CFP last date
20 December 2024
Reseach Article

A New Data Hiding Approach in Images for Secret Data Communication with Steganography

by Irfan Khan, Sudesh Gupta, Shivendra Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 135 - Number 13
Year of Publication: 2016
Authors: Irfan Khan, Sudesh Gupta, Shivendra Singh
10.5120/ijca2016906413

Irfan Khan, Sudesh Gupta, Shivendra Singh . A New Data Hiding Approach in Images for Secret Data Communication with Steganography. International Journal of Computer Applications. 135, 13 ( February 2016), 9-14. DOI=10.5120/ijca2016906413

@article{ 10.5120/ijca2016906413,
author = { Irfan Khan, Sudesh Gupta, Shivendra Singh },
title = { A New Data Hiding Approach in Images for Secret Data Communication with Steganography },
journal = { International Journal of Computer Applications },
issue_date = { February 2016 },
volume = { 135 },
number = { 13 },
month = { February },
year = { 2016 },
issn = { 0975-8887 },
pages = { 9-14 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume135/number13/24107-2016906413/ },
doi = { 10.5120/ijca2016906413 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:35:41.292284+05:30
%A Irfan Khan
%A Sudesh Gupta
%A Shivendra Singh
%T A New Data Hiding Approach in Images for Secret Data Communication with Steganography
%J International Journal of Computer Applications
%@ 0975-8887
%V 135
%N 13
%P 9-14
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper, a new secret data hiding and communication is proposed for natural images.in this proposed methodology. The aim of steganography is to hide an information message within harmless cover medium in such way that it's not possible even to observe that secrete message. It doesn't replace cryptography however rather boosts the security using its obscurity options. In the projected its obscurity features. In the proposed algorithm we have used second order differential equation to hide the data which improve the security level of hidden data. In encryption, information is transformed in such a way that it cannot be detect by hacker. But during encryption, message is changed so it become distorted and intruder may suspect about the presence of important information. For this skin tone detection is performed using HSV (Hue, Saturation and Value) color space. Additionally secret data embedding is performed victimization frequency domain approach – DWT (Discrete wavelet Transform), DWT outperforms than DCT (Discrete cosine Transform). Secret information is hidden in one of the high frequency sub-band of DWT by tracing skin pixels therein sub-band. Totally different steps of data hiding are applied by cropping a picture interactively. The output of our technique provides higher results because with the assistance of cropping an increased security than hiding data while not cropping i.e. in whole image, thus cropped region works as a key at decryption aspect. thus with this object destined steganography we have a tendency to track skin tone objects in image with the higher security and satisfactory PSNR (Peak-Signal-to-Noise Ratio).Modern steganography’s goal is to stay its more presence undetectable.

