CFP last date
20 December 2024
Reseach Article

Enhance Steganography Techniques: A Solution for Image Security

by Priyanka Thakur, Santosh Kushwaha, Yogesh Rai
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 115 - Number 3
Year of Publication: 2015
Authors: Priyanka Thakur, Santosh Kushwaha, Yogesh Rai
10.5120/20133-2220

Priyanka Thakur, Santosh Kushwaha, Yogesh Rai . Enhance Steganography Techniques: A Solution for Image Security. International Journal of Computer Applications. 115, 3 ( April 2015), 28-33. DOI=10.5120/20133-2220

@article{ 10.5120/20133-2220,
author = { Priyanka Thakur, Santosh Kushwaha, Yogesh Rai },
title = { Enhance Steganography Techniques: A Solution for Image Security },
journal = { International Journal of Computer Applications },
issue_date = { April 2015 },
volume = { 115 },
number = { 3 },
month = { April },
year = { 2015 },
issn = { 0975-8887 },
pages = { 28-33 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume115/number3/20133-2220/ },
doi = { 10.5120/20133-2220 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:53:46.369517+05:30
%A Priyanka Thakur
%A Santosh Kushwaha
%A Yogesh Rai
%T Enhance Steganography Techniques: A Solution for Image Security
%J International Journal of Computer Applications
%@ 0975-8887
%V 115
%N 3
%P 28-33
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Steganography word is making from two words: one is Steganos that means "covered or secret" and second is the graphic that means "writing". Similarly Cryptography word is also making from two words: one is Crypto that means "Alter original word Meaning" and second is the graphic that means "writing". In this work, Enhance Steganography technique with cryptograph technique is proposed, developed and analyzed. The proposed technique encrypts the confidential image by the proposed encryption technique initially and then hides the cipher image by Steganography technique which is using randomization techniques during selection of LSB. The results of the proposed technique are discussed and analyzed based on the peek signal to noise ratio (PSNR) and Correlation. The proposed technique is simple, fast secure and efficient, it strong to attack and better the image quality.

References
  1. Kumar, R. P. ; Hemanth, V. ; Shareef, M. "Securing Information Using Sterganoraphy" Published in IEEE International Conference on Circuits, Power and Computing Technologies (ICCPCT), 20-21 March 2013 Page(s):1197 - 1200 Print ISBN:978-1-4673-4921-5 INSPEC Accession Number:13583743
  2. Prabakaran, G. , Bhavani, R. Rajeswari P. S. "Multi secure and robustness for medical image based steganography scheme" Published in IEEE International Conference on Circuits, Power and Computing Technologies (ICCPCT), 20-21 March 2013 Page(s): 1188 - 1193 Print ISBN:978-1-4673-4921-5 INSPEC Accession Number:13583718
  3. Ramaiya MK, Hemrajan N. i, Saxena A. K. "Security Improvisation in Image Steganography using DES" Published in IEEE 3rd International Advance Computing Conference (IACC), 22-23 Feb. 2013 Page(s): 1094 - 1099 Print ISBN:978-1-4673-4527-9 INSPEC Accession Number: 13498964
  4. Akhtar, N. ; Johri, P. ; Khan, S. "Enhancing the Security and Quality of LSB Based Image Steganography" Published in 5th IEEE International Conference on Computational Intelligence and Communication Networks (CICN), 27-29 Sept. 2013 Page(s):385 - 390 INSPEC Accession Number: 13896095
  5. Mehdi Hussain and Mureed Hussain "A Survey of Image Steganography Techniques" published in International Journal of Advanced Science and Technology Vol. 54 May , 2013 PP 113-124. Avilable at http://www. sersc. org/journals/IJAST/vol54/11. pdf
  6. Selvi, G. K. ; Mariadhasan, L. ; Shunmuganathan, K. L. "Steganography Using Edge Adaptive Image" Published in IEEE International Conference on Computing, Electronics and Electrical Technologies (ICCEET), 21-22 March 2012 Page(s):1023 - 1027 Print ISBN: 978-1-4673-0211-1 INSPEC Accession Number: 12761978
  7. Nag A. , Ghosh S. , Biswas S. , Sarkar D. , Sarkar P. P. "An Image Steganography Technique using X-Box Mapping" IEEE-International Conference On Advances In Engineering, Science And Management (ICAESM -2012) March 30, 31, 2012
  8. Amirtharajan, R. ; Anushiadevi, R. ; Meena, V. ; Kalpana, V. "Seeable Visual But Not Sure of It" IEEE-International Conference On Advances In Engineering, Science And Management (ICAESM -2012) 30-31 March 2012 Page(s):388 - 393 Print ISBN:978-1-4673-0213-5 INSPEC Accession Number: 12818719
  9. Das, R. ; Tuithung, T. "A Novel Steganography Method for Image Based on Huffman Encoding" Published in 3rd IEEE National Conference on Emerging Trends and Applications in Computer Science (NCETACS), 30-31 March 2012 Page(s):14 - 18 Print ISBN: 978-1-4577-0749-0 INSPEC Accession Number:12772541
  10. Siva Janakiraman, Anitha Mary. A, Jagannathan Chakravarthy " Pixel Bit Manipulation for Encoded Hiding-An Inherent stego" Published in International Conference on Computer Communication and Informatics (ICCCI -2012), PP no 1-6 Jan. 10 – 12, 2012, Coimbatore, INDIA.
  11. Al-Abiachi, A. M. ; Inf. Technol. Dept. , Univ. Utara Malaysia, Sintok, Malaysia ; Ahmad, F. ; Ruhana, K. "A Competitive Study of Cryptography Techniques over Block Cipher" Published in 13th IEEE International Conference on Modelling and Simulation March 30 2011-April 1 2011 Page(s):415 - 419 E-ISBN :978-0-7695-4376-5 Print ISBN:978-1-61284-705-4 INSPEC Accession Number:11963172
  12. Philjon, J. T. L. ; Rao, N. V. "Metamorphic Cryptography - A Paradox between Cryptography and Steganography Using Dynamic Encryption" Published in IEEE-International Conference on Recent Trends in Information Technology, ICRTIT 3-5 June 2011 Page(s):217 - 222 Print ISBN:978-1-4577-0588-5 INSPEC Accession Number:12145614.
Index Terms

Computer Science
Information Sciences

Keywords

Image Steganography Secrete Image Cover Image Stego Image Steganalysis Cryptography LSB(Least Significant Bit) Security.