Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Hide Image and Text using LSB, DWT and RSA based on Image Steganography


Affiliations
1 Department of Computer Science and Engineering, Modern Institute of Technology and Research Centre, India
     

   Subscribe/Renew Journal


In this modern era, where technology is increasing at rapid pace and made all day new developments, security is of highest priority. To protect facts into the unrecognizable form diverse technique are used for records hiding like steganography and cryptography techniques have been advanced. This paper securing the image by way of encryption is completed by LSB bits, DWT and RSA algorithm. This paper additionally presents new strategies wherein cryptography and steganography are mixed to scramble the information and in addition to cover the insights in some other medium through image processing (IP). The encrypted picture can be hiding in some other image by way of the use of LSB bits, DWT strategies so that the secret’s message exists. RSA algorithm applied, receiver will use his/her private key because the secret data have been encrypted by recipient public key. Hide encrypted image in the cover image by DWT. Extract encrypted image from cover image and decrypt text by DWT. The proposed scheme is implemented in MATLAB platform the use of preferred cryptography and steganography set of regulations. Calculate PSNR and MSE. Also calculate the entropy of cover image and stego image. This method is secure for communication in the digital world with the digital data transmission.

Keywords

Image Steganography, LSB bits, RSA, PSNR.
Subscription Login to verify subscription
User
Notifications
Font Size

  • Ashadeep Kaur, Rakesh Kumar and Kamaljeet Kainth, “Review Paper on Image Steganography”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 6, No. 6, pp. 472-477, 2016.
  • Mehdi Hussain and Mureed Hussain, “A Survey of Image Steganography Techniques”, International Journal of Advanced Science and Technology, Vol. 54, pp. 1053-1059, 2013.
  • Hemang A. Prajapati and Nehal G. Chitaliya, “Secured and Robust Dual Image Steganography: A Survey”, International Journal of Innovative Research in Computer and Communication Engineering, Vol. 3, No. 1, pp. 534-542, 2015.
  • Pratap Chandra Mandal, “Modern Steganographic Technique: A Survey”, International Journal of Computer Science and Engineering Technology, Vol. 3, No. 9, pp. 894-901, 2012.
  • Dipti Kapoor Sarmah and Neha Bajpai, “Proposed System for Data Hiding using Cryptography and Steganography”, International Journal of Computer Applications, Vol. 8, No. 9, pp. 640-647, 2010.
  • Kedarnath Choudry and Aakash Wanjari, “A Survey Paper on Video Steganography”, International Journal of Computer Science and Information Technologies, Vol. 6, No. 3, pp. 786-792, 2015.
  • Himani Trivedi and Arpit Rana, “A Study Paper on Video Based Steganography”, International Journal of Advance Research, Ideas and Innovations in Technology, Vol. 3, No. 1, pp. 493-499, 2017.
  • Ammad Ul Islam et al., “An Improved Image Steganography Technique based on MSB using Bit Differencing”, Proceedings of IEEE 6th International Conference on Innovative Computing Technology, pp. 1478-1485, 2016.
  • Shaikh Shakeela, P. Arulmozhivarman, Rohit Chudiwal and Samadrita Pal, “Double Coding Mechanism for Robust Audio Data Hiding in Videos”, Proceedings of IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology, pp. 678-686, 2016.
  • G. Sateesh, E.S. Lakshmi, M. Ramanamma, K. Jairam and A. Yeswanth, “Assured Data Communication Using Cryptography and Steganography”, International Journal of Latest Technology in Engineering, Management and Applied Science, Vol. 5, No. 3, pp. 545-551, 2016.
  • Hanaa M. Ahmed and Maisaa A.A. Khodher, “Comparison of Eight Proposed Security Methods using Linguistic Steganography Text”, International Journal of Computing and Information Sciences, Vol. 12, No. 2, pp. 712-719, 2016.
  • Jigar Makwana and S.G Chudasama, “Dual Steganography: A New Hiding Technique for Digital Communication”, International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, Vol. 5, No. 4, pp. 1346-1354, 2016.
  • M.J. Thenmozhi and T. Menakadevi, “A New Secure Image Steganography Using LSB and SPIHT Based Compression Method”, Proceedings of National Conference on Information Communication, VLSI and Embedded Systems, pp. 843-850, 2016.
  • Ting-Wei Chuang, Chaur-Chin Chen and Betty Chien, “Image Sharing and Recovering based on Chinese Remainder Theorem”, Proceedings of International IEEE Symposium on Computer, Consumer and Control, pp. 487-494, 2016.
  • Shivani Chauhan and Janmejai Kumar, “Multiple Layer Text Security using Variable Block Size Cryptography and Image Steganography”, Proceedings of 3rd IEEE International Conference on Computational Intelligence and Communication Technology, pp. 1406-1412, 2017.
  • B. Padmavathi and S. Ranjitha Kumari, “A Survey on Performance Analysis of DES, AES and RSA Algorithm along with LSB Substitution Technique”, International Journal of Science and Research, Vol. 2, No. 4, pp. 1656-1662, 2013.
  • Sachin Gaur and Vinay Kumar Srivastava, “Robust Embedding of Improved Arnold Transformed Watermark in Digital Images using RDWT-SVD”, Proceedings of 4th IEEE International Conference on Parallel, Distributed and Grid Computing, pp. 799-805, 2016.

Abstract Views: 213

PDF Views: 0




  • Hide Image and Text using LSB, DWT and RSA based on Image Steganography

Abstract Views: 213  |  PDF Views: 0

Authors

Swati Bhargava
Department of Computer Science and Engineering, Modern Institute of Technology and Research Centre, India
Manish Mukhija
Department of Computer Science and Engineering, Modern Institute of Technology and Research Centre, India

Abstract


In this modern era, where technology is increasing at rapid pace and made all day new developments, security is of highest priority. To protect facts into the unrecognizable form diverse technique are used for records hiding like steganography and cryptography techniques have been advanced. This paper securing the image by way of encryption is completed by LSB bits, DWT and RSA algorithm. This paper additionally presents new strategies wherein cryptography and steganography are mixed to scramble the information and in addition to cover the insights in some other medium through image processing (IP). The encrypted picture can be hiding in some other image by way of the use of LSB bits, DWT strategies so that the secret’s message exists. RSA algorithm applied, receiver will use his/her private key because the secret data have been encrypted by recipient public key. Hide encrypted image in the cover image by DWT. Extract encrypted image from cover image and decrypt text by DWT. The proposed scheme is implemented in MATLAB platform the use of preferred cryptography and steganography set of regulations. Calculate PSNR and MSE. Also calculate the entropy of cover image and stego image. This method is secure for communication in the digital world with the digital data transmission.

Keywords


Image Steganography, LSB bits, RSA, PSNR.

References