Enhancing the Security of Data Using Digital Stemage Technique
1
Vijay K, 2K. S. Jayareka, 3G. Kirubasri, 4Priya Vijay, 5Arockia Raj Y
1Assistant Professor, Department of Computer Science and Engineering Rajalakshmi Engineering College, Chennai
2,3 Assistant Professor, Department of Computer Science and Engineering Sona College of Technology, Salem.
4Associate Professor, Department of Computer Science and Engineering Rajalakshmi Engineering College, Chennai
5Assistant Proferssor, Department of Computer Science and Engineering PSNA College of Engineering and Technology, Dindigul
[email protected], [email protected], [email protected], [email protected], [email protected]
Abstract: Steganography: the science of hidden communication is one among the branches of data transfer activity. It permits secret knowledge transmission as well as hides the existence of message itself therefore on defend the transmitted data from unplanned recipient. In past decade, tons of analysis has been done on numerous Steganography schemes in spacial and rework domain. the concept to cover secret knowledge in contour let domain [security]. so as to possess secure communication within the presence of steganalyzer, we've got adopted the quilt choice criteria supported distinction measuring.
victimization distinction measuring, appropriate cowl is chosen from commonplace take a look at image information then embedding is distributed in contour let sub bands of canopy image. Embedding knowledge in appropriate cowl image can increase performance of the system and ends up in additional features in that. The potency of utilized methodology is illustrated victimization in quality metrics of the image.
Keywords: Steganography, Security, Noise, Steganography Techniques, Stego Image.
I. INTRODUCTION
Data that is changed by means of PC systems is generally spread out looking like data. It will be maintain in various arrangements. It will be a text, picture, sound, video, designs and so on. These data square measure keep in various gadgets like PCs, mobiles, moving-picture show players and so on for instance, photographic camera stores the picture information as picture bits. For putting away and recovering information, there's a craving for programming bundle and gadgets. Computerized data or programming bundle that a PC uses will be just followed that is one in the entirety of its fundamental quality additionally as its shortcoming.
The plan to cover mystery data in form let space [security]. Commonly, clients on the net got the chance to send, share or get direction . Steganography, shrouds the presence of message such persona non grata can't figure that correspondence goes on thus gives the following degree of security. The section proceed with connected work, is represented in section II followed by the projected system in section III , implementation in IV, application in V and conclusion in VI.
II. RELATEDWORK
ZaidoonKh. et al. [1], have given a general summary of sorts, general Steganography Systemand characterization of systems and categorization techniques. Rejani R et al. [2] gift a new/alternate secure info system supported steganography for information concealing. The system provides integrity a lot of confidentiality and authentication throughout access or redaction of intimated information. The planned sound unit system uses steganography technique to store a info of records. The system permits a user to form basic tables and records, that square measure hidden from others within a picture. during this paper, we have a tendency to propose Associate in Nursing design, which might be utilized by application developers to retrieve information from the created info in a straightforward manner. The planned methodology is very helpful to be used as Associate in Nursing embedded sound unit additionally in mobile computing because it will store bit of information simply. have given an overall outline of Steganography sorts, general Steganography Systemand portrayal of Steganography frameworks and arrangement of Steganography procedures. Rejani R et al. [2]
blessing another/other secure data framework upheld steganography for data disguising. The framework gives trustworthiness a ton of secrecy and confirmation all through access or redaction of suggested data. The arranged sound unit framework utilizes steganography strategy to store a data of records. The framework allows a client to shape fundamental tables and records, that square measure escaped others inside an image. during this paper, we tend to propose Associate in Nursing structure, which may be used by application engineers to recover data from the made information in a clear way. This individual Stego-key has five very surprising dark level varys of picture, range demonstrates to substitute secured scope of pieces to embed in less imperative pieces of picture. The quality of arranged system is its honesty of mystery shrouded information in Stego-picture and bigger concealed ability. The impediment is to cover further pieces of mark with shrouded message for its uprightness reason. It moreover arranged a path for shading picture basically to switch the blue channel with this topic for information covering. This system is focused to accomplish high concealed capacity and security of shrouded message. The LSB steganography procedure was created in it upheld installing the key message into the gouger edge districts of the picture to affirm its obstruction against picture steganalysis [6] upheld applied science investigation. In our arranged framework dodge the shading changes in it. [7] talks about some varying sorts of data covering methods. Bertrand Anckaert et al. [8] distinguishes the essential shortcomings of existing methodologies, resulting from the static idea of protection and furthermore the inconceivability to stop the duplication of advanced data. a spic and span subject is given that allows an a great deal of dynamic nature of safeguard and makes it more solid to shape an extra, similarly supportive duplicate. likewise, it allows a fine-grained the executives over the circulated code. Its quality depends on assorted variety each put in duplicate is elite and updates square measure custom-made to figure for one put in duplicate exclusively.
III. PROPOSED SYSTEM
In our proposed system, we use Steganography (for data hiding in the multimedia object) techniques together.
A. Steganography
Steganography is the study of means of concealing the information in order to prevent hackers from detecting the presence of the secret information. In this project, we use a JPG or
method).This method modifying the rightmost bit in each byte by replacing it with a bit from the secret message. LSB method is more significant than MSB method .In LSB method we are not seen the any difference between original image and stego image (data hidden image).
B. Algorithm of Proposed System Input: Embed the message.
Output: Message is embedded safely in an image and reconstructed properly
Begin 1. Message.
2. Encrypting message[with the key].
3. Implementing LSB Method steganography 4. Embedding data
5. Stego image/video.
6. Extraction of embedded message.
7. Encrypted message generation.
8. Decryption[with the key].
9. Original Message.
End
C. Proposed System Flow Chart
Figure 1.1 Flow Diagram
The message is sent to the encryption process which is encrypted using a 4 bit key and thereafter the embedding process takes place where the image is now converted into the Stego image. Similarly for Decryption process the image to be decrypted is taken and the same 4 bit key is given and the extraction process takes place. The result is that the original message is obtained.
