SlideShare a Scribd company logo
Enviar búsqueda
Cargar
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secure Secret Sharing
Denunciar
Compartir
IRJET Journal
Fast Track Publications
Seguir
•
0 recomendaciones
•
10 vistas
Ingeniería
https://www.irjet.net/archives/V6/i3/IRJET-V6I31226.pdf
Leer más
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secure Secret Sharing
•
0 recomendaciones
•
10 vistas
IRJET Journal
Fast Track Publications
Seguir
Denunciar
Compartir
Ingeniería
https://www.irjet.net/archives/V6/i3/IRJET-V6I31226.pdf
Leer más
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secure Secret Sharing
1 de 3
Descargar ahora
Recomendados
Designing secured data using a combination of JPEG2000 Compression, RSA Encry... por
Designing secured data using a combination of JPEG2000 Compression, RSA Encry...
IRJET Journal
68 vistas
•
7 diapositivas
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ... por
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
IRJET Journal
15 vistas
•
7 diapositivas
IRJET- Application of Machine Learning for Data Security por
IRJET- Application of Machine Learning for Data Security
IRJET Journal
9 vistas
•
3 diapositivas
Secure Data Hiding System by using AES Algorithm and Indicator Based LSB Method por
Secure Data Hiding System by using AES Algorithm and Indicator Based LSB Method
ijtsrd
68 vistas
•
5 diapositivas
A Secure Data Communication System Using Cryptography and Steganography por
A Secure Data Communication System Using Cryptography and Steganography
IJCNCJournal
3.3K vistas
•
13 diapositivas
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm por
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
IRJET Journal
36 vistas
•
7 diapositivas
Más contenido relacionado
La actualidad más candente
Review paper on Data Security using Cryptography and Steganography por
Review paper on Data Security using Cryptography and Steganography
vivatechijri
27 vistas
•
6 diapositivas
C010511420 por
C010511420
IOSR Journals
117 vistas
•
7 diapositivas
Welcome to International Journal of Engineering Research and Development (IJERD) por
Welcome to International Journal of Engineering Research and Development (IJERD)
IJERD Editor
203 vistas
•
5 diapositivas
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ... por
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...
IRJET Journal
44 vistas
•
9 diapositivas
IRJET-Securing High Capacity Data Hiding using Combined Data Hiding Techniques por
IRJET-Securing High Capacity Data Hiding using Combined Data Hiding Techniques
IRJET Journal
20 vistas
•
6 diapositivas
K0815660 por
K0815660
IOSR Journals
518 vistas
•
5 diapositivas
La actualidad más candente
(20)
Review paper on Data Security using Cryptography and Steganography por vivatechijri
Review paper on Data Security using Cryptography and Steganography
vivatechijri
•
27 vistas
C010511420 por IOSR Journals
C010511420
IOSR Journals
•
117 vistas
Welcome to International Journal of Engineering Research and Development (IJERD) por IJERD Editor
Welcome to International Journal of Engineering Research and Development (IJERD)
IJERD Editor
•
203 vistas
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ... por IRJET Journal
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...
IRJET Journal
•
44 vistas
IRJET-Securing High Capacity Data Hiding using Combined Data Hiding Techniques por IRJET Journal
IRJET-Securing High Capacity Data Hiding using Combined Data Hiding Techniques
IRJET Journal
•
20 vistas
K0815660 por IOSR Journals
K0815660
IOSR Journals
•
518 vistas
A Study on Video Steganographic Techniques por ijceronline
A Study on Video Steganographic Techniques
ijceronline
•
584 vistas
Implementation of Steganographic Model using Inverted LSB Insertion por Dr. Amarjeet Singh
Implementation of Steganographic Model using Inverted LSB Insertion
Dr. Amarjeet Singh
•
41 vistas
Conceptual design of edge adaptive steganography scheme based on advanced lsb... por IAEME Publication
Conceptual design of edge adaptive steganography scheme based on advanced lsb...
