SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
Swati Patil et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 3( Version 6), March 2014, pp.46-50
www.ijera.com 46 | P a g e
Modified Approach for Hiding Secret Data and Improving
Data Embedding Capacity
Swati Patil, Komal More
Department of Computer Engineering Dr. D.Y Patil College of Engineering, Ambi, Pune, India.
Department of Computer Engineering Dr. D.Y Patil College of Engineering, Ambi, Pune, India
Abstract
Security of the secret information has been a challenge when the large amount of data is exchanged on the
internet. A secure transfer of information can be very much achieved by steganography and Cryptography.
Steganography is a tool for hiding information inside an image. Cryptography is a tool which provides
encryption techniques for secure communication. In the traditional steganograhy techniques principle was either
to replace a special part of the frequency components of the carrier image, or to replace all the least significant
bits of a multi-valued image with the secret information. Our new steganography uses an image as the carrier
data, and we embed secret information in the bit-planes of the carrier. This technique makes use of the
characteristics of the human vision system whereby a human cannot perceive any shape information in a very
complicated binary pattern. We can replace all of the ―noise-like‖ regions in the bit-planes of the carrier
image with secret data without deteriorating the image quality.
Keywords- Bit Plane, BPCS, Hybrid Cryptography, LSB, Modified BPCS, Steganography.
I. Introduction
Information security is a major issue of concern
while exchanging a data in an open network, as
internet is not only a single network it is worldwide
collection of loosely network. Anyone can hack the
information and then make misuse from that or
corrupt it or we can say that anyone can destroy the
information if it is not fully secured or protected.
Steganography and Cryptography both plays a very
important role in information security.
Steganography is information security tool
which stores the secret information in any media file
in such way that no one else except the sender of the
information and the intended receiver can only
suspect the existence of any sort of information.
Cryptography is also an information security tool
which provides encryption techniques to hide the
secret information.
A good information hiding technique shall
include the following requirements:
1) Imperceptibility: the difference between the stego
medium and the original one must be very slight such
that the illegal party cannot detect the embedded
information.
2) Security: the illegal party cannot extract out the
hidden information even if he has detected that there
are some information concealed in the stego medium.
3) Capacity: the total number of secret message
which can be embedded in the medium.
4) Robustness: the stego medium shall be able to
resist general image processing.
The merits of BPCS-Steganography found by the
experiments are as follows.
1) The information hiding capacity of a true color
image is around 50%.
2) A sharpening operation on the dummy image
increases the embedding capacity quite a bit.
3) Customization of a BPCS - Steganography
program for each user is easy.
4) It is most secured technique and provides high
security.
5) Randomization of the secret data by a
compression operation makes the embedded data
more intangible.
1.1 Problem Statement
Focus in this paper is towards information or data
security when communication takes place.
1) Prevent form hacking.
2) To provide the better data security.
3) Improve data embedding capacity and maintain
quality.
In this paper we are putting forward different
algorithms for explaining encoding and decoding.
The structure of this paper is as follows:
Section I consist of introduction with problem
statement of the paper Section II presents the related
work Section III includes the Existing system Section
IV consist of the proposed system Section V
represent the example with experimental analysis and
Section VI consist of conclusion.
RESEARCH ARTICLE OPEN ACCESS
Swati Patil et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 3( Version 6), March 2014, pp.46-50
www.ijera.com 47 | P a g e
II. Related Work
Abbreviations
DES Data Encryption Standard.
RSA Rivest Shamir Adleman
LSB Least Significant Bit
BPCS Bit Plane Complexity Segmentation
2.1 Objectives
Focus in this paper is towards information
and data security during internet communication.
1) To provide the better data security.
