CFP last date
20 December 2024
Reseach Article

A Novel Information Security System based on Steganography and Compression Techniques for Higher Education Institutions

by Hosnia M. M. Ahmed, Ahmed A. A. Kamel
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 181 - Number 13
Year of Publication: 2018
Authors: Hosnia M. M. Ahmed, Ahmed A. A. Kamel
10.5120/ijca2018917743

Hosnia M. M. Ahmed, Ahmed A. A. Kamel . A Novel Information Security System based on Steganography and Compression Techniques for Higher Education Institutions. International Journal of Computer Applications. 181, 13 ( Aug 2018), 24-30. DOI=10.5120/ijca2018917743

@article{ 10.5120/ijca2018917743,
author = { Hosnia M. M. Ahmed, Ahmed A. A. Kamel },
title = { A Novel Information Security System based on Steganography and Compression Techniques for Higher Education Institutions },
journal = { International Journal of Computer Applications },
issue_date = { Aug 2018 },
volume = { 181 },
number = { 13 },
month = { Aug },
year = { 2018 },
issn = { 0975-8887 },
pages = { 24-30 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume181/number13/29879-2018917743/ },
doi = { 10.5120/ijca2018917743 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:05:53.954518+05:30
%A Hosnia M. M. Ahmed
%A Ahmed A. A. Kamel
%T A Novel Information Security System based on Steganography and Compression Techniques for Higher Education Institutions
%J International Journal of Computer Applications
%@ 0975-8887
%V 181
%N 13
%P 24-30
%D 2018
%I Foundation of Computer Science (FCS), NY, USA
Abstract

With the advancement of technology and the methods of information storage and exchange, the security of information and data became a vital issue for many institutions, especially higher education institutions. This paper introduces a novel and efficient information security system based on steganography and compression techniques to address the issues related to the security and efficient transmission of secret data in higher education institutions. In this system, the Lempel Ziv Welch (LZW) compression technique is used to compress the data to be hidden, to reduce their size and thereby reduce the percentage of distortion that may occur to the cover image. In addition, a new data hiding algorithm has been developed depending on the second bit, where data are hidden based on LSB without making any changes to the values of the second bit. If any changes are made, these will be only within LSB, which reduces the distortion in the cover image and increases the similarity between the cover image before and after hiding. In the retrieval stage, hidden data are retrieved from the second bit only. The proposed system performance was evaluated in terms of MSE (mean square of error), PSNR (peak signal-to-noise ratio), PD (pixel distortion) and BER (bit error rate). The experimental results confirm the efficiency of the proposed system that achieves good results with higher PSNR and lower MSE.

