CFP last date
20 December 2024
Reseach Article

Improve Image Steganography using Random Password Generation for Secure Transmission of Data

Published on July 2018 by Sukhjinder Pal Kaur, Sonika Jindal
International Conference on Advances in Emerging Technology
Foundation of Computer Science USA
ICAET2017 - Number 3
July 2018
Authors: Sukhjinder Pal Kaur, Sonika Jindal
62626f74-32c9-422e-bf0d-fb8267c66ca2

Sukhjinder Pal Kaur, Sonika Jindal . Improve Image Steganography using Random Password Generation for Secure Transmission of Data. International Conference on Advances in Emerging Technology. ICAET2017, 3 (July 2018), 11-16.

@article{
author = { Sukhjinder Pal Kaur, Sonika Jindal },
title = { Improve Image Steganography using Random Password Generation for Secure Transmission of Data },
journal = { International Conference on Advances in Emerging Technology },
issue_date = { July 2018 },
volume = { ICAET2017 },
number = { 3 },
month = { July },
year = { 2018 },
issn = 0975-8887,
pages = { 11-16 },
numpages = 6,
url = { /proceedings/icaet2017/number3/29653-7072/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Advances in Emerging Technology
%A Sukhjinder Pal Kaur
%A Sonika Jindal
%T Improve Image Steganography using Random Password Generation for Secure Transmission of Data
%J International Conference on Advances in Emerging Technology
%@ 0975-8887
%V ICAET2017
%N 3
%P 11-16
%D 2018
%I International Journal of Computer Applications
Abstract

Steganography is a technique for the secure transmission of data over the network. In this process, the secret information is transmitted by hiding this behind a signal or image or video. LSB technique can be used for hiding images in 24-bit, 8-bit or gray scale format. In this process image is divided into different regions for the detection of least significant bits available in different images. Image pixel available in the image is a combination of three different colours red, green and blue. Modifications over traditional LSB method are introduced to increase the amount of data that can be hided in the cover image. In addition, to increase data protection our algorithm have a built in encryption technique. As LSB the output image of algorithm will look identical to the cover image.

References
  1. Yang Ren-er, Tao Shun, Ding Shilei "Image Steganography Combined with DES Encryption Pre-processing" IEEE Sixth International Conference on Measuring Technology and Mechatronics Automation, pp. 323-326, 2014.
  2. Guo, J. -M, Jen-Ho Chen "Quality Compressed Steganography Using Hidden Referenced Halftoning" Ninth IEEE International Symposium on Multimedia, pp. 273-281, 2007.
  3. Mathkour, H, Al-Sadoon, B. , Touir, A. "A New Image Steganography Technique" IEEE 4th International Conference on Wireless Communications, Networking and Mobile Computing, pp. 1-4, 2008.
  4. Bandyopadhyay, S. K. , Tai-hoonKim, Parui, S. "Network Based Public Key Method for Steganography" IEEE International Conference on Ubiquitous Computing and Multimedia Applications, pp. 53-56, 2011.
  5. Fard, A. M, Akbarzadeh-T, M. -R. , Varasteh-A, F. "A New Genetic Algorithm Approach for Secure JPEG Steganography" IEEE International Conference on Engineering of Intelligent Systems, pp. 1-6, 2006.
  6. Alla, K. , Prasad, R. "An Evolution of Hindi Text Steganography" Sixth International Conference on Information Technology: New Generations,2009, pp. 1577–1578.
  7. Changder, S, Debnath, N. C. , Ghosh, D. "A Greedy Approach to Text Steganography Using Properties of Sentences" IEEE Eighth International Conference on Information Technology: New Generations, pp. 30-35, 2011.
  8. Banerjee, S, Chakraborty, M. S. , Das, S. "A variable higher bit approach to audio steganography" IEEE International Conference on Recent Trends in Information Technology, pp. 46-49, and 2013.
  9. Mstafa, R. J, Elleithy, K. M. "A highly secure video steganography using Hamming code (7, 4)" IEEE Long Island Systems, Applications and Technology Conference, pp. 1-6, 2014.
  10. Ramaiya, M. K, Hemrajani, N. , Saxena, A. K. "Security improvisation in image steganography using DES" IEEE 3rd International Advance Computing Conference, pp. 1094-1099, 2013.
  11. Uddin, M. P, Ferdousi, S. J. , IbnAfjal, M. "Developing an efficient solution to information hiding through text steganography along with cryptography" IEEE 9th International Forum on Strategic Technology, pp. 14-17, 2014.
  12. Buga?r, G. , Broda, M. , Levicky?, D. "Data hiding in still images based on blind algorithm of steganography" IEEE 24th International Conference on Radio elektronika, pp. 1-4, 2014.
  13. GeHuayong, Huang Mingsheng , Wang Qian "Steganography and steganalysis based on digital image" IEEE 4th International Congress on Image and Signal Processing, pp. 252-255, 2011
  14. Selvi, G. K, Mariadhasan, L. , Shunmuganathan, K. L. "Steganography using edge adaptive image" IEEE International Conference on Computing, Electronics and Electrical Technologies, pp. 1023-1027, 2012.
  15. Dagar, S "Highly randomized image steganography using secret keys" IEEE Recent Advances and Innovations in Engineering, pp. 1-5, 2014.
  16. Karaman, H. B,Sagiroglu, S. "An Application Based on Steganography" IEEE International Conference on Advances in Social Networks Analysis and Mining, pp. 839-843, 2012.
Index Terms

Computer Science
Information Sciences

Keywords

Lsb & Isb Image Security Steganography Psnr Mse