2) Prevent form hacking.
3) Improve data embedding capacity and maintain
quality
2.2 LSB
Simple method in which the least significant
bits of the bytes in an image is replaced by bits of
secret message.
A large amount of data can be embedded by
LSB without observable changes. Very effective,
easy to implement, takes very less space but it has
low imperceptibility.
2.3 BPCS
In this segmentation of image are used by
measuring its complexity. It replaces the noisy
blocks of bit plan with the binary patterns mapped
from a secret data. Noisy blocks are determined with
help of complexity. It has Very large embedding
capacity.
2.4 Modified BPCS
It uses an image as the vessel data, and we
embed secret information in the bit-planes of the
vessel. This technique makes use of the
characteristics of the human vision system whereby a
human cannot perceive any shape information in a
very complicated binary pattern. We can replace all
of the “noise-like” regions in the bit-planes of the
vessel image with secret data without deteriorating
the image quality. Input data will be vessel image
and data to embed in byte format. Load the vessel
image into memory. Get width and height of the
memory image. Generate a threshold value.
III. Existing System
Information send through any network have
a chance to attack by hackers. After data embedding,
the quality of image may be affected.
Encryption provides an obvious approach to
information security, and encryption programs are
readily available. However, encryption clearly marks
a message as containing “secret” information, and
the encrypted message becomes subject to attack.
Furthermore, in many cases it is desirable to send
information without anyone even noticing that
information has been sent secret information.
IV. Proposed System
In steganography, data is hidden inside a
vessel or container that looks like it contains only
something else. A variety of vessels are possible,
such as digital images, sound clips, and even
executable files.
All of the traditional steganographic techniques have
limited information-hiding capacity. They can hide
only 10% (or less) of the data amounts of the vessel.
This Technique uses an image as the vessel data, and
we embed secret information in the bit-planes of the
vessel. We can replace all of the “noise-like” regions
in the bit-planes of the vessel image with secret data
without deteriorating the image quality.
Fig. Flow of proposed system
4.1 Encoding
The encoding process follows the steps
listed below:
Step 1: Calculate the size of the secret data and
cover-image.
Step 2: Determine the total bytes from the RGB
pixels needed in cover-image to encode the secret
data.
bits per pixel=bits per byte x 3 (1)
Swati Patil et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 3( Version 6), March 2014, pp.46-50
www.ijera.com 48 | P a g e
number of pixel of cover=(cover lengh*8)/bit per
pixel (2)
number of pixel of data=(cover lengh*8)/bit per pixel
(3)
Step 3: The system reads the bytes of the secret data.
Convert the amount of bits of the secret data in
(3) from integer into binary string.
Step 4: Segment the pixel into three blocks which are
red, green and blue.
Step 5: Get the total LSB or LSBs needed for
encoding.
Step 6: Calculate the arrays from the first seven
pixels (from the 0th pixel to the 6thpixel) of the
bitmap cover-image to store the secret data details as
depicted in Table 3. The number of k pixels will be
used to store the file name of the secret data.
k=n-7 (4)
Denote:
k: Capacity of the file name used in term of pixels.
n: The kth pixel after the 6th pixel. The remaining
pixels of the cover-image will be used to store the
contents of the secret data.
Step 7: Calculate the number of LSB or LSBs in the
colour pixels of the cover-image that are being used
to encode data
x=8-m (5)
Total encoded LSBs=(s1- x1)+(s2- x2)+(s3- x3) (6)
Fig. Encoding process
The following computation obtains the total
encoded LSBs and the value of a new pixel with
encoded data:
Total encoded LSBs=(s1- x1)+(s2- x2)+(s3-
x3)
New pixel value with encoded data=original byte +
total encoded LSBs.
4.2 Decoding
After encoding secret data into the cover-
image, the secret data has to be decoded for retrieval.
The following are steps for decoding:
Step 1: Calculate the size of the stego-image.
Step 2: The system reads the bytes of the stego-
image.
Convert the amount of bits of the stego-image
from integer to binary string.
Step 3: Determine encoding method for the number
of LSBs to be used
Step 4: Calculate and identify the number of pixels
