SlideShare a Scribd company logo
1 of 6
Download to read offline
K.Ravindra Reddy et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 2( Version 5), February 2014, pp.45-50

RESEARCH ARTICLE

www.ijera.com

OPEN ACCESS

Secured Data Transmission Using Wavelet Based Steganography
and cryptography
K.Ravindra Reddy1 Ms Shaik Taj Mahaboob2 K.Siva Chandra3
T.S.Mahammed basha 4
1,3,4:Academic assistant,ECE Department,JNTUACEP,Kadapa,AP,INDIA,516390
2.Assistant professor,ECE Department,JNTUACEP,Kadapa,AP,INDIA,516390

ABSTRACT:
Steganography and cryptographic methods are used together with wavelets to increase the security of the data
while transmitting through networks. Another technology, the digital watermarking is the process of embedding
information into a digital (image) signal. Before embedding the plain text into the image, the plain text is
encrypted by using Data Encryption Standard (DES) algorithm. The encrypted text is embedded into the LL sub
band of the wavelet decomposed image using Least Significant Bit (LSB) method. Then the inverse wavelet
transform is applied and the resultant image is transmitted to the receiver. The receiver will perform the same
operations in reverse order
Indexing terms/Keywords: Cryptography, digital watermarking, steganography, wavelet.

I.

INTRODUCTION:

In the present world of communication, one of
the necessary requirements to prevent data thefts
securing the information. Security has become a
critical feature for thriving networks and in military
alike. Cryptography and Steganography are well
known and widely used techniques that manipulate
information (messages) in order to cipher or hide
their existence. These techniques have many
applications in computer science and other related
fields: they are used to protect military messages, Emails, credit card information, corporate data,
personal files, etc.
Cryptography (from Greek crypto‟s, "hidden", and
gráphein, "to write") is, traditionally, the study of
means of converting information from its normal,
comprehensible form into an incomprehensible
format, rendering it unreadable without secret
knowledge, the art of encryption. The art of
protecting information (plain text) by transforming it
(encrypting it) into an unreadable format is called
cipher text. Only those who possess a secret key can
decipher (or decrypt) the message into plain text.
Encrypted messages can sometimes be broken by
Cryptanalysis, also called code breaking, although
modern cryptography techniques are virtually
unbreakable.
Cryptography encrypts the actual message that is
being sent. This security mechanism uses
mathematical schemes and algorithms to scramble
data into unreadable text. It can only be decoded or
decrypted by the party that possesses the the message
by embedding it inside a carrier file of some type. An
eavesdropper can intercept a cryptographic message,
www.ijera.com

but he may not even know that a stenographic
message
exists.
Cryptography
and
Steganographyachieve the same goal via different
means. Encryption encodes the data so that an
unintended recipient cannot determine its intended

meaning.Steganography,in contrast attempts
to prevent an unintended recipient from
suspecting that the data is there.
[3].Combining encryption with steganography
allows for a better private communication. The goal
of steganography is to avoid drawing suspicion to the
transmission of the secret message. On the other
hand, steganalysis is a way of detecting possible
secret communication using against steganography.
That is, steganalysis attempts to defeat steganography
techniques. It relies on the fact that hiding
information in digital media alters the carriers and
introduces unusual signatures or some form of
degradation that could be exploited. Thus, it is crucial
that a steganography system to ascertain that the
hidden messages are not detectable [4]–[6].
Steganography includes the hiding of media
like text, image, audio, video files, etc. in other media
of the same type or of different type. Later, the
message hidden in the selected media is transmitted
to the recipient. At the receiver end, the reverse
process is implemented to recover the original
message [7]. Many ideas and techniques have been
proposed to secure data i.e., mainly concealing of text
in images. The simplestmethod to do the same is
Least Significant Bit replacement method in
steganography. But it has its own limitations [8].
45 | P a g e
K.Ravindra Reddy et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 2( Version 5), February 2014, pp.45-50

www.ijera.com

Steganalysis can be easily done on LSBreplacement
technique [9]. This new proposed method overcomes
this draw back

II.

Proposed Enhancement:

In this paper, a new method is used to send
the data in a more secured manner. The given text
which is to be transmitted is encrypted with one of
the symmetric key techniques: DES with the given
key. In this process by using the key, the given text is
encrypted. Then this resultant text is decrypted with
the same key. (Here, the key is of length 56-bit.)
Then, that cipher text is embedded into the LL
subband of the wavelet transformed image. The
method to embed the data is the Least Significant
Method. This method is described in Algorithm-1.
Note that, as we are modifying the LSB (±1 or no
change to the given pixel value) our human eye
cannot find the difference between the original image
and the watermarked image. Once the cipher text is
embedded into the LL sub band, inverse wavelet
transform is applied. Then this resultant image is sent
to the receiver

III.