IAEME Publication
•
229 vistas
Image Steganography With Encryption por vaishali kataria
Image Steganography With Encryption
vaishali kataria
•
312 vistas
Image Cryptography using RSA Algorithm por ijtsrd
Image Cryptography using RSA Algorithm
ijtsrd
•
135 vistas
steganography using genetic algorithm along with visual cryptography for wire... por Aparna Nk
steganography using genetic algorithm along with visual cryptography for wire...
Aparna Nk
•
3K vistas
Transmission of cryptic text using rotational visual cryptography por eSAT Journals
Transmission of cryptic text using rotational visual cryptography
eSAT Journals
•
116 vistas
Transmission of cryptic text using rotational visual por eSAT Publishing House
Transmission of cryptic text using rotational visual
eSAT Publishing House
•
293 vistas
A novel hash based least significant bit (2 3-3) image steganography in spati... por ijsptm
A novel hash based least significant bit (2 3-3) image steganography in spati...
ijsptm
•
240 vistas
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K... por IJCSIS Research Publications
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
IJCSIS Research Publications
•
25 vistas
H41034449 por IJERA Editor
H41034449
IJERA Editor
•
397 vistas
H43064650 por IJERA Editor
H43064650
IJERA Editor
•
289 vistas
PERFORMANCE ANALYSIS OF TEXT AND IMAGE STEGANOGRAPHY WITH RSA ALGORITHM IN CL... por ijseajournal
PERFORMANCE ANALYSIS OF TEXT AND IMAGE STEGANOGRAPHY WITH RSA ALGORITHM IN CL...
ijseajournal
•
22 vistas
Steganography System for Hiding Text and Images Using Improved LSB Method por IRJET Journal
Steganography System for Hiding Text and Images Using Improved LSB Method
IRJET Journal
•
38 vistas
Similar a IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secure Secret Sharing
Advanced technique for video steganography with an encryption using LSB repl... por
Advanced technique for video steganography with an encryption using LSB repl...
IRJET Journal
31 vistas
•
2 diapositivas
IRJET- Concealing of Deets using Steganography Technique por
IRJET- Concealing of Deets using Steganography Technique
IRJET Journal
11 vistas
•
4 diapositivas
IRJET- Concealing of Deets using Steganography Technique por
IRJET- Concealing of Deets using Steganography Technique
IRJET Journal
7 vistas
•
4 diapositivas
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE por
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE
IRJET Journal
0 vistas
•
4 diapositivas
IRJET- Hybrid Approach to Text & Image Steganography using AES and LSB Te... por
IRJET- Hybrid Approach to Text & Image Steganography using AES and LSB Te...
IRJET Journal
35 vistas
•
3 diapositivas
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H... por
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
IRJET Journal
25 vistas
•
4 diapositivas
Similar a IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secure Secret Sharing
(20)
Advanced technique for video steganography with an encryption using LSB repl... por IRJET Journal
Advanced technique for video steganography with an encryption using LSB repl...
IRJET Journal
•
31 vistas
IRJET- Concealing of Deets using Steganography Technique por IRJET Journal
IRJET- Concealing of Deets using Steganography Technique
IRJET Journal
•
11 vistas
IRJET- Concealing of Deets using Steganography Technique por IRJET Journal
IRJET- Concealing of Deets using Steganography Technique
IRJET Journal
•
7 vistas
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE por IRJET Journal
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE
IRJET Journal
•
0 vistas
IRJET- Hybrid Approach to Text & Image Steganography using AES and LSB Te... por IRJET Journal
IRJET- Hybrid Approach to Text & Image Steganography using AES and LSB Te...