Stego image
Yes
No
Swati Patil et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 3( Version 6), March 2014, pp.46-50
www.ijera.com 49 | P a g e
in the stego-image and also the embedded secret data
respectively using 1, 2 and 3.
Step 5: Use the last three byte values 216, 224 and
232 to obtain the offset of the string. Each of the
values mentioned will deduct the LSB used in order
to discard unused bits for secret data embedding.
first offset=16-encoded LSB (7)
second offset=24-encoded LSB (8)
third offset=32-encoded LSB (9)
Step 6: Extract and combine the remaining LSB at
each pixel in the BMP-24 file in order to retrieve
back the original secret data.
decoded string= (7)+(8)+(9)
(10)
From 10, the decoded string is the secret data
retrieved.
Figure 8 shows the decoding process of the proposed
scheme when a receiver decodes a stego-image.
Fig. decoding process
V. Experimental Results
Consider following figure [a] is an original
Lena Image and considered embed text file capacity
is 90077bytes. Figure [b] is a stego-image with alpha
value 0.03 and bit plane sets as 3. Figure [c] is a
cover image with alpha as 0.03 and gamma as 0.5
after encryption and data compression as per
proposed method.
Hence observed results of the proposed
method produce more data embedded capacity and
also preserved the visibility of the image.
Figure Original image
Figure Modified BPCS stego image
Figure Proposed method stego image
The experiment prefers peak-signal to-noise
ratio (PSNR) as objective criteria of visual
imperceptibility. The definition of PSNR as follow:
PSNR = 10 * log10 ( Imax / MSE) db= 20 * log10 ( I
max / √MSE) db
No
Yes
Secret data
Swati Patil et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 3( Version 6), March 2014, pp.46-50
www.ijera.com 50 | P a g e
Where, Imax is equal to 255 for grayscale
images, and the mean squared error MSE is defined
[13] to be: MSE = (1/MN) * Σ(i=1) M Σ(j=1)
N(‫׀‬CI(i,j) – SI(i,j)‫׀‬ )
Where, M and N represent the number of
horizontal and vertical pixels respectively of the
cover(C) and stego(S) image. The greater the PSNR
is, the better the fidelity is, and the similar the two
images are shown above.
Following table shows the details about the
stego image
Ima
ge
Cap
acity
PSNR for
modified BPCS
PSNR for
modified BPCS
R G B R G B
Len
a
992
98
33.4 33 33.2 43.2 34.8 34.9
Table Experimental result of proposed method
VI. Conclusion
The proposed scheme contributes a multi-
layered embedding feature that enable senders to
encode secret data into several cover-images
sequentially to create a stealth camouflage to avoid
intruder's unwanted attention.
It provides two levels of security, hybrid
cryptography and steganography. If at all the intruder
suspects it is quite impossible for him to steal the
data because embedding byte positions are decided
based on modified BPCS approach. After the cipher
text is embedded, the degradation in image quality is
not apparent to normal human eye. Threshold is
customaries; hence sender can decide data hiding
capacity as well as quality of the image. This
approach can be extendable to send secret images in
carrier image. This steganography is a strong
information security technique, especially when
combined with hybrid encrypted embedded data
should be convinced.
References
[1] Yeshwanth srinivasan “high capacity data
hiding system using Bpcs steganography”
[2] Abhishek Patidar Gajendra Jagnade Laxmi
Madhuri Pranay Mehta Ronak Seth,” Data
Security Using Cryptosteganography in
Web Application” 2012
[3] Eiji Kawaguchi and Richard O. Eason,
“Principle and Applications of BPCS-
Steganography”, Kyushu Institute of
Technology, Kitakyushu, Japan–University
of Maine, Orono, Maine
[4] Lip Yee Por, Delina Beh, Tan Fong Ang,
and Sim Ying Ong” An Enhanced
Mechanism for Image Steganography Using
Sequential Colour Cycle Algorithm”
Malaysian Institute of Information
Technology, Universiti Kuala Lumpur,
Malaysia 2010
[5] Sheetal Mehta, Kaveri Dighe, Meera Jagtap,
Anju Ekre,” Web Based BPCS
Steganography”
[6] Tao Zhang Zhaohui Li Peipei Shi,”
Statistical Analysis Against improved BPCS
Steganography” Nankai University, College
of Information Technical Science Tianjin,
China 2010
[7] Sandeep Singh, Aman Singh,”A Review on
the Various Recent Steganography
Techniques”Department of Computer
Science Engineering, Lovely Professional
University Phagwara, Punjab, India 2013
[8] Smita Bansod, Vanita Mane, Leena Ragha
”Modified BPCS steganography using
Hybrid Cryptography for Improving Data
embedding Capacity” Information
Technology SAKEC, RAIT, Mumbai 2012