Implementation:

DES (the Data Encryption Standard) is a
symmetric block cipher developed by IBM. The
algorithm uses a 56-bit key to encipher/decipher a
64-bit block of data. The key is always presented as a
64-bit block, every 8th bit of which is ignored.
However, it is usual to set each 8th bit so that each
group of 8 bits has an odd number of bits set to 1.
The algorithm is best suited to implementation in
hardware, probably to discourage implementations in
software, which tend to be slow by comparison.
However, modern computers are so fast that
satisfactory software implementations are readily
available
DES is the most widely used symmetric algorithms in
the world, despite claims that the key length is too
short. Ever since DES was first announced,
controversy has raged about whether 56 bits is long
enough to guarantee security. The key length
argument goes like this. Assuming that the only
feasible attack on DES is to try each key in turn until
the right one is found, then 1,000,000 machines each
capable of testing 1,000,000 keys per second would
find (on average) one key every 12 hours. Most
reasonable people might find this rather comforting
and a good measure of the strength of the algorithm.
The general working of a DES algorithm will

perform for 16 rounds are shown in Fig. 1.
the working of single round is shown in Fig.
2.

www.ijera.com

Fig: 1. General Description of DES
Encryption Algorithm

46 | P a g e
K.Ravindra Reddy et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 2( Version 5), February 2014, pp.45-50

www.ijera.com

Example: Let M be the plain text message M =
0123456789ABCDEF, where M is in hexadecimal
(base 16) format.
Rewriting M in binary format, we get the 64-bit
block of text:
M = 0000 0001 0010 0011 0100 0101 0110 0111
1000 1001 1010 1011 1100 1101 1110 1111
L = 0000 0001 0010 0011 0100 0101 0110 0111
R = 1000 1001 1010 1011 1100 1101 1110 1111
The first bit of M is "0". The last bit is "1". We read
from left to right.
DES operates on the 64-bit blocks using key sizes of
56- bits. The keys are actually stored as being 64 bits
long, but every 8th bit in the key is not used (i.e. Bits
numbered 8, 16, 24, 32, 40, 48, 56, and 64).
However, we will nevertheless number the bits from
1 to 64, going left to right, in the following
calculations. But, as you will see, the eight bits just
mentioned get eliminated when we create sub keys
This is the encrypted form of M =
0123456789ABCDEF:
namely,
C
=
85E813540F0AB405.
Decryption is simply the inverse of encryption,
following the same steps as above, but reversing the
order in which the sub keys are applied

V.

Fig: 2. Single rounds in DES
IV.

Conversion from Plain text to Cipher
text:

DES is a block cipher--meaning it operates
on plaintext blocks of a given size (64-bits) and
returns cipher text blocks of the same size. Thus DES
results in a permutation among the 2^64 (read this as:
"2 to the 64th power") possible arrangements of 64
bits, each of which may be either 0 or 1. Each block
of 64 bits is divided into two blocks of 32 bits each, a
left half block L and a right half R. (This division is
only used in certain operations.)

www.ijera.com

Wavelet Based Digital Watermarking
with DES Encrypted Text:

A „wavelet‟ is a kind of mathematical function used
to divide a given function or continuous-time signal
into different frequency components and study each
component with a resolution that matches its scale.
The wavelet transform is a multi-resolution
technique, which can be implemented as a pyramid or
tree structure and is similar to sub-band
decomposition[10,11].
There are various wavelet transforms like Haar,
Daubechies, Coiflet, Symlet and etc. They differ with
each other in the formation and reconstruction. The
wavelet transform divides the original image into
four sub bands and they are denoted by LL (lowlow), LH (low-high), HL (high-low) and HH (highhigh) frequency sub bands. The HH sub image
represents diagonal details (high frequencies in both
directions – the corners), HL gives horizontal high
frequencies (vertical edges), LH gives vertical high
frequencies (horizontal edges), and the image LL
corresponds to the lowest frequencies which is shown
in Fig. 3.

47 | P a g e
K.Ravindra Reddy et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 2( Version 5), February 2014, pp.45-50

www.ijera.com

form.

Fig:3(a).Original Image (b) Level-1
Transformed Image

Wavelet

At the subsequent scale of analysis, the
image LL undergoes the decomposition using the
same filters, having always the lowest frequency
component located in the upper left corner of the
image. Each stage of the analysis produces next 4 sub
images whose size is reduced twice when compared
to the previous scale. i.e. for level „n‟ we get a total
of „4+(n-1)*3‟ sub bands. The size of the wavelet
representation is the same as the size of the original
The Haar wavelet is the first known wavelet
and was proposed in 1909 by Alfred Haar. Haar

Step-3: Modify the least significant bit
accordingly.
End
At the receiver‟s end the, the receiver do the
forward wavelet transform of the received image.
Now, from the LL sub band, the text is extracted. The
extracted text which is encrypted form is decrypted
using the one key.
The encryption and decryption process using
these one key is shown in Fig:4 The entire process of
method is shown in the form a flow chart in Fig:4

Fig 4: Data encryption and decryption process in
DES

used these functions to give an example of a
countable orthonormal system for the space
of square-integrable functions on the real
line. The Haar wavelet's scaling function
coefficients are h{k}={0.5, 0.5}and wavelet
function coefficients are g{k}={0.5, -0.5}.
The Daubechies wavelets [10] are a family
of orthogonal wavelets defining a discrete
wavelet transform and characterized by a maximal
number of vanishing moments for some given
support. With each wavelet type of this class, there is
a scaling function which generates an orthogonal
multiresolution analysis.

Methodology:
In this paper, a new method is used to send
the data in a more secured manner. The given text
which is to be transmitted is encrypted with one of
the symmetric key techniques: triple DES with two
keys. Then, that cipher text is embedded into the LL
sub band of the wavelet transformed image. The
method to embed the data is Least Significant
Method. This method is described in Algorithm-1.
Note that, as we are modifying the LSB(±1 or 0 to the
given pixel value) our human eye cannot find the
difference between the original image and the
watermarked mage. Once the cipher text is embedded
into the LL sub band, inverse wavelet transform is
applied. Then this resultant image is send to the
receiver.