IRJET Journal
•
35 vistas
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H... por IRJET Journal
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
IRJET Journal
•
25 vistas
It3116411644 por IJERA Editor
It3116411644
IJERA Editor
•
340 vistas
Encrypting and Decrypting Message via Image Slicing por IRJET Journal
Encrypting and Decrypting Message via Image Slicing
IRJET Journal
•
3 vistas
Enhanced Efficient & Secure Steganography Algorithm with Low Distortion por IRJET Journal
Enhanced Efficient & Secure Steganography Algorithm with Low Distortion
IRJET Journal
•
37 vistas
MESSAGE TRANSFER USING STEGANOGRAPHY por IRJET Journal
MESSAGE TRANSFER USING STEGANOGRAPHY
IRJET Journal
•
4 vistas
Protection of Secret Textual Data Using Steganography Based System por IRJET Journal
Protection of Secret Textual Data Using Steganography Based System
IRJET Journal
•
6 vistas
Ijariie1132 por IJARIIE JOURNAL
Ijariie1132
IJARIIE JOURNAL
•
186 vistas
IRJET- Machine Learning Application for Data Security por IRJET Journal
IRJET- Machine Learning Application for Data Security
IRJET Journal
•
8 vistas
Design and Implementation of Data Hiding Technique by Using MPEG Video with C... por Editor IJMTER
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...
Editor IJMTER
•
359 vistas
International Journal of Engineering Research and Development (IJERD) por IJERD Editor
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
•
298 vistas
G017444651 por IOSR Journals
G017444651
IOSR Journals
•
215 vistas
www.ijerd.com por IJERD Editor
www.ijerd.com
IJERD Editor
•
323 vistas
www.ijerd.com por IJERD Editor
www.ijerd.com
IJERD Editor
•
216 vistas
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop... por IJERD Editor
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD Editor
•
446 vistas
secure Audio Data Transfer Over Internet Using Steganography por IRJET Journal
secure Audio Data Transfer Over Internet Using Steganography
IRJET Journal
•
25 vistas
Más de IRJET Journal
SOIL STABILIZATION USING WASTE FIBER MATERIAL por
SOIL STABILIZATION USING WASTE FIBER MATERIAL
IRJET Journal
22 vistas
•
7 diapositivas
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles... por
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...
IRJET Journal
8 vistas
•
7 diapositivas
Identification, Discrimination and Classification of Cotton Crop by Using Mul... por
Identification, Discrimination and Classification of Cotton Crop by Using Mul...
IRJET Journal
8 vistas
•
5 diapositivas
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula... por
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...
IRJET Journal
13 vistas
•
11 diapositivas
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR... por
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...
IRJET Journal
14 vistas
•
6 diapositivas
Performance Analysis of Aerodynamic Design for Wind Turbine Blade por
Performance Analysis of Aerodynamic Design for Wind Turbine Blade
IRJET Journal
7 vistas
•
5 diapositivas
Más de IRJET Journal
(20)
SOIL STABILIZATION USING WASTE FIBER MATERIAL por IRJET Journal
SOIL STABILIZATION USING WASTE FIBER MATERIAL
IRJET Journal
•
22 vistas
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles... por IRJET Journal
Sol-gel auto-combustion produced gamma irradiated Ni1-xCdxFe2O4 nanoparticles...
IRJET Journal
•
8 vistas
Identification, Discrimination and Classification of Cotton Crop by Using Mul... por IRJET Journal
Identification, Discrimination and Classification of Cotton Crop by Using Mul...
IRJET Journal
•
8 vistas
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula... por IRJET Journal
“Analysis of GDP, Unemployment and Inflation rates using mathematical formula...
IRJET Journal
•
13 vistas
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR... por IRJET Journal
MAXIMUM POWER POINT TRACKING BASED PHOTO VOLTAIC SYSTEM FOR SMART GRID INTEGR...
IRJET Journal
•
14 vistas
Performance Analysis of Aerodynamic Design for Wind Turbine Blade por IRJET Journal
Performance Analysis of Aerodynamic Design for Wind Turbine Blade
IRJET Journal
•
7 vistas
Heart Failure Prediction using Different Machine Learning Techniques por IRJET Journal
Heart Failure Prediction using Different Machine Learning Techniques
IRJET Journal
•
7 vistas
Experimental Investigation of Solar Hot Case Based on Photovoltaic Panel por IRJET Journal
Experimental Investigation of Solar Hot Case Based on Photovoltaic Panel
IRJET Journal
•
3 vistas
Metro Development and Pedestrian Concerns por IRJET Journal
Metro Development and Pedestrian Concerns
IRJET Journal
•
2 vistas
Mapping the Crashworthiness Domains: Investigations Based on Scientometric An... por IRJET Journal
Mapping the Crashworthiness Domains: Investigations Based on Scientometric An...
