International Journal of Computer Networks and Applications (IJCNA)

Published By EverScience Publications

ISSN : 2395-0455

International Journal of Computer Networks and Applications (IJCNA)

International Journal of Computer Networks and Applications (IJCNA)

Published By EverScience Publications

ISSN : 2395-0455

A Robust Hybrid Steganography Mechanism for Security in Data Communication Networks

Author NameAuthor Details

Neha Tayal, Sangeeta Dhall, Shailender Gupta

Neha Tayal[1]

Sangeeta Dhall[2]

Shailender Gupta[3]

[1]Research Scholar, YMCA University of Science and Technology, Faridabad, India.

[2]Assistant Professor, YMCA University of Science and Technology, Faridabad, India.

[3]Assistant Professor, YMCA University of Science and Technology, Faridabad, India.

Abstract

Steganography is an art and science of hiding the secret information into a carrier such as image, audio etc. in order to conceal the existence of the data. It can be broadly classified into two categories: Spatial (Time) and Frequency domain. The former technique preserves the quality of the cover image while the latter technique provides robustness during the embedding process. As mentioned, both the techniques have their certain pros. Therefore, in this paper a hybrid scheme based on the merits of the two has been proposed. The scheme is implemented in MATLAB-10 and various performance metrics such as Peak Signal to Noise Ratio (PSNR), Mean Square Error (MSE), Correlation coefficient, Time Complexity, Bit Error Rate(BER), effect of Gaussian Noise & salt & paper noise on image are used to evaluate the efficacy of the proposed mechanism in comparison to others in literature. The results show that the proposed mechanism is highly robust to various kinds of attacks and has low time complexity.

Index Terms

Time Complexity

Cropping attack

Noise

Steganography

Reference

  1. 1.
    Joe, M. Milton, B. Ramakrishnan, “A Survey of Various Security Issues in Online Social Networks”, in proceedings of International Journal of Computer Networks and Applications, Vol. 1, Issue 1, pp 11-14, 2014.
  2. 2.
    Emad Abu-Shanab, Salam Matalqa, “Security and Fraud Issues of E-banking”, in proceedings of International Journal of Computer Networks and Applications, Vol. 2, Issue 4, pp 179-187, 2015.
  3. 3.
    Chintan Jain, VivekParate, Ajay Dhamanikar, RakeshBadgujar, “Review on Steganography and BPCS Technology in Steganography for Increasing Data Embeddind Capacity””, in proceedings of International Journal of Innovative Research in Computer and Communication Engineering, Vol. 3, Issue 1, pp 60-65,2015.
  4. 4.
    Pranita P. khairnar, Prof. V. S. Ubale, “Steganography Using BPCS Technology”, in proceedings of International Journal of Engineering And Science, Vol. 3, Issue 2, pp 08-16, 2013.
  5. 5.
    PreetiChaturvedi, R. K. Bairwa, “An Integer Wavelet Transform Based Steganography Technique for Concealing Data in colored Images”, in proceedings of International Journal of Recent Research and Review, Vol. 8, Issue 1, pp 49-57, 2014.
  6. 6.
    M. Vijay, V. VigneshKumar, “Image Steganography Method Using Integer wavelet Transform”, in proceedings of International Journal of Innovative Research in Science, Engineering and Technology, Vol. 3, Issue 3, pp 1207-1211, 2014.
  7. 7.
    Eiji Kawaguchi, Richard O. Eason, “Principle and Applications of BPCS- Steganography”, in proceedings of Society of Photographic Instrumentation Engineers (SPIE), Vol. 3528, pp 464-473, 1998.
  8. 8.
    Silvia Torres-Maya, Marika Nakano-Miyatake, Hector Perez-Meana SEPI, “An Image Steganography Systems Based on BPCS and IWT”, in proceedings of 16th IEEE International Conference on Electronics, Communications and Computers, 2006.
  9. 9.
    Peipei Shi, Zhaohui Li, “An improved BPCS Steganography based on Dynamic Threshold”, in proceedings of International Conference on Multimedia Information Networking and Security, pp 388-391, 2010.
  10. 10.
    Smita P. Bansod, Vanita M. Mane, Leena R. Ragha, “Modified BPCS Steganography using Hybrid Cryptography for Improving Data embedding Capacity”, in proceedings of International Conference on Communication, Information & Computing Technology (ICCICT), 2012.
  11. 11.
    Vipul J. Patel, Ms. NehaRipalSoni, “Uncompressed Image Steganography using BPCS: Survey and Analysis”, in proceedings of IOSR Journal of Computer Engineering, Vol. 15, Issue 4, pp 57-64, 2013.
  12. 12.
    Barnali Gupta, Prof. Samir K. Bandyopadhyay, “A DWT Method for Image Steganography”, in proceedings of International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 3, Issue 6, pp 983-989, 2013.
  13. 13.
    Amitava Nag, SushantaBiswas, DebasreeSarkar, ParthaPratimSarkar, “A Novel Technique for Image Steganography Based on DWT and Huffman Encoding”, in proceedings of International Journal of Computer Science and Security, Vol. 4, Issue 6, pp 561-570.
  14. 14.
    Shrikant S. Khaire, Dr. Sanjay L. Nalbalwar, “Review: Steganography- Bit Plane Complexity Segmentation(BPCS) Technique”, in proceedings of International Journal of Engineering Science and Technology, Vol. 2(9), pp 4860-4868, 2010.
  15. 15.
    Sarita, KamleshLahwani, ShilpaChoudhary, “An Improved BPCS Image Steganography in Integer Wavelet Transform Domain using 4x4 Block Size”, in proceedings of International Journal of Engineering Research & Technology (IJERT), Vol. 1, Issue 8, pp 1-8, 2012.
  16. 16.
    Vaishali, AbhishekKajal, “Increasing Data Hiding Capacity of Carrier Image Using BPCS Steganography”, in proceedings of International Journal of Science and Research(IJSR), Vol. 4, Issue 5, pp 434-437, 2015.
  17. 17.
    Siddharth Singh, Tanveer J. Siddiqui, “A Security enhanced Robust Steganography Algorithm for Data Hiding”, in proceedings of International Journal of Computer Science Issues,Vol. 9, Issue 3, No. 1, pp 131-139, 2012.
SCOPUS
SCImago Journal & Country Rank