Algorithm-1: Least Significant Method
Begin
Step-1: Read the value of the pixel.
Step-2: Convert it to its equivalent binary
www.ijera.com

Fig 5: The Flowchart of the proposed
method
The Fig: 5. Shows about the process of
encrypting the data into the image by using wavelet
transform at the sender side and decrypting the data
at receiver side of an image by using inverse wavelet
transform
The flow chart of the proposed method is shown in
the Fig. 5.

48 | P a g e
K.Ravindra Reddy et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 2( Version 5), February 2014, pp.45-50

www.ijera.com

Results and Discussion:
By taking an example the text „Gandhiji‟ is
taken as input. For this text, the corresponding hexa
representation is „67616E6468696A69’. Key„12345678’ which is of length 8 characters are taken
to alter the message „Gandhiji‟. The result after the
encryption using Key is „D0C31E49A903337C‟.
Now this result is decrypted using Key which results
„67616E6468696A69‟. Now this data is the one
which is going to be embedded into the image. At the
other end, the given image is transformed using Haar
forward wavelet transform to get the LL, LH, HL and
HH sub bands. The data which is the result of the
above method is embedded into the LL sub band.
After that, the image is transformed back to the
original form using Haar inverse wavelet transform.
After receiving the image from the sender,
the image is once again transformed using Haar
forward wavelet to extract the hidden data and that
data is decrypted using the steps given in Fig: 6.1.
Finally, the original message is received as
„Gandhiji‟. The screen shots for this entire process
are shown in Fig: 6. (a) and 6(b)

Fig:6.(b).The results at receiver side

VI.

CONCLUSION:

The cryptography algorithm alone is not much secure
way to be used for the data transmission. So a new
method which combines cryptography and
steganography is provided which gives much

better option for data transmission. In this
project a method to combine steganography (Least
Significant Method) and cryptography (DES) is
considered, so as to provide more secured way for
data transmission through any unsecured or public
networks. To further increase the security to the data
the encrypted text is not embedded in the image
itself, instead it is embedded in the LL-sub band of
the wavelet transformed image

VII.

FUTURE EXTENSIONS:

In this paper we have used the Haar wavelet
transform. This work can be extended with other
wavelets such as Daubechies, Coiflet, and Symlet etc.
For encryption, the other methods like AES, RSA etc
also can be used. In the same way other digital
watermarking techniques can also be used for future
extensions

REFERENCES:
[1]
Fig: 6. (a).The results at sender side
[2]
[3]

www.ijera.com

William Stallings, Cryptography and
Network Security, Principles and Practice,
Third editionPearsonEducation, Singapore,
2003.
Clair, Bryan. “Steganography: How to Send a
Secret Message.” 8 Nov. 2001
Westfeld, A., and G. Wolf, Steganography in
a Video conferencing system, in proceedings
of the second international workshop on
information hiding, vol. 1525 of lecture notes

49 | P a g e
K.Ravindra Reddy et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 2( Version 5), February 2014, pp.45-50

[4]

[5]

[6]

[7]

[8]

[9]

[10]

[11]

[12]

[13]

[14]

[15]

[16]

www.ijera.com

in computer science, Springer, 1998. Pp. 3247.
C. C. Lin, and W. H. Tsai, "Secret Image
Sharing
with
Steganography
and
Authentication," Journal of Systems and
Software, 73 (3): 405-414, December 2004
KafaRabah. Steganography - The Art of
Hiding Data. Information Technology Journal
3 (3) - 2004.
T. Morkel, J. H. P. Eloff, M. S. Olivier, ”An
Overview of Image
Steganography”,
Information
and
Computer
Security
Architecture (ICSA) Research Group,
Department of Computer Science, University
of Pretoria, SA.
Krenn,
R.,
“Steganography
and
Steganalysis”,
http://www.Krenn.nl/univ/cry/steg/article.pdf
R.J. Anderson and F. A. P. Petitcolas (2001)
On the limits of the Stegnography, IEEE
Journal Selected Areas in Communications,
16 (4), pp. 474-481.
S. Dumitrescu, W.X.Wu and N. Memon
(2002) On steganalysis of random LSB
embedding incontinuous-tone images, Proc.
International
Conference
on
Image
Processing, Rochester, NY, pp. 641-644.
Rafael C. Gonzalez and Richard E. Woods,
“Digital Image Processing,” 2nd Ed., Pearson
Education Pvt. Ltd, Indian Branch, 2003.
Duane Hansel man and Bruce Littlefield,
“Mastering MATLAB 7”, Pearson Education,
India.
Daubechies Ingrid, “Ten Lectures on
Wavelets,” Society for Industrial and Applied
Mathematics, 1992
J. Fridrich, M. Long, “Steganalysis of LSB
encoding in color images, “Multimedia and
Expo, vol. 3 pp. 1279-1282, July 2000..
R. Chandramouli, M. Kharrazi, N. Memon,
“Image Steganography and Steganalysis:
Concepts
and
Practice
“International
Workshop on Digital Watermarking, Seoul,
October 2004.
Hide & Seek: An Introduction to
Stenography:
http:niels.xtdnet.nl/papers/practical.pdf.
Y. Lee and L. Chen (2000) High capacity
image
steganographic
model,
IEE
Proceedings on Vision, Image and Signal
Processing, 147 (3), pp. 288-294.