IRJET Journal
•
3 vistas
Data Analytics and Artificial Intelligence in Healthcare Industry por IRJET Journal
Data Analytics and Artificial Intelligence in Healthcare Industry
IRJET Journal
•
3 vistas
DESIGN AND SIMULATION OF SOLAR BASED FAST CHARGING STATION FOR ELECTRIC VEHIC... por IRJET Journal
DESIGN AND SIMULATION OF SOLAR BASED FAST CHARGING STATION FOR ELECTRIC VEHIC...
IRJET Journal
•
53 vistas
Efficient Design for Multi-story Building Using Pre-Fabricated Steel Structur... por IRJET Journal
Efficient Design for Multi-story Building Using Pre-Fabricated Steel Structur...
IRJET Journal
•
11 vistas
Development of Effective Tomato Package for Post-Harvest Preservation por IRJET Journal
Development of Effective Tomato Package for Post-Harvest Preservation
IRJET Journal
•
4 vistas
“DYNAMIC ANALYSIS OF GRAVITY RETAINING WALL WITH SOIL STRUCTURE INTERACTION” por IRJET Journal
“DYNAMIC ANALYSIS OF GRAVITY RETAINING WALL WITH SOIL STRUCTURE INTERACTION”
IRJET Journal
•
5 vistas
Understanding the Nature of Consciousness with AI por IRJET Journal
Understanding the Nature of Consciousness with AI
IRJET Journal
•
12 vistas
Augmented Reality App for Location based Exploration at JNTUK Kakinada por IRJET Journal
Augmented Reality App for Location based Exploration at JNTUK Kakinada
IRJET Journal
•
6 vistas
Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba... por IRJET Journal
Smart Traffic Congestion Control System: Leveraging Machine Learning for Urba...
IRJET Journal
•
18 vistas
Enhancing Real Time Communication and Efficiency With Websocket por IRJET Journal
Enhancing Real Time Communication and Efficiency With Websocket
IRJET Journal
•
5 vistas
Textile Industrial Wastewater Treatability Studies by Soil Aquifer Treatment ... por IRJET Journal
Textile Industrial Wastewater Treatability Studies by Soil Aquifer Treatment ...
IRJET Journal
•
4 vistas
Último
Design_Discover_Develop_Campaign.pptx por
Design_Discover_Develop_Campaign.pptx
ShivanshSeth6
37 vistas
•
20 diapositivas
Update 42 models(Diode/General ) in SPICE PARK(DEC2023) por
Update 42 models(Diode/General ) in SPICE PARK(DEC2023)
Tsuyoshi Horigome
38 vistas
•
16 diapositivas
Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc... por
Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc...
csegroupvn
5 vistas
•
210 diapositivas
LDPC_CODES.ppt por
LDPC_CODES.ppt
hsomashekar987
16 vistas
•
44 diapositivas
DESIGN OF SPRINGS-UNIT4.pptx por
DESIGN OF SPRINGS-UNIT4.pptx
gopinathcreddy
19 vistas
•
47 diapositivas
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx por
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx
lwang78
109 vistas
•
19 diapositivas
Último
(20)
Design_Discover_Develop_Campaign.pptx por ShivanshSeth6
Design_Discover_Develop_Campaign.pptx
ShivanshSeth6
•
37 vistas
Update 42 models(Diode/General ) in SPICE PARK(DEC2023) por Tsuyoshi Horigome
Update 42 models(Diode/General ) in SPICE PARK(DEC2023)
Tsuyoshi Horigome
•
38 vistas
Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc... por csegroupvn
Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc...
