CFP last date
20 December 2024
Reseach Article

Hiding the Text Messages of Variable Size using Encryption and Decryption Algorithms in Image Steganography

by Suresh Kumar, Ganesh Singh, Tarun Kumar, Maninder Singh Nehra
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 61 - Number 6
Year of Publication: 2013
Authors: Suresh Kumar, Ganesh Singh, Tarun Kumar, Maninder Singh Nehra
10.5120/9936-4571

Suresh Kumar, Ganesh Singh, Tarun Kumar, Maninder Singh Nehra . Hiding the Text Messages of Variable Size using Encryption and Decryption Algorithms in Image Steganography. International Journal of Computer Applications. 61, 6 ( January 2013), 47-52. DOI=10.5120/9936-4571

@article{ 10.5120/9936-4571,
author = { Suresh Kumar, Ganesh Singh, Tarun Kumar, Maninder Singh Nehra },
title = { Hiding the Text Messages of Variable Size using Encryption and Decryption Algorithms in Image Steganography },
journal = { International Journal of Computer Applications },
issue_date = { January 2013 },
volume = { 61 },
number = { 6 },
month = { January },
year = { 2013 },
issn = { 0975-8887 },
pages = { 47-52 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume61/number6/9936-4571/ },
doi = { 10.5120/9936-4571 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:08:25.041603+05:30
%A Suresh Kumar
%A Ganesh Singh
%A Tarun Kumar
%A Maninder Singh Nehra
%T Hiding the Text Messages of Variable Size using Encryption and Decryption Algorithms in Image Steganography
%J International Journal of Computer Applications
%@ 0975-8887
%V 61
%N 6
%P 47-52
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Steganography is a science and art of communicating in writing such a way that the presence of message is detected. Steganography is focuses on hiding of a secret message into ordinary messages and the extraction of this message into its destination using provided techniques in such a way only sender and receiver are able to disclose it. Steganography technique can be applied on text, image, video or audio files. Steganography is written in character including hash marking, but its usage within images is also very common. Steganography means hiding an important or secret message into ordinary image file in such a way that an attacker cannot detect the presence of contents in the hidden messages. Today, there are many different techniques of embedding that enable us to hiding message in a given object. The secret message can be hidden in an image file using Steganography because in this technique all requirements must be satisfied. The methods of embedding secret message (which can be plain text, cipher text) is based on replacing bits of source cover file. The Steganography algorithm basically operates on three types of images: Jpeg image, Row image and palette based images but Jpeg images are mostly used in Steganography algorithm because it is most popular loss image compression methods. The Steganography uses of least significant bit (LSB) algorithms for hiding data into Jpeg (Joint Photographic Expert Group) images. The password is used for purpose of secret for encryption and decryption. In this paper, We can hide text file of different size into image file for authentication of login and logout the system for making more secure systems. The only authorized users can hide and disclose the message. The text files of different size are used to test the system and found that the system satisfies all requirements of Steganography and the system is more secured.

References
  1. Kessler, Gary C. An Overview of Steganography for the Computer Forensics Examiner, Burlington, 2004.
  2. A. Cheddad, J. Condell, K. Curran, P. M. Kevitt,"Digital image steganography: Survey and analysis of current methods", Elsevier Journal Signal Processing, vol. 90, Issue3, pp. 727–752, March 2010.
  3. Chan, C. K. Cheng, L. M. , 2004. Hiding data in images by simple lsb substitution: pattern recognition. vol 37. Pergamon.
  4. Prof. D P Gaikwad, Trupti Jagdale, Swati Dhanokar, Abhijeet Moghe, Akash pathak"Hiding the Text and Image Message of Variable Size Using Encryption and Compression Algorithms in Video Steganography", www. ijera. com Vol. 1, Issue 2, pp. 102-108.
  5. Jamil, T. , "Steganography: The art of hiding information is plain sight", IEEE Potentials, 18:01, 1999.
  6. Arvind Kumar, km pooja, "steganographya Data hiding Technique". International journal of computer application vol. 9 November 2010.
  7. David Kahn, "The History of Steganography", Proc. of First Int. Workshop on Information Hiding.
  8. Stefan Katzenbeisser, Fabien A. P. Petitcolas, "Information Hiding Techniques for Steganography and Digital Watermarking". Boston, Artech House, pp. 43 – 82. 2000.
  9. M. M. Amin, M. Salleh, S. Ibrahim, M. R. Katmin and M. Z. I. Shamsuddin, "Information Hiding using Steganography", 4th National Conference on elecommuni cation Technology Proceedings, Shah Alam, Malaysi.
  10. R Chandramouli, N. Memon, "Analysis of LSB Based Image Steganography Techniques", In IEEE pp. 1019-1022, 2001.
  11. H. W. Tseng and C. C. Chang, "Steganography Using JPEG-Compressed Images," In Fourth International Conference on Computer and Information Technology, pp. 12-17, 2004.
  12. S . K. Moon and R. S. Kawitkar, "Data Security using Data Hiding," International Conference on Computational Intelligence and Multimedia Applications, vol. 4, pp. 247- 251, 2007.
  13. W. N. Lie and L. C. Chang. " Data hiding in images with adaptive number of least significant bits based on the human visual system. " Proc. ICIP '99, 1:286–290, 1999.
  14. Manoj Kumar Meena, Shiv Kumar, Neetesh Gupta," Image Steganography tool using Adaptive Encoding Approach to maximize Image hiding capacity", International Journal of Soft Computing and Engineering (IJSCE) , Volume-1, Issue-2, May 2011.
  15. Nada Abdul Aziz Mustafa," Design and Implementation proposed Encoding and Hiding Text in an Image", University of Sulaimani, Ms. c Thesis, 2010.
  16. N. F. Johnson, S. Jajodia, "Exploring Steganography: Seeing the Unseen," IEEE Computer, February 1998, pp. 26?34.
  17. M. Chapman, G. Davida. "Hiding the Hidden: A Software System for Concealing Ciphertext as Innocuous Text". Master Thesis, Milwaukee: University of Wisconsin- Milwaukee, 1998.
  18. Data Hiding and Retrieval : Asoke Nath, Sankar Das, Amlan Chakraborty, published in IEEE ?Proceedings of International Conference on Computational Intelligence and Communication Networks(CICN 2010)? held from 26-28 NOV' 2010 at Bhopal.
  19. Advanced Steganography Algorithm using encrypted secret message : Joyshree Nath and Asoke Nath, International Journal of Computer Science and Applications, Vol-2, No. 3, Page- 19-24, Mar (2010).
  20. New Steganography algorithm using encrypted secret message : Joyshree Nath, Meheboob Alam Mallik, Saima Ghosh and Asoke Nath : Proceedings of Worldcomp 2011 held at Las Vegas (USA), 18-21 Jul, 2011.
Index Terms

Computer Science
Information Sciences

Keywords

Cryptography image hiding Jpeg least-significant bit (LSB) method Steganography