www.ijera.com

50 | P a g e

More Related Content

What's hot

A RSA- DWT Based Visual Cryptographic Steganogrphy Technique by Mohit Goel
A RSA- DWT Based Visual Cryptographic Steganogrphy Technique by Mohit GoelA RSA- DWT Based Visual Cryptographic Steganogrphy Technique by Mohit Goel
A RSA- DWT Based Visual Cryptographic Steganogrphy Technique by Mohit GoelMohit Goel
 
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...IJCSEA Journal
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansionSreeda Perikamana
 
Inventive Cubic Symmetric Encryption System for Multimedia
Inventive Cubic Symmetric Encryption System for MultimediaInventive Cubic Symmetric Encryption System for Multimedia
Inventive Cubic Symmetric Encryption System for Multimediacsandit
 
SOM-PAD: Novel Data Security Algorithm on Self Organizing Map
SOM-PAD: Novel Data Security Algorithm on Self Organizing Map SOM-PAD: Novel Data Security Algorithm on Self Organizing Map
SOM-PAD: Novel Data Security Algorithm on Self Organizing Map cscpconf
 
Image encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithmImage encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithmIAEME Publication
 
Two New Approaches for Secured Image Steganography Using Cryptographic Techni...
Two New Approaches for Secured Image Steganography Using Cryptographic Techni...Two New Approaches for Secured Image Steganography Using Cryptographic Techni...
Two New Approaches for Secured Image Steganography Using Cryptographic Techni...sipij
 
Image encryption and decryption
Image encryption and decryptionImage encryption and decryption
Image encryption and decryptionAashish R
 
Security analysis of fbdk block cipher for digital images
Security analysis of fbdk block cipher for digital imagesSecurity analysis of fbdk block cipher for digital images
Security analysis of fbdk block cipher for digital imageseSAT Journals
 
Audio Cryptography System
Audio Cryptography SystemAudio Cryptography System
Audio Cryptography SystemRaju Raj
 
Text in Image Hiding using Developed LSB and Random Method
Text in Image Hiding using Developed LSB and  Random Method Text in Image Hiding using Developed LSB and  Random Method
Text in Image Hiding using Developed LSB and Random Method IJECEIAES
 
Two level data security using steganography and 2 d cellular automata
Two level data security using steganography and 2 d cellular automataTwo level data security using steganography and 2 d cellular automata
Two level data security using steganography and 2 d cellular automataeSAT Publishing House
 
A novel efficient multiple encryption algorithm for real time images
A novel efficient multiple encryption algorithm for real time images A novel efficient multiple encryption algorithm for real time images
A novel efficient multiple encryption algorithm for real time images IJECEIAES
 
A Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data DecryptionA Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data DecryptionIJERA Editor
 
A Novel Visual Cryptographic Steganography Technique by Mohit Goel
A Novel Visual Cryptographic Steganography Technique by Mohit GoelA Novel Visual Cryptographic Steganography Technique by Mohit Goel
A Novel Visual Cryptographic Steganography Technique by Mohit GoelMohit Goel
 

What's hot (18)

A RSA- DWT Based Visual Cryptographic Steganogrphy Technique by Mohit Goel
A RSA- DWT Based Visual Cryptographic Steganogrphy Technique by Mohit GoelA RSA- DWT Based Visual Cryptographic Steganogrphy Technique by Mohit Goel
A RSA- DWT Based Visual Cryptographic Steganogrphy Technique by Mohit Goel
 
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansion
 
Inventive Cubic Symmetric Encryption System for Multimedia
Inventive Cubic Symmetric Encryption System for MultimediaInventive Cubic Symmetric Encryption System for Multimedia
Inventive Cubic Symmetric Encryption System for Multimedia
 
H43064650
H43064650H43064650
H43064650
 
SOM-PAD: Novel Data Security Algorithm on Self Organizing Map
SOM-PAD: Novel Data Security Algorithm on Self Organizing Map SOM-PAD: Novel Data Security Algorithm on Self Organizing Map
SOM-PAD: Novel Data Security Algorithm on Self Organizing Map
 
Image encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithmImage encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithm
 
Two New Approaches for Secured Image Steganography Using Cryptographic Techni...
Two New Approaches for Secured Image Steganography Using Cryptographic Techni...Two New Approaches for Secured Image Steganography Using Cryptographic Techni...
Two New Approaches for Secured Image Steganography Using Cryptographic Techni...
 
Image encryption and decryption
Image encryption and decryptionImage encryption and decryption
Image encryption and decryption
 
Cv4201644655
Cv4201644655Cv4201644655
Cv4201644655
 
Security analysis of fbdk block cipher for digital images
Security analysis of fbdk block cipher for digital imagesSecurity analysis of fbdk block cipher for digital images
Security analysis of fbdk block cipher for digital images
 
Audio Cryptography System
Audio Cryptography SystemAudio Cryptography System
Audio Cryptography System
 
Az24339344
Az24339344Az24339344
Az24339344
 
Text in Image Hiding using Developed LSB and Random Method
Text in Image Hiding using Developed LSB and  Random Method Text in Image Hiding using Developed LSB and  Random Method
Text in Image Hiding using Developed LSB and Random Method
 
Two level data security using steganography and 2 d cellular automata
Two level data security using steganography and 2 d cellular automataTwo level data security using steganography and 2 d cellular automata
Two level data security using steganography and 2 d cellular automata
 