D. Image Module
In Image steganography the cycle performed is concealing the content inside the picture with the utilization of encryption calculation . The content is splitted utilizing the LSB technique and is implanted into the picture that we have choosen. Same way the picture is unscrambled by utilizing the decoding calculation and the message is produced by the client. The client can likewise send the encoded picture to any IP Address.
E. Video Module
In Video steganography the process performed is hiding the text inside the video with the use of encryption algorithm. The video that is used for this experiment is flash video in the flv format. The video is now embedded with the text using the parity code encryption and LSB method. The decryption is done by giving the secret key and generating the result that is the message. The video can be sent to different IPs and also across various applications.
IV. EXPERIMENTS AND RESULTS USER INTERFACE
I IMAGE
Figure 1.2 Image User Interface II.VIDEO
Figure 1.3 Video User Interface
V APPLICATIONS
Various applications of this includes communication of secret data , protection of copyright, feature tagging, digital marketing etc.
VI CONCLUSION
Steganography particularly joined with cryptography, is an integral asset which empowers individuals to convey without potential busybodies in any event, knowing there is a type of correspondence in the first place.The extreme point of concealing the instant message inside a picture and video is accomplished. In spite of the fact that the procedures are as yet not utilized regularly, the conceivable outcomes are huge. A wide range of strategies exist and
advance quickly.Steganography when joined with encryption gives a made sure about methods for mystery correspondence between two gatherings. This proposed structure can be utilized to secure typical PC applications just as versatile applications against piracy.In the future work a similar procedure can be utilized for sound steganography.
VII REFERENCES
[1] Zaidan .et.al, “Overview: Main Fundamentals for Steganography”, Journal of Computing, pp.158-165 vol.2, March 2010.
[2] Nadeem Akhtar .et.al, “Enhancing the Security and Quality of LSB Based Image Steganography”, Proceedings of IEEE International Conference on Computational Intelligence and Communication Networks, pp.385-390 September 2013.
[3] R. Rejani .et.al, “STEGANODB-A Secure Database using Steganography”, ICTACT Journal on Communication Technology, Vol. 4, No. 3, pp. 785-789, 2013.
[4] MamtaJuneja .et.al“An improved LSB based Steganography with Enhanced Security and Embedding/ Extraction”, Proceedings of IEEE International Conference on Intelligent Computational Systems, , pp. 29-34 January 2013.
[5] H. Motameni .et.al, “Labeling Method in Steganography”, World Academy of Science, Engineering and Technology, France, (2007).
[6] Minati Mishra .et.al, “Digital Image Data Hiding Techniques: A Comparative Study”, ANSVESA, Vol. 7, No. 2, pp. 105-115, 2012.
[7] S. KanagaSubaRaja, S. Usha Kiruthika, (2015) „An Energy Efficient Method for Secure and Reliable Data Transmission in Wireless Body Area Networks Using RelAODV‟, International Journal of Wireless Personal Communications, ISSN 0929-6212, Volume 83, N0. 4, pp. 2975-2997. https://doi.org/10.1007/s11277-015-2577-x.
[8] Bertrand Anckaert, Bjorn De Sutter and Koen De Bosschere Ghent University, Electronics and Information Systems DepartmentSint-Pietersnieuwstraat 41 9000 Gent, [9] Vijay, K., Vijayakumar, R., Sivaranjani, P., Logeshwari, R. “Scratch Detection in Cars
Using Mask Region Convolution Neural Networks”, Advances in Parallel Computing, 2020, 37, pp. 575–581, doi:10.3233/APC200205,
[10] Jayashree, K, Sheila Anand & Chithambaramani, R 2013, “A Fault Ontology for Managing Run-Time faults in Web Services”, Asian journal of information Technology, vol. 12, no. 2, pp. 60-69
[11] Varnikhaa.P, Dr.V.D.Ambeth Kumar, “Automated Foot-Print Based Human Identification System Using Neural Network for Image Labelling”, International Journal of Advanced Science and Technology Vol. 29, No. 5, pp. 3950 - 3958 ,(2020).
[12] Naga Malleswari T.Y.J., Senthil Kumar T., Jothi Kumar C. Resumption of virtual machines after adaptive deduplication of virtual machine images in live migration, International Journal of Electrical and Computer Engineering (IJECE) Vol. 11, No. 1, October 2020, pp. 654~663 ISSN: 2088-8708, DOI: 10.11591/ijece.v11i1.pp.654-663 [13]Babu Rajendiran, Jayashree Kanniappan, “A Generic Model for Identifying QoS
Parameters Interrelations in Cloud Services Selection Ontology during Runtime”, Symmetry 2021, 13, 563. https://doi.org/10.3390/sym13040563.
[14]Usha M.,Kavitha P,Anomaly based intrusion detection for 802.11 networks with optimal features using SVM classifier,Wireless Networks, Vol – 23 (8) PP: 2431-2466, DoI:
10.1007/s11276-016-1300-5, 2017
[15]Kirubasri, G., Maheswari, N. U., & Venkatesh, R. (2018). Novel energy efficient predictive link quality based reliable routing for wireless multimedia bio-sensor networks in bio-medical invention research and bionic utilities monitoring application. International Journal of Biomedical Engineering and Technology, 26(3-4), 219-236.
[16]Rajeswari C., Sathiyabhama B.,Devendiran S., Manivannan K. Bearing fault diagnosis using wavelet packet transform, hybrid PSO and support vector machine,Procedia Engineering, ,Vol.97 (1) PP:1772-1783,2014