CFP last date
20 December 2024
Reseach Article

Implementation of Steganographic Method based on Interpolation and LSB Substitution of Digital Images with Watermarking and Visual Cryptography

by Manjinder Kaur, Varinder Kaur Attri
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 121 - Number 21
Year of Publication: 2015
Authors: Manjinder Kaur, Varinder Kaur Attri
10.5120/21822-5073

Manjinder Kaur, Varinder Kaur Attri . Implementation of Steganographic Method based on Interpolation and LSB Substitution of Digital Images with Watermarking and Visual Cryptography. International Journal of Computer Applications. 121, 21 ( July 2015), 7-12. DOI=10.5120/21822-5073

@article{ 10.5120/21822-5073,
author = { Manjinder Kaur, Varinder Kaur Attri },
title = { Implementation of Steganographic Method based on Interpolation and LSB Substitution of Digital Images with Watermarking and Visual Cryptography },
journal = { International Journal of Computer Applications },
issue_date = { July 2015 },
volume = { 121 },
number = { 21 },
month = { July },
year = { 2015 },
issn = { 0975-8887 },
pages = { 7-12 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume121/number21/21822-5073/ },
doi = { 10.5120/21822-5073 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:09:00.006939+05:30
%A Manjinder Kaur
%A Varinder Kaur Attri
%T Implementation of Steganographic Method based on Interpolation and LSB Substitution of Digital Images with Watermarking and Visual Cryptography
%J International Journal of Computer Applications
%@ 0975-8887
%V 121
%N 21
%P 7-12
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Today's data is transferred in public network is not secure because of interception by eavesdropper. Steganography, is a better technique for writing the hidden messages in another file format like text, image, videos. In this paper, we proposed a technique of data hiding using interpolation, least significant bit, digital watermarking and cryptography. Performance is tested through the measures mean squared error(MSE) & peak signal to noise ratio and data embedding capacity. Result shows with these parameter are shows better results from the previous results. Results are also shows in bar charts form. The experimental results showed that the average PSNR was 45. 05 dB and 429888 bit data embedding capacity was respectively which is better results from the previous algorithm

References
  1. Kalaivanan. S, Ananth. V and Manikandan. T, "A Survey on Digital Image Steganography", International Journal of Emerging Trends and Technology in Computer Science, ISSN 2278-6856, Volume 4, Issue 1, January-February 2015.
  2. Steganography. en. wikipedia. org/wiki/Steganography.
  3. Aruna Varanasi, M. Lakshmi Anjana and Pravallika Pasupulate, "Image Steganography with Cryptography using Multiple Key Patterns", International Journal of Computer Applications (0975 – 8887), Volume 90 – No 15, March 2014.
  4. G. Raj Kumar, M. Maruthi Prasada Reddy and T. Lalith Kumar, "An Implementation of LSB Steganography Using DWT Technique", International Journal of Engineering Research and General Science, ISSN 2091-2730, Volume 2, Issue 6, October-November, 2014.
  5. Fundamentals of Cryptography. http://www. iimahd. ernet. in/~jajoo/ec/cryptography. htm
  6. Monika Birara and Subhash chander, "Steganography based on interpolation and LSB substitution with visual cryptography on digital images", International Journal of Computer Application and Technology , ISSN: 2349-1841, May - 2014, pp. 68-70.
  7. Ki-Hyun Jung & Kee-Young Yoo, "Steganographic method based on interpolation and LSB substitution of digital images" Springer Science+Business Media New York, 5 jan. , 2014
  8. Mukesh Garg and A. P. Gurudev Jangra, "An Overview of Different Type of Data Hiding Scheme in Image using Steganographic Techniques", International Journal of Advanced Research in Computer Science & Software Engineering, ISSN: 2277 128X , Volume 4, Issue 1, January 2014.
  9. Sonia Bajaj, Manshi Shukla, "Review on: secret data transfer using interpolation and lsb substitution with water marking", Global Journal of Advanced Engineering Technologies, ISSN: 2277-6370, Vol3, Issue3 2014.
  10. Mehdi Hussain & Mureed Hussain, "A Survey of Image Steganography Techniques", International Journal of Advanced Science and Technology Volume 54, May, 2013.
  11. Shamim Ahmed Laskar and Kattamanchi Hemachandran, "High Capacity data hiding using LSB Steganography and Encryption", International Journal of Database Management Systems, Vol. 4, No. 6, December 2012.
  12. Shilpa Gupta, Geeta Gujral and Neha Aggarwal, " Enhanced Least Significant Bit algorithm For Image Steganography", International Journal of Computational Engineering & Management, ISSN (Online): 2230-7893, Vol. 15 Issue 4, July 2012.
  13. Pooja Kaushik and Yuvraj Sharma, "Comparison Of Different Image Enhancement Techniques Based Upon Psnr & Mse", International Journal of Applied Engineering Research, ISSN 0973-4562 Vol. 7 No. 11, 2012.
  14. Ankit Chaudhary, J. Vasavada, J. L. Raheja and Sandeep Kumar, Manmohan Sharma, "A Hash based Approach for Secure Keyless Steganography in Lossless RGB Images", The 22nd International Conference on Computer Graphics and Vision, Russia, Moscow, October 01, 05, 2012.
  15. Sidham Abhilash and S M Shamseerdaula," A Novel Lossless Robust Reversible Watermarking Method for Copyright Protection of Images," Journal of Engineering Research and Applications, Vol. 3, Issue 6, Nov-Dec 2013.
  16. Gurpreet Kaur and Kamaljeet Kaur, "Digital Watermarking and Other Data Hiding Techniques", International Journal of Innovative Technology and Exploring Engineering, ISSN: 2278-3075, Volume-2, Issue-5, April 2013.
  17. Chunlin Song, Sud Sudirman, Madjid Merabti, "Recent Advances and Classification of Watermarking Techniques in Digital Images", ISBN: 978-1-902560-22-9,2009PGNet.
Index Terms

Computer Science
Information Sciences

Keywords

LSB Interpolation watermarking PSNR MSE capacity cryptography.