A novel efficient multiple encryption algorithm for real time images
A novel efficient multiple encryption algorithm for real time images A novel efficient multiple encryption algorithm for real time images
A novel efficient multiple encryption algorithm for real time images
 
A Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data DecryptionA Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data Decryption
 
A Novel Visual Cryptographic Steganography Technique by Mohit Goel
A Novel Visual Cryptographic Steganography Technique by Mohit GoelA Novel Visual Cryptographic Steganography Technique by Mohit Goel
A Novel Visual Cryptographic Steganography Technique by Mohit Goel
 

Viewers also liked

50 Essential Content Marketing Hacks (Content Marketing World)
50 Essential Content Marketing Hacks (Content Marketing World)50 Essential Content Marketing Hacks (Content Marketing World)
50 Essential Content Marketing Hacks (Content Marketing World)Heinz Marketing Inc
 
20 Ideas for your Website Homepage Content
20 Ideas for your Website Homepage Content20 Ideas for your Website Homepage Content
20 Ideas for your Website Homepage ContentBarry Feldman
 
10 Insightful Quotes On Designing A Better Customer Experience
10 Insightful Quotes On Designing A Better Customer Experience10 Insightful Quotes On Designing A Better Customer Experience
10 Insightful Quotes On Designing A Better Customer ExperienceYuan Wang
 
Learn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionLearn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionIn a Rocket
 
How to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanHow to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanPost Planner
 
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika AldabaLightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldabaux singapore
 
SEO: Getting Personal
SEO: Getting PersonalSEO: Getting Personal
SEO: Getting PersonalKirsty Hulse
 

Viewers also liked (9)

Catch the moment !
Catch the moment !Catch the moment !
Catch the moment !
 
50 Essential Content Marketing Hacks (Content Marketing World)
50 Essential Content Marketing Hacks (Content Marketing World)50 Essential Content Marketing Hacks (Content Marketing World)
50 Essential Content Marketing Hacks (Content Marketing World)
 
20 Ideas for your Website Homepage Content
20 Ideas for your Website Homepage Content20 Ideas for your Website Homepage Content
20 Ideas for your Website Homepage Content
 
10 Insightful Quotes On Designing A Better Customer Experience
10 Insightful Quotes On Designing A Better Customer Experience10 Insightful Quotes On Designing A Better Customer Experience
10 Insightful Quotes On Designing A Better Customer Experience
 
Learn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionLearn BEM: CSS Naming Convention
Learn BEM: CSS Naming Convention
 
How to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanHow to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media Plan
 
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika AldabaLightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
 
SEO: Getting Personal
SEO: Getting PersonalSEO: Getting Personal
SEO: Getting Personal
 
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job? Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
 

Similar to H42054550

PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...ijistjournal
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesIRJET Journal
 
A Study On Cryptographic Techniques
A Study On Cryptographic TechniquesA Study On Cryptographic Techniques
A Study On Cryptographic TechniquesStacy Taylor
 
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...IJCSEA Journal
 
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...editor1knowledgecuddle
 
Improving Network Security by Modifying RSA Algorithm
Improving Network Security by Modifying RSA AlgorithmImproving Network Security by Modifying RSA Algorithm
Improving Network Security by Modifying RSA Algorithmpaperpublications3
 
B03302007012
B03302007012B03302007012
B03302007012theijes
 
Cecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in imageCecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in imageijctet
 
A New Approach of Cryptographic Technique Using Simple ECC & ECF
A New Approach of Cryptographic Technique Using Simple ECC & ECFA New Approach of Cryptographic Technique Using Simple ECC & ECF
A New Approach of Cryptographic Technique Using Simple ECC & ECFIJAEMSJORNAL
 
A Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography TechniqueA Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography TechniqueJeff Brooks
 
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...IJCSIS Research Publications
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
 
5. article azojete vol 11 50 61 mala
5. article azojete vol 11 50 61 mala5. article azojete vol 11 50 61 mala
5. article azojete vol 11 50 61 malaOyeniyi Samuel
 
IRJET- Comparative Analysis of Encryption Techniques
IRJET-  	  Comparative Analysis of Encryption TechniquesIRJET-  	  Comparative Analysis of Encryption Techniques
IRJET- Comparative Analysis of Encryption TechniquesIRJET Journal
 
Inventive cubic symmetric encryption
Inventive cubic symmetric encryptionInventive cubic symmetric encryption
Inventive cubic symmetric encryptioncsandit
 

Similar to H42054550 (20)

82 86
82 8682 86
82 86
 
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic Techniques
 
A Study On Cryptographic Techniques
A Study On Cryptographic TechniquesA Study On Cryptographic Techniques
A Study On Cryptographic Techniques
 
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...
 
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
 
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
 
Proposing an Encryption Algorithm based on DES
Proposing an Encryption Algorithm based on DESProposing an Encryption Algorithm based on DES
Proposing an Encryption Algorithm based on DES
 
Improving Network Security by Modifying RSA Algorithm
Improving Network Security by Modifying RSA AlgorithmImproving Network Security by Modifying RSA Algorithm
Improving Network Security by Modifying RSA Algorithm
 
B03302007012
B03302007012B03302007012
B03302007012
 
Cecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in imageCecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in image
 
A New Approach of Cryptographic Technique Using Simple ECC & ECF
A New Approach of Cryptographic Technique Using Simple ECC & ECFA New Approach of Cryptographic Technique Using Simple ECC & ECF
A New Approach of Cryptographic Technique Using Simple ECC & ECF
 