csegroupvn
•
5 vistas
LDPC_CODES.ppt por hsomashekar987
LDPC_CODES.ppt
hsomashekar987
•
16 vistas
DESIGN OF SPRINGS-UNIT4.pptx por gopinathcreddy
DESIGN OF SPRINGS-UNIT4.pptx
gopinathcreddy
•
19 vistas
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx por lwang78
2023Dec ASU Wang NETR Group Research Focus and Facility Overview.pptx
lwang78
•
109 vistas
Design of machine elements-UNIT 3.pptx por gopinathcreddy
Design of machine elements-UNIT 3.pptx
gopinathcreddy
•
33 vistas
Pull down shoulder press final report docx (1).pdf por Comsat Universal Islamabad Wah Campus
Pull down shoulder press final report docx (1).pdf
Comsat Universal Islamabad Wah Campus
•
20 vistas
GDSC Mikroskil Members Onboarding 2023.pdf por gdscmikroskil
GDSC Mikroskil Members Onboarding 2023.pdf
gdscmikroskil
•
58 vistas
SPICE PARK DEC2023 (6,625 SPICE Models) por Tsuyoshi Horigome
SPICE PARK DEC2023 (6,625 SPICE Models)
Tsuyoshi Horigome
•
33 vistas
Codes and Conventions.pptx por IsabellaGraceAnkers
Codes and Conventions.pptx
IsabellaGraceAnkers
•
13 vistas
Searching in Data Structure por raghavbirla63
Searching in Data Structure
raghavbirla63
•
14 vistas
Ansari: Practical experiences with an LLM-based Islamic Assistant por M Waleed Kadous
Ansari: Practical experiences with an LLM-based Islamic Assistant
M Waleed Kadous
•
5 vistas
_MAKRIADI-FOTEINI_diploma thesis.pptx por fotinimakriadi
_MAKRIADI-FOTEINI_diploma thesis.pptx
fotinimakriadi
•
8 vistas
Generative AI Models & Their Applications por SN
Generative AI Models & Their Applications
SN
•
10 vistas
802.11 Computer Networks por TusharChoudhary72015
802.11 Computer Networks
TusharChoudhary72015
•
13 vistas
sam_software_eng_cv.pdf por sammyigbinovia
sam_software_eng_cv.pdf
sammyigbinovia
•
8 vistas
BCIC - Manufacturing Conclave - Technology-Driven Manufacturing for Growth por Innomantra
BCIC - Manufacturing Conclave - Technology-Driven Manufacturing for Growth
Innomantra
•
6 vistas
fakenews_DBDA_Mar23.pptx por deepmitra8
fakenews_DBDA_Mar23.pptx
deepmitra8
•
16 vistas
MSA Website Slideshow (16).pdf por msaucla
MSA Website Slideshow (16).pdf
msaucla
•
92 vistas
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secure Secret Sharing
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4826 EFFICIENT DATA HIDING WITH LZW COMPRESSION AND ECC ENCRYPTION FOR SECURE SECRET SHARING Mr.S.Dilipkumar1, P.Akilan2, D.Karthivasan3,R.Saravanan4 1 Assistant Professor & Arasu Engineering College, Kumbakonam, Tamilnadu, INDIA 2,3,4 UG scholar & Arasu Engineering college, Kumbakonam, Tamilnadu, INDIA ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Information/data hiding is a mechanism which ensures that the presence of the secret data remains undetected. Two types of data hiding techniques are most popular, they are cryptography and steganography. Where cryptography is science of writing secret code and steganography is art and science of hiding the secret code. In cryptography data is converted to unreadable form, so that unauthorized users cannot access the secret data. Steganography process hides message into cover file and forms a stego file. In image steganography there is a need of method which will increase the security, reduce the distortion in the stego file and recovers the data without any loss. In the era of multimedia and internet there is need of reducing time for transmission. The proposed approach is combination of compression, data hiding technique and encryption. To make the transmission and storage of digital data faster, Lempel-Ziv-Welch (LZW) compression technique is used. LZW is a type of lossless compression technique. In the proposed approach Elliptic curve cryptography (ECC) technique is used for data encryption and steganography uses Modified Pixel Value Differencing (MPVD) with LSB method to hide the encrypted data. If the receiver has encryption key, then only he can obtain the secret message. These proposed techniques will provide higher security and the system yields high quality image, less memory utilization, more complexity and higher embedded capacity. Key Words: steganography, compression, data hiding technique, Elliptic curve cryptography, Lempel-Ziv- Welch, Modified Pixel Value Differencing. 