the overall methodology that is adopted to secure
data.
Figure 1: Adopted Methodology to Secure Data
At first level of security secrete message is encrypted by
using the Advance Encryption Standard (AES) algorithm
that produce cipher file. The cipher file cannot be easily
understand by any other user and secrete message can only
be accessible after decode process with the right key which
only contain by the actual receiver. After the encryption
process the cipher file has split into 8 frames to increase the
security level. For the second level of security a video file
has taken into account, firstly split all the frames of video
file and randomly select a extracted frame that supply as the
input to Discrete Cosine Transform (DCT) based embedded
algorithm with the cipher text file to hide the encrypt
message. After complete this process all the extracted frames
of video file has combine to generate the video as original
one. The outcome file also known as stego file provide the
second layer of security to information and no one can easily
notice that running video has the hide information. Sender
may send this stego file to receiver over the unsecured
channel for the secure communication of secrete
information. Whenever the receiver finds the stego file,
apply the reverse methodology from the sender to get the
correct secret message.
Figure 2: Proposed System Flow steps
The figure 4.5 & 4.6 clearly present the detailed steps of
proposed system that adopt to provide the security to the
information.
Volume 3 Issue 10, October 2014
www.ijsr.net
Paper ID: OCT14465 1321
Licensed Under Creative Commons Attribution CC BY
4. International Journal of Science and Research (IJSR)
ISSN (Online): 2319-7064
Impact Factor (2012): 3.358
4. Experimental Results
Experiments are carried out using the MATLAB to evaluate
the performance of the proposed approach. Numerous
experiments are performed to ensure the quality
measurement between the cover frame (original frame) and
the stego frame (Frame that hide the secrete message). The
frame quality parameters peak signal to noise ratio (PSNR)
is used to examine the quality of the proposed approach.
4.1 Peak Signal to Noise Ratio (PSNR)
PSNR is one of metrics to determine the degradation in the
embedded image with respect to the host image. It shows the
quality of image after hiding the data. For the quality
measurement between the cover image (original image) and
the stego image the ratio of difference between image quality
parameters (PSNR) are often used. For the better quality of
the stego image the higher value of the PSNR between
original image and the stego image shows better quality of
the image and also indicate lower error. To compute the
value of the image quality parameter PSNR, first of all the
block calculates the value of MSE (Mean Square Error) by
using the following the mathematical equation
Volume 3 Issue 10, October 2014
www.ijsr.net
Licensed Under Creative Commons Attribution CC BY
Where
MAXI=Maximum value of pixel in Original image
m=No. of Row in Original image
n= No. of Column in Original image
In comparative analysis, proposed approach has executed
with the same parameter as taken by [20]. Two video has
taken in consideration (drop.avi, flame.avi) to evaluate
results.
Figure 3: Drop.avi
Table 1 Present the comparative PSNR result of proposed
approach against the techniques has been used in [20].
Table 1: PSNR Value of Frames
Name of
the
video file
Results obtained using
Proposed Approach
Results obtained using
HLSB [60]
Drop 46.2912 44.34
Flame 50.2615 42.66
Figure 4: Comparative Result of Proposed Approach
The investigated approach has also not change its sizes as
approach proposed in the [21], shown in following figures.
Figure 5: Size based comparative results
The results clearly indicated the superiority of the proposed
approach over the other that has been indicated in the [20,
21].
5. Conclusion and Future Work
In current scenario technology face various challenges.
Security of secrete message in one of the most challenging
face in current scenario. In this term to provide more security
Paper ID: OCT14465 1322
5. International Journal of Science and Research (IJSR)
ISSN (Online): 2319-7064
Impact Factor (2012): 3.358
to the information at the time of communication over
unsecured channel a novel advance technique for data
security is proposed in this paper. The approach proposed
two layer of security to the information by combining the
cryptography and steganography technique. If a level of the
proposed approach will fail to secure the information,
message will be safe with the second level of security
mechanism of proposed approach that is the key contribution
of this work.
For the future work the work can be done in direction to
improve the time efficiency that proposed approach has
taken into account to secure and retrieve the original
information from the cover media. Apart from the time
proposed way can be implemented with the audio file instead
to video file to improve the hiding quality of the secrete
message.
References
[1] Jefferson, D. et al. “Analyzing internet voting security”,
Volume 3 Issue 10, October 2014
www.ijsr.net
Licensed Under Creative Commons Attribution CC BY
2004. ACM, 47(10):59-64.
[2] Schneier, B. “Secrets & Lies: Digital Security in a
Networked World”. Wiley Computer Publishing. .