MIMO Wireless based Cryptosystem using Electronic Key Generation Unit
MIMO Wireless based Cryptosystem using Electronic Key Generation UnitMIMO Wireless based Cryptosystem using Electronic Key Generation Unit
MIMO Wireless based Cryptosystem using Electronic Key Generation Unit
 
A Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography TechniqueA Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography Technique
 
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
 
5. article azojete vol 11 50 61 mala
5. article azojete vol 11 50 61 mala5. article azojete vol 11 50 61 mala
5. article azojete vol 11 50 61 mala
 
IRJET- Comparative Analysis of Encryption Techniques
IRJET-  	  Comparative Analysis of Encryption TechniquesIRJET-  	  Comparative Analysis of Encryption Techniques
IRJET- Comparative Analysis of Encryption Techniques
 
Inventive cubic symmetric encryption
Inventive cubic symmetric encryptionInventive cubic symmetric encryption
Inventive cubic symmetric encryption
 

Recently uploaded

Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 

Recently uploaded (20)

Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 

H42054550

  • 1. K.Ravindra Reddy et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 4, Issue 2( Version 5), February 2014, pp.45-50 RESEARCH ARTICLE www.ijera.com OPEN ACCESS Secured Data Transmission Using Wavelet Based Steganography and cryptography K.Ravindra Reddy1 Ms Shaik Taj Mahaboob2 K.Siva Chandra3 T.S.Mahammed basha 4 1,3,4:Academic assistant,ECE Department,JNTUACEP,Kadapa,AP,INDIA,516390 2.Assistant professor,ECE Department,JNTUACEP,Kadapa,AP,INDIA,516390 ABSTRACT: Steganography and cryptographic methods are used together with wavelets to increase the security of the data while transmitting through networks. Another technology, the digital watermarking is the process of embedding information into a digital (image) signal. Before embedding the plain text into the image, the plain text is encrypted by using Data Encryption Standard (DES) algorithm. The encrypted text is embedded into the LL sub band of the wavelet decomposed image using Least Significant Bit (LSB) method. Then the inverse wavelet transform is applied and the resultant image is transmitted to the receiver. The receiver will perform the same operations in reverse order Indexing terms/Keywords: Cryptography, digital watermarking, steganography, wavelet. I. INTRODUCTION: In the present world of communication, one of the necessary requirements to prevent data thefts securing the information. Security has become a critical feature for thriving networks and in military alike. Cryptography and Steganography are well known and widely used techniques that manipulate information (messages) in order to cipher or hide their existence. These techniques have many applications in computer science and other related fields: they are used to protect military messages, Emails, credit card information, corporate data, personal files, etc. Cryptography (from Greek crypto‟s, "hidden", and gráphein, "to write") is, traditionally, the study of means of converting information from its normal, comprehensible form into an incomprehensible format, rendering it unreadable without secret knowledge, the art of encryption. The art of protecting information (plain text) by transforming it (encrypting it) into an unreadable format is called cipher text. Only those who possess a secret key can decipher (or decrypt) the message into plain text. Encrypted messages can sometimes be broken by Cryptanalysis, also called code breaking, although modern cryptography techniques are virtually unbreakable. Cryptography encrypts the actual message that is being sent. This security mechanism uses mathematical schemes and algorithms to scramble data into unreadable text. It can only be decoded or decrypted by the party that possesses the the message by embedding it inside a carrier file of some type. An eavesdropper can intercept a cryptographic message, www.ijera.com but he may not even know that a stenographic message exists. Cryptography and Steganographyachieve the same goal via different means. Encryption encodes the data so that an unintended recipient cannot determine its intended meaning.Steganography,in contrast attempts to prevent an unintended recipient from suspecting that the data is there. [3].Combining encryption with steganography allows for a better private communication. The goal of steganography is to avoid drawing suspicion to the transmission of the secret message. On the other hand, steganalysis is a way of detecting possible secret communication using against steganography. That is, steganalysis attempts to defeat steganography techniques. It relies on the fact that hiding information in digital media alters the carriers and introduces unusual signatures or some form of degradation that could be exploited. Thus, it is crucial that a steganography system to ascertain that the hidden messages are not detectable [4]–[6]. Steganography includes the hiding of media like text, image, audio, video files, etc. in other media of the same type or of different type. Later, the message hidden in the selected media is transmitted to the recipient. At the receiver end, the reverse process is implemented to recover the original message [7]. Many ideas and techniques have been proposed to secure data i.e., mainly concealing of text in images. The simplestmethod to do the same is Least Significant Bit replacement method in steganography. But it has its own limitations [8]. 45 | P a g e