References
  1. J. A.Stark “Adaptive image contrast enhancement using generalizations of histogram equalization, “IEEE Trans Image process, vol.9, no.5, pp.889-896, May 2000.
  2. Manu devi and Nidhi sharma, “Improved detection of least significant bit steganography algorithms in color and gray scale images” Proceedings of 2014 RAECS UIET Punjab university chandigarh, pp 6-8, March, 2014.
  3. Morkel. T, J.H.P. Eloff, M.S. Olivier “An overview of image steganography”, Proceedings of the Fifth annual information security South Africa conference (ISSAC), Sandton, South Africa, (2005).
  4. Sudhir goswami, Jyoti goswami and Rajesh mehra, “An efficient algorithm of steganography using JPEG colored image” IEEE International conference on recent advances and innovations in engineering (ICRAIE-2014), May 2014.
  5. Khalid A. Darabkh, Iyad F. Jafar,Raed T.Al Zulbi, And Mohammad Hawa "An improved image least significant bit replacement method” MIPRO , 26-30 May 2014, Opatija, Croatia.
  6. H.-C.Wu, N.-I. Wu, C.-S. Tsai, and M.-S. Hwang, “Image steganography scheme based on pixel-value differencing and LSB replacement methods,”IEEE proceddings on Vision, image and signal processing, Vol. 152, no. 5, pp.611-615, 2005.
  7. Reena M. Patel and D J Shah "Multiple LSB data hiding based on pixel value and MSB value”2013 nirma university international conference on engineering,NUiCONE , November 2013.
  8. Jawad M.J., “Hiding audio using wavelet transform”,M.Sc thesis, college of science,Al-Nahrain university,Iraq, 2005.
  9. Deepali singla and Mamta juneja,”An analysis of edge based iamge steganography techniques in spatial domain” Proceedings of RAECS UIET Punjab university chandigarh, March, 2014.
  10. Anderson R.J., “Streching the limits of steganography”springer lecture notes in computer science,vol.1174, pp.39-48, 1996. computer based system, pp.159-168, 2008.
  11. T. Zhang and X Ping,”Reliable detection of LSB steganography based on the difference histogram,”IEEE international conference on acoustics, speech and signal processing, vol.3, pp.545-548, april,2003.
  12. Kathryn Hempstalk, "Hiding behind corners:Using edges in image for better steganography”,proceddings of the computing women’s congress, 2006.
  13. M.M. Amin, M. Salleh, S. Ibrahim, M.R.K. Atmin and M.Z.I. Shamsuddin, “Information hiding using steganography”4th national conference on telecommunication technology. NCTT,pp. 21-25, Jan. 2003.
  14. Shahzad alam, vipin kumar, waseem A .siddiqui and musheer ahmed,, “Key dependent image steganography using edge detection” fourth international conference on advance computing and communication technologies,IEEE-ICACCT , 2014.
  15. Wei-jen wang, Cheng-ta huang and shiuh-jeng wang,–“VQ Applications in steganographic data hiding upon multimedia images,”IEEE system journal , vol.5,no.4, December 2011.
  16. Ashwin,s.;Ramesh,j.;Kumar,s.a.;gunavathi,k.”Novel and secure encoding and hiding techniques using image steganography:A survey,”Emerging trends in electrical engineering and energy management(ICETEEEM), pp. 171-177. 2012..
  17. Banoci,v.;Bugar,G.;Levicky,D.”A novel method of image steganography in DWT domain,”RADIOELEKTRONICS, 2011 21st international conference, pp.1-4, 2011.
  18. Babu,K.S.;Raja,K.B.;Kiran,K.K.;Manjuladevi,T.H;venugopal,K.R.,patnaik,L.M.,”Authentication of secret information in image steganography,” TENCON, pp.1-6, 2008.
  19. J.X. Wang and Z,M. Lu , “A path optional losssless data hiding scheme based on VQ joint neighboring coding”, Inform.SCI. , VOL. 179, no. 19, pp. 3332-3348, 2009
  20. Z.H. Wang, C.C.. Chang , K.N. Chen , and M.C. Li , “An Encoding method for both image compression and data loss less information hiding ” J.syst. softw. Vol 83, no.11, pp. 2073-2082. 2010.
  21. S.C. Shie and S,D. Lin , “Data hiding based on compressed VQ indices of images”, Comput. Standrds interfaces, vol. 31 , no.6 pp. 1143-1149, 2009.
  22. C.C. Lee , W.H. KU and S.Y. huang, “A New Steganographic scheme based on vctor quantization and serch order coding ”, IET image process,. Vol . 3 no. 4 pp. 243-248, Augest 2009 .
  23. C..C. Chang and W.C. Wu, “Hiding secret data adaptively in vector quantization index table” IEEE proc. Vision, image signal process., vol. 153, no. 5, pp. 589 – 597,2006
  24. C.C. Chang and C.Y .Lin, “Reversible stegnography for VQ –Compressed images using site matching and relocetion“ IEEE Tans.inform forensics SEC. vol.1, no. 4 , pp. 493-501, December 2006.
  25. C.C. Chan and C.C. Chang, “High Capcity SMVQ – Based hiding scheme using adaptive index”, Signal process. Vol . 90 no. 7. pp. 2141 – 2149, 2010.
Index Terms

Computer Science
Information Sciences

Keywords

Steganography DWT Data Hiding. RGB Second order differential equation