[3] Xia, H. &Brustoloni, J.C. 2005. Hardening web
browsers against main-in-the-middle and
eavesdropping attacks. Proceedings of the International
Conference on World Wide Web, 489-498.
[4] Neil F. Johnson and SushilJajodia, “Steganalysis: The
Investigation of Hidden Information,” IEEE conference
on Information Technology, pp. 113-116, 1998.
[5] Currie, D.L. & Irvine, C.E., “Surmounting the effects of
lossy compression on Steganography”, 19thNational
Information Systems Security Conference, 1996
[6] Fabien A. P. Petitcolas, Ross J. Anderson and Markus
G. Kuhn. “Information Hiding – A Survey”,
Proceedings of the IEEE, special issue on protection of
multimedia content, July 1999, pp. 1062 – 1078.
[7] Monika Agarwal “TEXT STEGANOGRAPHIC
APPROACHES: ACOMPARISON” International
Journal of Network Security & Its Applications
(IJNSA), Vol.5, No.1, January 2013
[8] Arvind Kumar, Km. Pooja, “Steganography-A Data
Hiding Technique” InternationalJournal of Computer
Applications ISSN 0975– 8887, Volume 9– No.7,
November 2010.
[9] Wang, H. & Wang, S. 2004. Cyber warfare:
Steganography vs. steganalysis. Communications of the
ACM, 47(10):76-82.
[10] Lisa M.Marvel and Charles T. Retter, “A Methodology
for Data Hiding using Images,” IEEE conference on
Military communication, vol. 3, Issue. 18-21, pp. 1044-
1047, 1998.
[11] Giuseppe Mastronardi, Marcello Castellano,
Francescomaria Marino, “Steganography Effects in
Various Formats of Images. A Preliminary Study,”
International Workshop on Intelligent data Acquisition
and Advanced Computing Systems: Technology and
Applications, pp. 116-119, 2001.
[12] LIU Tong, QIU Zheng-ding “A DWT-based color
Images Steganography Scheme” IEEE International
Conference on Signal Processing, vol. 2, pp.1568-1571,
2002.
[13] Jessica Fridrich, MiroslavGoijan and David Soukal,
“Higher-order statistical steganalysis of palette images”
Proceeding of SPIE, Electronic Imaging, Security,
Steganography, and Watermarking of Multimedia
ContentsV, vol. 5020, pp. 178-190, 2003.
[14] Jessica Fridrich and David Soukal, “Matrix Embedding
for Large Payloads” SPIE, Electronic Imaging,
Security, Steganography, and Watermarking of
Multimedia Contents, vol. 6072, pp. 727-738. 2006.
[15] Yuan-Yu Tsai, Chung-Ming Wang “A novel data
hiding scheme for color images using a BSP tree”
Journal of systems and software, vol.80, pp. 429-437,
2007.
[16] Shilpa P. Hivrale, S. D. Sawarkar, Vijay Bhosale, and
SeemaKoregaonkar “Statistical Method forHiding
Detection in LSB of Digital Images: An Overview
World Academy of Science, Engineeringand
Technology, vol. 32, pp. 658-661, 2008.
[17] K. B. Raja, S. Sindhu, T. D. Mahalakshmi, S. Akshatha,
B. K. Nithin, M. Sarvajith, K. R. Venugopal,L. M.
Patnaik, “Robust Image Adaptive Steganography using
Integer Wavelets” International conference on
Communication Systems Software, pp. 614-621, 2008.
[18] Jan Kodovsky, Jessica Fridrich “Influence of
Embedding Strategies on Security of Steganographic
Methods in the JPEG Domain” Proceedings of SPIE,
the International Society for OpticalEngineering, vol.
6819, pp. 681902.1-681902.13, 2008.
[19] L. Y. Por, W. K. Lai, Z. Alireza, T. F. Ang, M. T. Su,
B. Delina, “StegCure: A Comprehensive
Steganographic Tool using Enhanced LSB Scheme,”
Journal of WSEAS Transctions on Computers, vol. 8,
pp. 1309-1318, 2008.
[20] Kousik Dasgupta, J.K. Mandal and Paramartha Dutta
"Hash Based Least Significant Bit Technique For
Video Steganography(Hlsb)",International Journal of
Security, Privacy and Trust Management ( IJSPTM),
Vol. 1, No 2, April 2012
[21] Harshitha K M, Dr. P. A. Vijaya "Secure Data Hiding
Algorithm Using Encrypted Secret Message",
International Journal of Scientific and Research
Publications, Volume 2, Issue 6, June 2012
Paper ID: OCT14465 1323