  • 2. K.Ravindra Reddy et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 4, Issue 2( Version 5), February 2014, pp.45-50 www.ijera.com Steganalysis can be easily done on LSBreplacement technique [9]. This new proposed method overcomes this draw back II. Proposed Enhancement: In this paper, a new method is used to send the data in a more secured manner. The given text which is to be transmitted is encrypted with one of the symmetric key techniques: DES with the given key. In this process by using the key, the given text is encrypted. Then this resultant text is decrypted with the same key. (Here, the key is of length 56-bit.) Then, that cipher text is embedded into the LL subband of the wavelet transformed image. The method to embed the data is the Least Significant Method. This method is described in Algorithm-1. Note that, as we are modifying the LSB (±1 or no change to the given pixel value) our human eye cannot find the difference between the original image and the watermarked image. Once the cipher text is embedded into the LL sub band, inverse wavelet transform is applied. Then this resultant image is sent to the receiver III. Implementation: DES (the Data Encryption Standard) is a symmetric block cipher developed by IBM. The algorithm uses a 56-bit key to encipher/decipher a 64-bit block of data. The key is always presented as a 64-bit block, every 8th bit of which is ignored. However, it is usual to set each 8th bit so that each group of 8 bits has an odd number of bits set to 1. The algorithm is best suited to implementation in hardware, probably to discourage implementations in software, which tend to be slow by comparison. However, modern computers are so fast that satisfactory software implementations are readily available DES is the most widely used symmetric algorithms in the world, despite claims that the key length is too short. Ever since DES was first announced, controversy has raged about whether 56 bits is long enough to guarantee security. The key length argument goes like this. Assuming that the only feasible attack on DES is to try each key in turn until the right one is found, then 1,000,000 machines each capable of testing 1,000,000 keys per second would find (on average) one key every 12 hours. Most reasonable people might find this rather comforting and a good measure of the strength of the algorithm. The general working of a DES algorithm will perform for 16 rounds are shown in Fig. 1. the working of single round is shown in Fig. 2. www.ijera.com Fig: 1. General Description of DES Encryption Algorithm 46 | P a g e
  • 3. K.Ravindra Reddy et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 4, Issue 2( Version 5), February 2014, pp.45-50 www.ijera.com Example: Let M be the plain text message M = 0123456789ABCDEF, where M is in hexadecimal (base 16) format. Rewriting M in binary format, we get the 64-bit block of text: M = 0000 0001 0010 0011 0100 0101 0110 0111 1000 1001 1010 1011 1100 1101 1110 1111 L = 0000 0001 0010 0011 0100 0101 0110 0111 R = 1000 1001 1010 1011 1100 1101 1110 1111 The first bit of M is "0". The last bit is "1". We read from left to right. DES operates on the 64-bit blocks using key sizes of 56- bits. The keys are actually stored as being 64 bits long, but every 8th bit in the key is not used (i.e. Bits numbered 8, 16, 24, 32, 40, 48, 56, and 64). However, we will nevertheless number the bits from 1 to 64, going left to right, in the following calculations. But, as you will see, the eight bits just mentioned get eliminated when we create sub keys This is the encrypted form of M = 0123456789ABCDEF: namely, C = 85E813540F0AB405. Decryption is simply the inverse of encryption, following the same steps as above, but reversing the order in which the sub keys are applied V. Fig: 2. Single rounds in DES IV. Conversion from Plain text to Cipher text: DES is a block cipher--meaning it operates on plaintext blocks of a given size (64-bits) and returns cipher text blocks of the same size. Thus DES results in a permutation among the 2^64 (read this as: "2 to the 64th power") possible arrangements of 64 bits, each of which may be either 0 or 1. Each block of 64 bits is divided into two blocks of 32 bits each, a left half block L and a right half R. (This division is only used in certain operations.) www.ijera.com Wavelet Based Digital Watermarking with DES Encrypted Text: A „wavelet‟ is a kind of mathematical function used to divide a given function or continuous-time signal into different frequency components and study each component with a resolution that matches its scale. The wavelet transform is a multi-resolution technique, which can be implemented as a pyramid or tree structure and is similar to sub-band decomposition[10,11]. There are various wavelet transforms like Haar, Daubechies, Coiflet, Symlet and etc. They differ with each other in the formation and reconstruction. The wavelet transform divides the original image into four sub bands and they are denoted by LL (lowlow), LH (low-high), HL (high-low) and HH (highhigh) frequency sub bands. The HH sub image represents diagonal details (high frequencies in both directions – the corners), HL gives horizontal high frequencies (vertical edges), LH gives vertical high frequencies (horizontal edges), and the image LL corresponds to the lowest frequencies which is shown in Fig. 3. 47 | P a g e
  • 4. K.Ravindra Reddy et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 4, Issue 2( Version 5), February 2014, pp.45-50 www.ijera.com form. Fig:3(a).Original Image (b) Level-1 Transformed Image Wavelet At the subsequent scale of analysis, the image LL undergoes the decomposition using the same filters, having always the lowest frequency component located in the upper left corner of the image. Each stage of the analysis produces next 4 sub images whose size is reduced twice when compared to the previous scale. i.e. for level „n‟ we get a total of „4+(n-1)*3‟ sub bands. The size of the wavelet representation is the same as the size of the original The Haar wavelet is the first known wavelet and was proposed in 1909 by Alfred Haar. Haar Step-3: Modify the least significant bit accordingly. End At the receiver‟s end the, the receiver do the forward wavelet transform of the received image. Now, from the LL sub band, the text is extracted. The extracted text which is encrypted form is decrypted using the one key. The encryption and decryption process using these one key is shown in Fig:4 The entire process of method is shown in the form a flow chart in Fig:4 Fig 4: Data encryption and decryption process in DES used these functions to give an example of a countable orthonormal system for the space of square-integrable functions on the real line. The Haar wavelet's scaling function coefficients are h{k}={0.5, 0.5}and wavelet function coefficients