Weitere ähnliche Inhalte

Was ist angesagt?

Image Encryption-Then-Compression System via Prediction Error Clustering and ...
Image Encryption-Then-Compression System via Prediction Error Clustering and ...Image Encryption-Then-Compression System via Prediction Error Clustering and ...
Image Encryption-Then-Compression System via Prediction Error Clustering and ...AM Publications,India
 
An Architectural Approach of Data Hiding In Images Using Mobile Communication
An Architectural Approach of Data Hiding In Images Using Mobile CommunicationAn Architectural Approach of Data Hiding In Images Using Mobile Communication
An Architectural Approach of Data Hiding In Images Using Mobile Communicationiosrjce
 
Image encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithmImage encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithmIAEME Publication
 
Improved LSB Steganograhy Technique for grayscale and RGB images
Improved LSB Steganograhy Technique for grayscale and RGB imagesImproved LSB Steganograhy Technique for grayscale and RGB images
Improved LSB Steganograhy Technique for grayscale and RGB imagesIJERA Editor
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceinventy
 
Security System for Data Using Steganography and Cryptography (SSDSC)
Security System for Data Using Steganography and Cryptography (SSDSC) Security System for Data Using Steganography and Cryptography (SSDSC)
Security System for Data Using Steganography and Cryptography (SSDSC) csandit
 
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...IJCSEA Journal
 
5. article azojete vol 11 50 61 mala
5. article azojete vol 11 50 61 mala5. article azojete vol 11 50 61 mala
5. article azojete vol 11 50 61 malaOyeniyi Samuel
 
DCT Based Secret Image Hiding In Video Sequence
DCT Based Secret Image Hiding In Video SequenceDCT Based Secret Image Hiding In Video Sequence
DCT Based Secret Image Hiding In Video SequenceIJERA Editor
 
Text in Image Hiding using Developed LSB and Random Method
Text in Image Hiding using Developed LSB and  Random Method Text in Image Hiding using Developed LSB and  Random Method
Text in Image Hiding using Developed LSB and Random Method IJECEIAES
 
Highly secure scalable compression of encrypted images
Highly secure scalable compression of encrypted imagesHighly secure scalable compression of encrypted images
Highly secure scalable compression of encrypted imageseSAT Journals
 
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED STEGANOGRAPHY AND CR...
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED  STEGANOGRAPHY AND CR...Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED  STEGANOGRAPHY AND CR...
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED STEGANOGRAPHY AND CR...Budi Prasetiyo
 
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITION
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITIONDUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITION
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITIONIJNSA Journal
 
File Encryption and Hiding Application Based on AES and Append Insertion Steg...
File Encryption and Hiding Application Based on AES and Append Insertion Steg...File Encryption and Hiding Application Based on AES and Append Insertion Steg...
File Encryption and Hiding Application Based on AES and Append Insertion Steg...TELKOMNIKA JOURNAL
 

Was ist angesagt? (17)

Image Encryption-Then-Compression System via Prediction Error Clustering and ...
Image Encryption-Then-Compression System via Prediction Error Clustering and ...Image Encryption-Then-Compression System via Prediction Error Clustering and ...
Image Encryption-Then-Compression System via Prediction Error Clustering and ...
 
DATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE FOR SECURE CLOUD STORAGE
DATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE  FOR SECURE CLOUD STORAGEDATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE  FOR SECURE CLOUD STORAGE
DATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE FOR SECURE CLOUD STORAGE
 
An Architectural Approach of Data Hiding In Images Using Mobile Communication
An Architectural Approach of Data Hiding In Images Using Mobile CommunicationAn Architectural Approach of Data Hiding In Images Using Mobile Communication
An Architectural Approach of Data Hiding In Images Using Mobile Communication
 
Image encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithmImage encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithm
 
Improved LSB Steganograhy Technique for grayscale and RGB images
Improved LSB Steganograhy Technique for grayscale and RGB imagesImproved LSB Steganograhy Technique for grayscale and RGB images
Improved LSB Steganograhy Technique for grayscale and RGB images
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
Security System for Data Using Steganography and Cryptography (SSDSC)
Security System for Data Using Steganography and Cryptography (SSDSC) Security System for Data Using Steganography and Cryptography (SSDSC)
Security System for Data Using Steganography and Cryptography (SSDSC)
 
Ijariie1132
Ijariie1132Ijariie1132
Ijariie1132
 
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...
 
5. article azojete vol 11 50 61 mala
5. article azojete vol 11 50 61 mala5. article azojete vol 11 50 61 mala
5. article azojete vol 11 50 61 mala
 
Stegonoraphy
StegonoraphyStegonoraphy
Stegonoraphy
 
DCT Based Secret Image Hiding In Video Sequence
DCT Based Secret Image Hiding In Video SequenceDCT Based Secret Image Hiding In Video Sequence
DCT Based Secret Image Hiding In Video Sequence
 
Text in Image Hiding using Developed LSB and Random Method
Text in Image Hiding using Developed LSB and  Random Method Text in Image Hiding using Developed LSB and  Random Method
Text in Image Hiding using Developed LSB and Random Method
 
Highly secure scalable compression of encrypted images
Highly secure scalable compression of encrypted imagesHighly secure scalable compression of encrypted images
Highly secure scalable compression of encrypted images
 
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED STEGANOGRAPHY AND CR...
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED  STEGANOGRAPHY AND CR...Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED  STEGANOGRAPHY AND CR...
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED STEGANOGRAPHY AND CR...
 