References
  1. K.B.Sudeepa .et al. 2016. A New Approach for Video Steganography Based on Randomization and Parallelization , International Conference of Information Security and Privacy (ICISP), Procedia Computer Science , Vol.78, PP.483-490.
  2. A. Malik, GeetaSikka and H. k.Verma. 2016. A high Capacity Text Steganography Scheme based on LZW Compression and color coding, Engineering Science and Technology an International Journal, Vol.20, issue.1, PP.72-79.
  3. R.Bhardwaj and V.Sharma. 2016. Image Steganography Based on Complemented Message and Inverted bit LSB Substitution, Procedia Computer Science, 6th International Conference on Advances In Computing & Communications, ICACC 2016, 6-8, Vol.93, PP.832-838.
  4. M.Ramalingam and NorAshidi M. Isa. 2015. A data –hiding technique using scene-change detection for video steganography, Computers and Electrical Engineering , Vol.000, PP.1-12.
  5. H.Tian and et al. 2015. Optimal matrix embedding for Voice-over-IP steganography, Signal Processing, Vol.117, PP.33-43.
  6. R. Moradi Rad, K. Wong and J. Ming. Guo. 2016. Reversible data hiding by adaptive group modification on histogram of prediction errors, Signal Processing, Vol.125, PP.315-328.
  7. R. Jain and et al. 2012. Efficient data hiding scheme using lossless data compression and image steganography, International Journal of Engineering Science and Technology, Vol.4, No.08, PP.3908-3915.
  8. R.Karakis and et al. 2015. A novel fuzzy logic-based image steganography method to ensure medical data security, Computers in Biology and Medicine, Vol.67, PP.171-183.
  9. A. Saleema and T.Amarunnishad. 2016. A new Steganography Algorithm Using Hybrid Fuzzy Neural Networks, Procedia Technology, International Conference of Emerging Trends in Engineering, Science and Technology, Vol.24, PP.1566-1574.
  10. B.Datta, U.Mukheriee and S. K. Bandyopadhyay. 2016. LSB layer independent Robsut Steganography using Binary Addition, Procedia Computer Science, International Conference on Computational Modeling and Security, Vol.85, PP.425-432.
  11. S.Mungmode, R.R.Sedamkar and N.Kulkarni. 2016. A Modified High Frequency Adaptive Security Approach using Steganography for Region Selection based on Threshold Value,Procedia Computer Science, 7th International Conference on Communicati on, Computing and Virtualization , Vol.79, PP.912-921.
  12. K.Ramya .K.Kathiresan and G.T.Kalaiarasi. 2014. A Survey on Data Hiding and Compression Scheme, International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, Vol.3, Issue .11, PP.13132-13134.
  13. S.A.El_Rahman. 2016. A comparative analysis of image steganography based on DCT algorithm and steganography tool to hide nuclear reactors confidential information, Computers and Electrical Engineering, Vol.000, PP.1-20.
  14. T.Tuncer and E.Avci. 2016. A reversible data hiding algorithm based on probabilistic DNA-XOR secret sharing scheme for color images, Displays, Vol.14, PP.1-8.
  15. W.Chung Kuo and et al. 2016. High capacity data hiding scheme based on multi-bit encoding function, Optik- International Journal for Light and Electron Optics, Vol.17, issue.4, PP.1762-1769.
  16. S. Gupta, A. Goyal and B. Bhushan. 2012. Information Hiding Least Significant Bit Steganography and Cryptography, I.J.Modern Education and Computer Science, Vol.6, PP.27-34.
  17. M.M.Shanthi Rani and S.Lakshmanan. 2016. AN INTEGRATED METHOD OF DATA HIDING AND COMPRESSION OF MEDICAL IMAGES, International Journal of Advanced Information Technology, Vol.6, No.1, PP.43-51.
  18. A. Mohan and M.Nasseena N. 2016. AN EFFIECIENT JOINT DATA HIDING AND COMPRESSION TECHNIQUE, International Journal of Engineering Research and General Science, Vol.4, Issue.3, PP.727-733.
  19. A.S.Shankari and J.Shanthini. 2015. Enhance Novel Joint Data-Hiding and Compression Scheme Based on exemplar approach, International Research Journal of Engineering and Technology, Vol.02, Issue.08, PP.136-139.
  20. P. .M.Patil and V.R.Udupi. 2015. A Novel Joint Data Hiding and Compression Scheme Based on SVMVQ and Image Inpainting, International Journal of Science Technology & Engineering, Vol.1, Issue. 12, PP. 51-56.
  21. A. Subash and N.George. 2015. Improved Integrated Data-Hiding and Compression Scheme for Digital Images using Vector Quantization (VQ) and Side Match, International Journal of Innovative Research in Computer and Communication Engineering, Vol.3,Issue.11, PP.10589-10597.
  22. K.Gurusamy and et al. 2015. A LITERATURE SURVEY ON SECURE JOINT DATA HIDING AND COMPRESSION SCHEME TP STORE HIGH CAPACITY DATA IN IMAGE, International Journal of Technical Research and Application, Vol.3, Issue.1, PP.01-04.
  23. A.Jain and D. Pawar. 2013. Encrypted Reversible Data Hiding on Compressed Image, International Journal of Computer Application, Vol.69, No.25, PP.1-5.
  24. M. Nazrul Islam, M. Faysal Islam, and K. Shahrabi. 2015. Robust information security system using steganography, orthogonal code and joint transform correlation, Optik-International Journal for Light and Electron Optics, Vol. 126, PP. 4026-4031.
  25. S.Bader and Noufal.P. 2016. Integrated Data Hiding and Compression Scheme Based on SMVQ and EOF Inpainting, International Conference on Emerging Trends in Engineering, Science and Technology, Procedia Technology ,Vol.24, PP.1008-1015.
  26. C.Wei Shiu, Y.Chi Chen and W.Hong. 2015. Encrypted image-based reversible data hiding with public key cryptography from difference expansion, Vol.39, PP.226-233.
Index Terms

Computer Science
Information Sciences

Keywords

Steganography Data Compression LZW Algorithm