are g{k}={0.5, -0.5}. The Daubechies wavelets [10] are a family of orthogonal wavelets defining a discrete wavelet transform and characterized by a maximal number of vanishing moments for some given support. With each wavelet type of this class, there is a scaling function which generates an orthogonal multiresolution analysis. Methodology: In this paper, a new method is used to send the data in a more secured manner. The given text which is to be transmitted is encrypted with one of the symmetric key techniques: triple DES with two keys. Then, that cipher text is embedded into the LL sub band of the wavelet transformed image. The method to embed the data is Least Significant Method. This method is described in Algorithm-1. Note that, as we are modifying the LSB(±1 or 0 to the given pixel value) our human eye cannot find the difference between the original image and the watermarked mage. Once the cipher text is embedded into the LL sub band, inverse wavelet transform is applied. Then this resultant image is send to the receiver. Algorithm-1: Least Significant Method Begin Step-1: Read the value of the pixel. Step-2: Convert it to its equivalent binary www.ijera.com Fig 5: The Flowchart of the proposed method The Fig: 5. Shows about the process of encrypting the data into the image by using wavelet transform at the sender side and decrypting the data at receiver side of an image by using inverse wavelet transform The flow chart of the proposed method is shown in the Fig. 5. 48 | P a g e
  • 5. K.Ravindra Reddy et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 4, Issue 2( Version 5), February 2014, pp.45-50 www.ijera.com Results and Discussion: By taking an example the text „Gandhiji‟ is taken as input. For this text, the corresponding hexa representation is „67616E6468696A69’. Key„12345678’ which is of length 8 characters are taken to alter the message „Gandhiji‟. The result after the encryption using Key is „D0C31E49A903337C‟. Now this result is decrypted using Key which results „67616E6468696A69‟. Now this data is the one which is going to be embedded into the image. At the other end, the given image is transformed using Haar forward wavelet transform to get the LL, LH, HL and HH sub bands. The data which is the result of the above method is embedded into the LL sub band. After that, the image is transformed back to the original form using Haar inverse wavelet transform. After receiving the image from the sender, the image is once again transformed using Haar forward wavelet to extract the hidden data and that data is decrypted using the steps given in Fig: 6.1. Finally, the original message is received as „Gandhiji‟. The screen shots for this entire process are shown in Fig: 6. (a) and 6(b) Fig:6.(b).The results at receiver side VI. CONCLUSION: The cryptography algorithm alone is not much secure way to be used for the data transmission. So a new method which combines cryptography and steganography is provided which gives much better option for data transmission. In this project a method to combine steganography (Least Significant Method) and cryptography (DES) is considered, so as to provide more secured way for data transmission through any unsecured or public networks. To further increase the security to the data the encrypted text is not embedded in the image itself, instead it is embedded in the LL-sub band of the wavelet transformed image VII. FUTURE EXTENSIONS: In this paper we have used the Haar wavelet transform. This work can be extended with other wavelets such as Daubechies, Coiflet, and Symlet etc. For encryption, the other methods like AES, RSA etc also can be used. In the same way other digital watermarking techniques can also be used for future extensions REFERENCES: [1] Fig: 6. (a).The results at sender side [2] [3] www.ijera.com William Stallings, Cryptography and Network Security, Principles and Practice, Third editionPearsonEducation, Singapore, 2003. Clair, Bryan. “Steganography: How to Send a Secret Message.” 8 Nov. 2001 Westfeld, A., and G. Wolf, Steganography in a Video conferencing system, in proceedings of the second international workshop on information hiding, vol. 1525 of lecture notes 49 | P a g e
  • 6. K.Ravindra Reddy et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 4, Issue 2( Version 5), February 2014, pp.45-50 [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] www.ijera.com in computer science, Springer, 1998. Pp. 3247. C. C. Lin, and W. H. Tsai, "Secret Image Sharing with Steganography and Authentication," Journal of Systems and Software, 73 (3): 405-414, December 2004 KafaRabah. Steganography - The Art of Hiding Data. Information Technology Journal 3 (3) - 2004. T. Morkel, J. H. P. Eloff, M. S. Olivier, ”An Overview of Image Steganography”, Information and Computer Security Architecture (ICSA) Research Group, Department of Computer Science, University of Pretoria, SA. Krenn, R., “Steganography and Steganalysis”, http://www.Krenn.nl/univ/cry/steg/article.pdf R.J. Anderson and F. A. P. Petitcolas (2001) On the limits of the Stegnography, IEEE Journal Selected Areas in Communications, 16 (4), pp. 474-481. S. Dumitrescu, W.X.Wu and N. Memon (2002) On steganalysis of random LSB embedding incontinuous-tone images, Proc. International Conference on Image Processing, Rochester, NY, pp. 641-644. Rafael C. Gonzalez and Richard E. Woods, “Digital Image Processing,” 2nd Ed., Pearson Education Pvt. Ltd, Indian Branch, 2003. Duane Hansel man and Bruce Littlefield, “Mastering MATLAB 7”, Pearson Education, India. Daubechies Ingrid, “Ten Lectures on Wavelets,” Society for Industrial and Applied Mathematics, 1992 J. Fridrich, M. Long, “Steganalysis of LSB encoding in color images, “Multimedia and Expo, vol. 3 pp. 1279-1282, July 2000.. R. Chandramouli, M. Kharrazi, N. Memon, “Image Steganography and Steganalysis: Concepts and Practice “International Workshop on Digital Watermarking, Seoul, October 2004. Hide & Seek: An Introduction to Stenography: http:niels.xtdnet.nl/papers/practical.pdf. Y. Lee and L. Chen (2000) High capacity image steganographic model, IEE Proceedings on Vision, Image and Signal Processing, 147 (3), pp. 288-294. www.ijera.com 50 | P a g e