Image Steganography for Confidential Data Communication

Author(s):  
S. Sravani ◽  
R. Raniith
Author(s):  
Chitra A. Dhawale ◽  
Naveen D. Jambhekar

Digital data transmitted over the insecure communication can be prone to attacks. Intruders try various attacks to unauthorized access of the confidential information. The Steganography is such as security system that provide the protection to the images, text and other type of data digitally transferred through the data communication network. This chapter elaborates the basics of Digital Image Steganographic techniques from ancient era to digital edge, types of images used for the steganography, payload used for the steganography, various attacks and different algorithms that can provide the information security. The performance analysis of the various Digital Image Steganographic algorithms are discussed. The current applications and their necessities are discussed in this chapter.


Author(s):  
Arathi Navaneeth ◽  
Vignesh P P ◽  
Sreehari N R ◽  
K. Pramilarani

Wireless Data communication is fastest growing technology era in which the research society has recently embarked. Today, Computer data can include financial transactions such as electronic payments, M- wallets and sensitive multimedia contents. The explosive volumes of computer devices personal data, bring-up more attention to securely data storage rather than consideration on data privacy and confidentiality levels. In this scenario Air Gap Data Communication, Machine Leaning (ML) and image processing brings an important role in the electronic data management. It is always expensive and hard to manage the data manually without adopting machine learning and image processing techniques using metadata. The contribution of this research article is to demonstrate a securing computer data storage secrecy and privacy in cloud communication framework in terms of automatic data classification using computer training datasets with help of Training dataset which classifies the data based on the confidentiality level of the record with higher accuracy and powerful timelines as compared to the traditional KNN algorithms and RSA algorithm securing such confidential data category afterwards by applying various existing cryptographic solutions to assuring data privacy, confidentiality levels and alerting the use of abusive contents and simulation results demonstrates that reducing the overall cost. Training dataset which classifies the data based on the confidentiality level of the record with higher accuracy and powerful timelines as compared to the traditional KNN algorithms and RSA algorithm securing such confidential data category.


Typically, hackers are ready to hack the confidential documents for their vested interests. The main challenge is to construct a secure relation between the secret message and image quality. To avoid dangerous illegal attacks by the third person, a scheme is proposed to have a combination of cryptography and image steganography techniques. This scheme will enable the security, secret message and image cannot be extracted. The International Data Encryption Algorithm (IDEA) cryptographic algorithms and Discrete Cosine Transform (DCT) based steganography algorithm is chosen for the functionality. Cryptography is used to encrypt and decrypt the document. Steganography to hide document inside an image with increasing payload for the secure transmission of confidential data across the internet. In this paper we present a single application to hide the information by the sender, which is so important document and confidential in the form of files, it will be invisible to unauthorized person. The results of a suggested scheme with respect to PSNR of 90.06 dB with a payload of 52,400 bytes of information in an image.


In this growing internet world, secret data communication is increasing day by day. There are various methods to communicate secretly. Steganography is one of those techniques in which data is concealed within cover data such that it cannot get detected. Steganography is usually used today on pcs where digital data is the high-speed distribution channels for carriers and networks. Steganography is the skill of understanding of unnoticeable activity at intervals. Steganalysis is the science of concealed data detection. Steganography of data which is of any form like images, audio, video or text information is done by various techniques. Image steganography is done by various technique. Least Significant Bit (LSB) with XORing and Discrete Cosine Transform (DCT) are used to test the image steganography. Images are converted to grey scale to get better accuracy. Results are tested with mean square error (MSE) and peak signal-to-noise ratio (PSNR) values.


Author(s):  
Sabyasachi Pramanik ◽  
R P Singh ◽  
Ramkrishna Ghosh

<p>Steganography is data hiding technique in internet. Here we send CAPTCHA codes within a cover image using Image steganography. CAPTCHA are the crazy codes. They are used in human response test. The word is actually an acronym for: "<strong>C</strong>ompletely <strong>A</strong>utomated <strong>P</strong>ublic <strong>T</strong>uring test to tell <strong>C</strong>omputers and <strong>H</strong>umans <strong>A</strong>part". It is a type of challenge–response test used in computing to determine whether or not the user is a human. Websites implement CAPTCHA codes into their registration processes due to spam. This is the utility of CAPTCHA codes. Here we generate CAPTCHA codes and later send them in an encrypted version. So, actually CAPTCHA codes are embedded into cover image with an encrypted form resulting stego image and thus attackers cannot fetch the actual CAPTCHA resulting in a secured transmission of confidential data using image steganography.</p>