1.INTRODUCTION Steganography is the practice of hiding secret messages (hidden text) within every day, seemingly innocuous objects (cover text) to produce a stegno text. The recipient of a stegno text can use his knowledge of the particular method of steganography employed to recover the hidden text from the stegno text. The goal of steganography is to allow parties to converse covertly in such a way that an attacker cannot tell whether or not there is hidden meaning to their conversation. This sets steganography apart from cryptography which, although providing for private communication, can arouse suspicion based solely on the fact that it is being used. 1.1 WORKING PROCESS Steganography replaces unneeded or unused bits in regular computer files (Graphics, sound, text) with bits of different and invisible information. Hidden information can be any other regular computer file or encrypted data. Steganography differs from cryptography in a way that it masks the existence of the message where cryptography works to mask the content of the message. Steganography sometimes used in conjunction with encryption. An encrypted file may still hide information using steganography, so even if the encrypted file is deciphered, the hidden information is not seen. 1.2 TYPES OF STEGANOGRAPHY There are different ways to hide the message in another, well known are Least Significant bytes and Injection. When a file or an image is created there are few bytes in the file or image which are not necessary or least important. These type of bytes can be replaced with a message without damaging or replacing the original message, by which the secrete message is hidden in the file or image. Another way is a message can be directly injected into a file or image. But in this way the size of the file would be increasing accordingly depending on the secrete message.
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4827 2. PROPOSED SYSTEM The proposed approach is combination of compression, data hiding technique and encryption. To make the transmission and storage of digital data faster, LZW compression technique is used. LZW is a type of lossless compression technique. In the proposed approach Elliptic curve cryptography (ECC) technique is used for data encryption and also Comprehensive steganographic method by combining the lossless compression, state of the art encryption, modified pixel value differencing (MPVD) and LSB substitution. If the receiver has encryption key, then only he can obtain the secret message. These proposed techniques will provide higher security and the system yields high quality image, less memory utilization, more complexity and higher embedded capacity. SYSTEM DESIGN Data hiding is the process of hiding secret message into cover file. In steganography, before the hiding process, the sender must select an appropriate message carrier, an effective message to be hidden as well as a secret key used as a password. Secret message is present in the form of text and cover file is selected in form of image. A robust steganographic algorithm must be selected that should be able to encrypt the message more effectively. The sender then may send the hidden message to the receiver by using any of the modern communication techniques. Uploaded text message was hidden within the image to create stegno image. Generate key for securely sharing the information to receiver. Fig -1: System Architecture LZW Compression Secret message is collecting from sender and apply compression on secret text to reduce the size of the compressed text. LZW compression is the process of compressing the secret text before hiding in image. LZW compression is the compression of a file into a smaller file using a table-based lookup algorithm. LZW compression algorithm takes each input sequence of bits of a given length for that particular bit pattern, consisting of the pattern itself and a shorter code. Data Encryption Encryption is the process of converting plain text into cipher text. Here compressed text is taken as input for encryption process. ECC encryption is used to convert the compressed text into encrypted format. Then secret keys are generated and distributed to the receiver. Compressed text is taken as input for encryption using ECC. It creates encryption keys based on using points on a curve to define the public and private keys. It provides higher level of security with lesser key size compared to other Cryptographic techniques. Encrypted output is converted into binary form. It ensures higher security level. [11] Data Hiding using LSB In the process of embedding, the cover image is divided into non-overlapping pixel blocks of 3x3 or 2x2 pixel blocks. Block levels are based cardinality of the cover image. If secret bit is 1 and