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITION
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITIONDUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITION
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITION
 
File Encryption and Hiding Application Based on AES and Append Insertion Steg...
File Encryption and Hiding Application Based on AES and Append Insertion Steg...File Encryption and Hiding Application Based on AES and Append Insertion Steg...
File Encryption and Hiding Application Based on AES and Append Insertion Steg...
 

Andere mochten auch (20)

Dv25732742
Dv25732742Dv25732742
Dv25732742
 
Jn2416531655
Jn2416531655Jn2416531655
Jn2416531655
 
Jb2516071610
Jb2516071610Jb2516071610
Jb2516071610
 
Dl25667670
Dl25667670Dl25667670
Dl25667670
 
Mq2521722176
Mq2521722176Mq2521722176
Mq2521722176
 
Cr24608612
Cr24608612Cr24608612
Cr24608612
 
Ky2519111913
Ky2519111913Ky2519111913
Ky2519111913
 
Ff35913917
Ff35913917Ff35913917
Ff35913917
 
Ok2423462359
Ok2423462359Ok2423462359
Ok2423462359
 
Kl2417741781
Kl2417741781Kl2417741781
Kl2417741781
 
Be26377381
Be26377381Be26377381
Be26377381
 
J26048056
J26048056J26048056
J26048056
 
Kh3418561861
Kh3418561861Kh3418561861
Kh3418561861
 
Nc342352340
Nc342352340Nc342352340
Nc342352340
 
J25043046
J25043046J25043046
J25043046
 
Gh2511431153
Gh2511431153Gh2511431153
Gh2511431153
 
Hu2615271543
Hu2615271543Hu2615271543
Hu2615271543
 
Mq2420912096
Mq2420912096Mq2420912096
Mq2420912096
 
Cf24544550
Cf24544550Cf24544550
Cf24544550
 
Lt2419681970
Lt2419681970Lt2419681970
Lt2419681970
 

Ähnlich wie H43064650

11.data security using cryptosteganography in web application
11.data security using cryptosteganography in web application11.data security using cryptosteganography in web application
11.data security using cryptosteganography in web applicationAlexander Decker
 
SECURITY SYSTEM FOR DATA USING STEGANOGRAPHY AND CRYPTOGRAPHY (SSDSC)
SECURITY SYSTEM FOR DATA USING STEGANOGRAPHY AND CRYPTOGRAPHY (SSDSC) SECURITY SYSTEM FOR DATA USING STEGANOGRAPHY AND CRYPTOGRAPHY (SSDSC)
SECURITY SYSTEM FOR DATA USING STEGANOGRAPHY AND CRYPTOGRAPHY (SSDSC) cscpconf
 
MESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHYMESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHYIRJET Journal
 
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUESELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUEijcisjournal
 
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUEACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUEIRJET Journal
 
Review paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and SteganographyReview paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and Steganographyvivatechijri
 
IRJET- Application of Machine Learning for Data Security
IRJET-  	  Application of Machine Learning for Data SecurityIRJET-  	  Application of Machine Learning for Data Security
IRJET- Application of Machine Learning for Data SecurityIRJET Journal
 
Protection of Secret Textual Data Using Steganography Based System
Protection of Secret Textual Data Using Steganography Based SystemProtection of Secret Textual Data Using Steganography Based System
Protection of Secret Textual Data Using Steganography Based SystemIRJET Journal
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
 
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...IRJET Journal
 
11.secure data transmission by using steganography
11.secure data transmission by using steganography11.secure data transmission by using steganography
11.secure data transmission by using steganographyAlexander Decker
 
Secure data transmission by using steganography
Secure data transmission by using steganographySecure data transmission by using steganography
Secure data transmission by using steganographyAlexander Decker
 
IRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography TechniqueIRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography TechniqueIRJET Journal
 
IRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography TechniqueIRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography TechniqueIRJET Journal
 
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...IOSR Journals
 
Survey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular FormSurvey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular Formijsrd.com
 

Ähnlich wie H43064650 (20)

11.data security using cryptosteganography in web application
11.data security using cryptosteganography in web application11.data security using cryptosteganography in web application
11.data security using cryptosteganography in web application
 
SECURITY SYSTEM FOR DATA USING STEGANOGRAPHY AND CRYPTOGRAPHY (SSDSC)
SECURITY SYSTEM FOR DATA USING STEGANOGRAPHY AND CRYPTOGRAPHY (SSDSC) SECURITY SYSTEM FOR DATA USING STEGANOGRAPHY AND CRYPTOGRAPHY (SSDSC)
SECURITY SYSTEM FOR DATA USING STEGANOGRAPHY AND CRYPTOGRAPHY (SSDSC)
 
MESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHYMESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHY
 
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUESELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
 
DATA HIDING IMAGES USING SPREAD SPECTRUM IN CLOUD COMPUTING
DATA HIDING IMAGES USING SPREAD SPECTRUM IN CLOUD COMPUTINGDATA HIDING IMAGES USING SPREAD SPECTRUM IN CLOUD COMPUTING
DATA HIDING IMAGES USING SPREAD SPECTRUM IN CLOUD COMPUTING
 
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUEACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE
 
Review paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and SteganographyReview paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and Steganography
 
P017329498
P017329498P017329498
P017329498
 
IRJET- Application of Machine Learning for Data Security
IRJET-  	  Application of Machine Learning for Data SecurityIRJET-  	  Application of Machine Learning for Data Security
IRJET- Application of Machine Learning for Data Security
 
Protection of Secret Textual Data Using Steganography Based System
Protection of Secret Textual Data Using Steganography Based SystemProtection of Secret Textual Data Using Steganography Based System
Protection of Secret Textual Data Using Steganography Based System
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
 
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
 
11.secure data transmission by using steganography
11.secure data transmission by using steganography11.secure data transmission by using steganography
11.secure data transmission by using steganography
 
Secure data transmission by using steganography
Secure data transmission by using steganographySecure data transmission by using steganography
Secure data transmission by using steganography
 
IRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography TechniqueIRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography Technique
 
IRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography TechniqueIRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography Technique
 
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
 
C010511420
C010511420C010511420
C010511420
 
Survey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular FormSurvey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular Form
 
It3116411644
It3116411644It3116411644
It3116411644
 

Kürzlich hochgeladen

Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 

Kürzlich hochgeladen (20)

Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 

H43064650

  • 1. Swati Patil et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 3( Version 6), March 2014, pp.46-50 www.ijera.com 46 | P a g e Modified Approach for Hiding Secret Data and Improving Data Embedding Capacity Swati Patil, Komal More Department of Computer Engineering Dr. D.Y Patil College of Engineering, Ambi, Pune, India. Department of Computer Engineering Dr. D.Y Patil College of Engineering, Ambi, Pune, India Abstract Security of the secret information has been a challenge when the large amount of data is exchanged on the internet. A secure transfer of information can be very much achieved by steganography and Cryptography. Steganography is a tool for hiding information inside an image. Cryptography is a tool which provides encryption techniques for secure communication. In the traditional steganograhy techniques principle was either to replace a special part of the frequency components of the carrier image, or to replace all the least significant bits of a multi-valued image with the secret information. Our new steganography uses an image as the carrier data, and we embed secret information in the bit-planes of the carrier. This technique makes use of the characteristics of the human vision system whereby a human cannot perceive any shape information in a very complicated binary pattern. We can replace all of the ―noise-like‖ regions in the bit-planes of the carrier image with secret data without deteriorating the image quality. Keywords- Bit Plane, BPCS, Hybrid Cryptography, LSB, Modified BPCS, Steganography. I. Introduction Information security is a major issue of concern while exchanging a data in an open network, as internet is not only a single network it is worldwide collection of loosely network. Anyone can hack the information and then make misuse from that or corrupt it or we can say that anyone can destroy the information if it is not fully secured or protected. Steganography and Cryptography both plays a very important role in information security. Steganography is information security tool which stores the secret information in any media file in such way that no one else except the sender of the information and the intended receiver can only suspect the existence of any sort of information. Cryptography is also an information security tool which provides encryption techniques to hide the secret information. A good information hiding technique shall include the following requirements: 1) Imperceptibility: the difference between the stego medium and the original one must be very slight such that the illegal party cannot detect the embedded information. 2) Security: the illegal party cannot extract out the hidden information even if he has detected that there are some information concealed in the stego medium. 3) Capacity: the total number of secret message which can be embedded in the medium. 4) Robustness: the stego medium shall be able to resist general image processing. The merits of BPCS-Steganography found by the experiments are as follows. 1) The information hiding capacity of a true color image is around 50%. 2) A sharpening operation on the dummy image increases the embedding capacity quite a bit. 3) Customization of a BPCS - Steganography program for each user is easy. 4) It is most secured technique and provides high security. 5) Randomization of the secret data by a compression operation makes the embedded data more intangible. 1.1 Problem Statement Focus in this paper is towards information or data security when communication takes place. 1) Prevent form hacking. 2) To provide the better data security. 3) Improve data embedding capacity and maintain quality. In this paper we are putting forward different algorithms for explaining encoding and decoding. The structure of this paper is as follows: Section I consist of introduction with problem statement of the paper Section II presents the related work Section III includes the Existing system Section IV consist of the proposed system Section V represent the example with experimental analysis and Section VI consist of conclusion. RESEARCH ARTICLE OPEN ACCESS
  • 2. Swati Patil et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 3( Version 6), March 2014, pp.46-50 www.ijera.com 47 | P a g e II. Related Work Abbreviations DES Data Encryption Standard. RSA Rivest Shamir Adleman LSB Least Significant Bit BPCS Bit Plane Complexity Segmentation 2.1 Objectives Focus in this paper is towards information and data security during internet communication. 1) To provide the better data security. 2) Prevent form hacking. 3) Improve data embedding capacity and maintain quality 2.2 LSB Simple method in which the least significant bits of the bytes in an image is replaced by bits of secret message. A large amount of data can be embedded by LSB without observable changes. Very effective, easy to implement, takes very less space but it has low imperceptibility. 2.3 BPCS In this segmentation of image are used by measuring its complexity. It replaces the noisy blocks of bit plan with the binary patterns mapped from a secret data. Noisy blocks are determined with help of complexity. It has Very large embedding capacity. 2.4 Modified BPCS It uses an image as the vessel data, and we embed secret information in the bit-planes of the vessel. This technique makes use of the characteristics of the human vision system whereby a human cannot perceive any shape information in a very complicated binary pattern. We can replace all of the “noise-like” regions in the bit-planes of the vessel image with secret data without deteriorating the image quality. Input data will be vessel image and data to embed in byte format. Load the vessel image into memory. Get width and height of the memory image. Generate a threshold value. III. Existing System Information send through any network have a chance to attack by hackers. After data embedding, the quality of image may be affected. Encryption provides an obvious approach to information security, and encryption programs are readily available. However, encryption clearly marks a message as containing “secret” information, and the encrypted message becomes subject to attack. Furthermore, in many cases it is desirable to send information without anyone even noticing that information has been sent secret information. IV. Proposed System In steganography, data is hidden inside a vessel or container that looks like it contains only something else. A variety of vessels are possible, such as digital images, sound clips, and even executable files. All of the traditional steganographic techniques have limited information-hiding capacity. They can hide only 10% (or less) of the data amounts of the vessel. This Technique uses an image as the vessel data, and we embed secret information in the bit-planes of the vessel. We can replace all of the “noise-like” regions in the bit-planes of the vessel image with secret data without deteriorating the image quality. Fig. Flow of proposed system 4.1 Encoding The encoding process follows the steps listed below: Step 1: Calculate the size of the secret data and cover-image. Step 2: Determine the total bytes from the RGB pixels needed in cover-image to encode the secret data. bits per pixel=bits per byte x 3 (1)