Author(s):  
Paridhi Tutlani ◽  
Mrs. Priyanka

Today’s large demand of internet applications requires data to be transmitted in a secure manner. Data transmission in public communication system is not secure because of interception and improper manipulation by eavesdropper. So, the attractive solution for this problem is Steganography, which is the art and science of writing hidden messages in such a way that no one, apart from the sender and intend recipient, suspects the existence of the message, a form of security through obscurity. Hiding Secret Data Using Image Steganography is the scheme of hiding the existence of secret information by concealing it into another medium such as image file. In this paper we mainly discuss different types of image steganographic methods, advantages and disadvantages. We focus in this paper on Hiding Secret Data Using Image Steganography, which has emerged as a prominent source of data hiding across novel telecommunication technologies such as covered voice-over-IP, audio conferencing, etc. The multitude of steganographic criteria has led to a great diversity in these system design techniques. In this paper, we review current digital image steganographic techniques and we evaluate their performance based on robustness, security and hiding capacity indicators. The primary goal of steganography is to reliably send hidden information secretly, not merely to obscure its presence. Steganography in today’s computer era is considered a sub-discipline of data communication security domain. Lately, new directions based on steganographic approaches started to emerge to ensure data secrecy. Rather than as a substitute to existing solutions, these approaches could achieve better data secrecy if combined with conventional security techniques. Modern techniques of steganography exploit the characteristics of digital media by utilizing them as carriers (covers) to hold hidden information.


Author(s):  
Boopathi. G et al.

The increased popularity of digital media has raised serious concerns over its security related issues. Security attacks in the form of eavesdropping, masquerading and tampering and in many other forms is very common nowadays. Data hiding is one of the emerging techniques that aim to provide for security by hiding secret information into the multimedia contents by altering some nonessential components in the host or cover file. Security of data is very important in data communication. Everyday a lot of information is transferred from one user to another on internet and so the possibility of data theft also increases. Steganography provides a solution for the security of information during data transmission. Steganography is the science which makes the valuable information invisible to prevent it from unauthorized user. A steganography system, in general, is expected to meet three key requirements, namely, imperceptibility of embedding, accurate recovery of embedded information, and large payload (payload is the bits that get delivered to the end user at the destination). So in this project an image steganography technique is proposed to hide the documents in image in the transform domain using CMD approach. The document files are carried by the image without revealing the existence to anybody. When the secret information is hidden in the carrier the result is the stego signal. In this work, the results show good quality stego signal and the stego signal is analyzed for different attacks. The stego signals are transferred to multiple receivers based on network strategies. It is found that the technique is robust and it can withstand the attacks. The quality of the stego image is measured by Peak Signal to Noise Ratio (PSNR) and other measurements.


Word ’Steganography’ is originated from Greekand has been used in several forms for 2500 years which is a art of hiding confidential data in any digital manner in such a way that no one can concealed it. It has found practise in various section like in military, government, diplomatic, medical, personal and intelligence agencies. This survey paper put the light on the basic of image steganography along with its different techniques and sub-techniques. Cover selection with recent trend ROI (region Of Interest) is highlighted. In addition, different types of Image file used in image steganography and performance parameter are discuss well.


2021 ◽  
Vol 15 (3) ◽  
pp. 48-64
Author(s):  
Sabyasachi Pramanik ◽  
Debabrata Samanta ◽  
Samir Kumar Bandyopadhyay ◽  
Ramkrishna Ghosh

Internet is used for exchanging information. Sometimes it is needed to transmit confidential data via internet. Here the authors use image steganography to pass confidential data within a cover image. To construct the algorithm, they take the combinational help of particle swarm optimization (PSO), bi-orthogonal wavelet transform (BWT), and genetic algorithm (GA). They use PSO to take the enhanced version of cover image. They use BWT to choose the selective sub bands of cover image and we utilize GA to select a particular stego image among a set of stego images. Thus, an innovative technique of image steganography has been made to transmit confidential data via cover image generating stego image. This combinational approach of image steganography is quite safe for confidential data transmission and makes it hard for the attackers to retrieve the confidential data.


Sign in / Sign up

Export Citation Format

Share Document