LSB of stego pixel is 0 or vice- versa, then 1 is added or subtracted to the stego pixel. In this method, the LSB of each pixel is replaced (over- written) by a value zero for the non-edged pixel, or one for an edged pixel. This can be done by using the logical operators. The LSB contains the indication for the existence of edged pixel. Changes to the LSB of a pixel affect its value by only one. Since pixel values range from 0 to 255, there will be a very little change in pixel intensity. The extraction of the LSB can be implemented by checking the odd and even pixel values. Data Extraction Data extraction is the process of extracting the original data. Receiver gets the secret message with cover image. Specific key is generated and shared to the receiver during the process of message sending. Key sharing is the process of sharing secret keys to the receiver. Then the receiver can extract the text and decrypt the text using decryption key. Then add decompression to get original text. 3. CONCLUSIONS This paper proposed a new steganographic algorithm for hiding text files in images. Here provide an overview of steganography and introduce some techniques of steganography which help to embed the data. These techniques are more useful for detecting the stego images as well as the image media relating to security of images
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4828 and embed the data for complex image area and can easily estimate the high embedding rate by using the quantitative steganalytic technique. Here we have also used an underlying compression algorithm with maximum compression ratio of 8 bits/ pixel. Developed a system in java based on the proposed algorithm. Here we have tested few images with different sizes of text files to be hidden and concluded that the resulting stego images do not have any noticeable changes. Also we found that for .bmp images this algorithm works very efficiently. Hence this new steganographic approach is robust and very efficient for hiding text files in images. REFERENCES [1] Zhou, Jiantao, Weiwei Sun, Li Dong, Xianming Liu, Oscar C. Au, and Yuan Yan Tang. "Secure reversible image data hiding over encrypted domain via key modulation." IEEE transactions on circuits and systems for video technology 26, no. 3 (2016): 441-452. [2] Zhang, Xinpeng, Jing Long, Zichi Wang, and Hang Cheng. "Lossless and reversible data hiding in encrypted images with public-key cryptography." IEEE Transactions on Circuits and Systems for Video Technology 26, no. 9 (2016): 1622-1631. [3] Dragoi, Ioan Catalin, Henri-George Coanda, and Dinu Coltuc. "Improved reversible data hiding in encrypted images based on reserving room after encryption and pixel prediction." In 2017 25th European Signal Processing Conference (EUSIPCO), pp. 2186-2190. IEEE, 2017. [4] Yi, Shuang, and Yicong Zhou. "Binary-block embedding for reversible data hiding in encrypted images." Signal Processing133 (2017): 40-51. [5] Cao, Xiaochun, Ling Du, Xingxing Wei, Dan Meng, and Xiaojie Guo. "High capacity reversible data hiding in encrypted images by patch-level sparse representation." IEEE transactions on cybernetics 46, no. 5 (2016): 1132-1143. [6] Chuman, Tatsuya, Kenta Kurihara, and Hitoshi Kiya. "On the security of block scrambling-based etc systems against extended jigsaw puzzle solver attacks." IEICE TRANSACTIONS on Information and Systems 101, no. 1 (2018): 37-44. [7] Kurihara, Kenta, Masanori Kikuchi, Shoko Imaizumi, Sayaka Shiota, and Hitoshi Kiya. "An encryption-then- compression system for jpeg/motion jpeg standard." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences 98, no. 11 (2015): 2238-2245. [8] Chuman, Tatsuya, Kenta Iida, and Hitoshi Kiya. "Image manipulation on social media for encryption-then- compression systems." In 2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC), pp. 858-863. IEEE, 2017. [9] Kobayashi, Hiroyuki, and Hitoshi Kiya. "Bitstream- Based JPEG Image Encryption with File-Size Preserving." In 2018 IEEE 7th Global Conference on Consumer Electronics (GCCE), pp. 384-387. IEEE, 2018. [10] Qian, Zhenxing, Hang Zhou, Xinpeng Zhang, and Weiming Zhang. "Separable reversible data hiding in encrypted JPEG bitstreams." IEEE Transactions on Dependable and Secure Computing (2016). [11] Unethical Network Attack Detection and Prevention using Fuzzy based Decision System in Mobile Ad-hoc Networks. R.Thanuja,J Electr Eng Technol.2018; 13(5): 2086-2098. http://doi.org/10.5370/JEET.2018.13.5.2086
Descargar ahora