  • 3. Swati Patil et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 3( Version 6), March 2014, pp.46-50 www.ijera.com 48 | P a g e number of pixel of cover=(cover lengh*8)/bit per pixel (2) number of pixel of data=(cover lengh*8)/bit per pixel (3) Step 3: The system reads the bytes of the secret data. Convert the amount of bits of the secret data in (3) from integer into binary string. Step 4: Segment the pixel into three blocks which are red, green and blue. Step 5: Get the total LSB or LSBs needed for encoding. Step 6: Calculate the arrays from the first seven pixels (from the 0th pixel to the 6thpixel) of the bitmap cover-image to store the secret data details as depicted in Table 3. The number of k pixels will be used to store the file name of the secret data. k=n-7 (4) Denote: k: Capacity of the file name used in term of pixels. n: The kth pixel after the 6th pixel. The remaining pixels of the cover-image will be used to store the contents of the secret data. Step 7: Calculate the number of LSB or LSBs in the colour pixels of the cover-image that are being used to encode data x=8-m (5) Total encoded LSBs=(s1- x1)+(s2- x2)+(s3- x3) (6) Fig. Encoding process The following computation obtains the total encoded LSBs and the value of a new pixel with encoded data: Total encoded LSBs=(s1- x1)+(s2- x2)+(s3- x3) New pixel value with encoded data=original byte + total encoded LSBs. 4.2 Decoding After encoding secret data into the cover- image, the secret data has to be decoded for retrieval. The following are steps for decoding: Step 1: Calculate the size of the stego-image. Step 2: The system reads the bytes of the stego- image. Convert the amount of bits of the stego-image from integer to binary string. Step 3: Determine encoding method for the number of LSBs to be used Step 4: Calculate and identify the number of pixels Stego image Yes No
  • 4. Swati Patil et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 3( Version 6), March 2014, pp.46-50 www.ijera.com 49 | P a g e in the stego-image and also the embedded secret data respectively using 1, 2 and 3. Step 5: Use the last three byte values 216, 224 and 232 to obtain the offset of the string. Each of the values mentioned will deduct the LSB used in order to discard unused bits for secret data embedding. first offset=16-encoded LSB (7) second offset=24-encoded LSB (8) third offset=32-encoded LSB (9) Step 6: Extract and combine the remaining LSB at each pixel in the BMP-24 file in order to retrieve back the original secret data. decoded string= (7)+(8)+(9) (10) From 10, the decoded string is the secret data retrieved. Figure 8 shows the decoding process of the proposed scheme when a receiver decodes a stego-image. Fig. decoding process V. Experimental Results Consider following figure [a] is an original Lena Image and considered embed text file capacity is 90077bytes. Figure [b] is a stego-image with alpha value 0.03 and bit plane sets as 3. Figure [c] is a cover image with alpha as 0.03 and gamma as 0.5 after encryption and data compression as per proposed method. Hence observed results of the proposed method produce more data embedded capacity and also preserved the visibility of the image. Figure Original image Figure Modified BPCS stego image Figure Proposed method stego image The experiment prefers peak-signal to-noise ratio (PSNR) as objective criteria of visual imperceptibility. The definition of PSNR as follow: PSNR = 10 * log10 ( Imax / MSE) db= 20 * log10 ( I max / √MSE) db No Yes Secret data
  • 5. Swati Patil et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 3( Version 6), March 2014, pp.46-50 www.ijera.com 50 | P a g e Where, Imax is equal to 255 for grayscale images, and the mean squared error MSE is defined [13] to be: MSE = (1/MN) * Σ(i=1) M Σ(j=1) N(‫׀‬CI(i,j) – SI(i,j)‫׀‬ ) Where, M and N represent the number of horizontal and vertical pixels respectively of the cover(C) and stego(S) image. The greater the PSNR is, the better the fidelity is, and the similar the two images are shown above. Following table shows the details about the stego image Ima ge Cap acity PSNR for modified BPCS PSNR for modified BPCS R G B R G B Len a 992 98 33.4 33 33.2 43.2 34.8 34.9 Table Experimental result of proposed method VI. Conclusion The proposed scheme contributes a multi- layered embedding feature that enable senders to encode secret data into several cover-images sequentially to create a stealth camouflage to avoid intruder's unwanted attention. It provides two levels of security, hybrid cryptography and steganography. If at all the intruder suspects it is quite impossible for him to steal the data because embedding byte positions are decided based on modified BPCS approach. After the cipher text is embedded, the degradation in image quality is not apparent to normal human eye. Threshold is customaries; hence sender can decide data hiding capacity as well as quality of the image. This approach can be extendable to send secret images in carrier image. This steganography is a strong information security technique, especially when combined with hybrid encrypted embedded data should be convinced. References [1] Yeshwanth srinivasan “high capacity data hiding system using Bpcs steganography” [2] Abhishek Patidar Gajendra Jagnade Laxmi Madhuri Pranay Mehta Ronak Seth,” Data Security Using Cryptosteganography in Web Application” 2012 [3] Eiji Kawaguchi and Richard O. Eason, “Principle and Applications of BPCS- Steganography”, Kyushu Institute of Technology, Kitakyushu, Japan–University of Maine, Orono, Maine [4] Lip Yee Por, Delina Beh, Tan Fong Ang, and Sim Ying Ong” An Enhanced Mechanism for Image Steganography Using Sequential Colour Cycle Algorithm” Malaysian Institute of Information Technology, Universiti Kuala Lumpur, Malaysia 2010 [5] Sheetal Mehta, Kaveri Dighe, Meera Jagtap, Anju Ekre,” Web Based BPCS Steganography” [6] Tao Zhang Zhaohui Li Peipei Shi,” Statistical Analysis Against improved BPCS Steganography” Nankai University, College of Information Technical Science Tianjin, China 2010 [7] Sandeep Singh, Aman Singh,”A Review on the Various Recent Steganography Techniques”Department of Computer Science Engineering, Lovely Professional University Phagwara, Punjab, India 2013 [8] Smita Bansod, Vanita Mane, Leena Ragha ”Modified BPCS steganography using Hybrid Cryptography for Improving Data embedding Capacity” Information Technology SAKEC, RAIT, Mumbai 2012