CFP last date
20 January 2025
Reseach Article

Improved Steganography Method for Secured Data Sharing

by Meetu Mann, Sudhir Goswami
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 166 - Number 12
Year of Publication: 2017
Authors: Meetu Mann, Sudhir Goswami
10.5120/ijca2017914147

Meetu Mann, Sudhir Goswami . Improved Steganography Method for Secured Data Sharing. International Journal of Computer Applications. 166, 12 ( May 2017), 29-34. DOI=10.5120/ijca2017914147

@article{ 10.5120/ijca2017914147,
author = { Meetu Mann, Sudhir Goswami },
title = { Improved Steganography Method for Secured Data Sharing },
journal = { International Journal of Computer Applications },
issue_date = { May 2017 },
volume = { 166 },
number = { 12 },
month = { May },
year = { 2017 },
issn = { 0975-8887 },
pages = { 29-34 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume166/number12/27722-2017914147/ },
doi = { 10.5120/ijca2017914147 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:13:31.875575+05:30
%A Meetu Mann
%A Sudhir Goswami
%T Improved Steganography Method for Secured Data Sharing
%J International Journal of Computer Applications
%@ 0975-8887
%V 166
%N 12
%P 29-34
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Steganography is defined as the study of invisible communication. Steganography usually deals with the ways of hiding the existence of the communicated data in such a way that it remains confidential. It maintains secrecy between two communicating parties. In image Steganography, secrecy is achieved by embedding data into cover image and generating a stego-image. Everyday the development of internet communication is increasing in which the security of information is very important. Various techniques are used to hide data in different formats in steganography .Due to the simplicity of the least significant bit (LSB) substitution method, it is used to protected the data by converting data in digital image. This paper proposes a new data hiding technique for data to be secured which moves from sender to receiver. It gives more security in hiding data and more data can be secured via this technique. A stego image is used in it due to which a secure transmission of information is taken place without the distortion of the image. It is a secure way to keep the data confident. In this paper, we achieved a higher security than the previous work by using the multi key rather than the single key for decrypting the data in the Steganography image. We also compare the result in terms of PSNR, RMSE, MSE between the proposed work and previous work and got a better result analysis.

References
  1. N. F. Johnson, S. Jajodia, “Exploring Steganography: Seeing the Unseen”, IEEE Computer vol. 31, issue 2, pp. 26-34, 1998.
  2. J. C. Judge, “Steganography: Past, Present, Future”, SANS Institute Publications, 2001.
  3. Artz D., “Digital Steganography: Hiding Data within Data”, Internet Computing IEEE, vol. 5, issue 3, pp. 75-80, 2001.
  4. Jar no Mielikainen, “LSB Matching Revisited”, Signal Processing letters, IEEE, vol. 13, issue 5, pp. 285-287, May 2006
  5. Anjali A. Shejul, Prof. U. L. Kulkarni, “A DWT based Approach for Steganography using Biometric”, International Conference On Data Storage and Data Engineering, IEEE, pp. 39-43, 2010
  6. Priyanka Thakur, Santosh Kushwaha and Yogesh Rai. Article: Enhance Steganography Techniques: A Solution for Image Security. International Journal of Computer Applications 115(3):28-33, April 2015.
  7. Sudhir Goswami, Jyoti Goswami, Rajesh Mehra, IEEE International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014), May 09-11, 2014, Jaipur, India
  8. Kirti Shukla et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 6 (2) , 2015, 1632-1635
  9. G.Sateesh1 , E.Sai Lakshmi , M.Ramanamma3 , K.Jairam4 , A.Yeswanth, “Assured Data Communication Using Cryptography and Steganography”, Volume V, Issue III, March 2016 IJLTEMAS ISSN 2278 – 2540
Index Terms

Computer Science
Information Sciences

Keywords

Steganography Encryption Discrete Cosine Transform Data Hiding Security.