Image Steganography Based on Transform Domain, Blowfish and AES for second level security

Authors

  • Gajjar J Research Scholar, Computer Science Engineering Dept, NSIT College, India

Keywords:

Steganography, Cryptography, DCT, PSNR, MSE, Bolwfish, AES

Abstract

Steganography is technique for secret communication. It hides the existence of the communication between parties. So viewer cannot detect the existence of the message and also not detect the communication channel. So attacker cannot modify and see the secret information. In image steganography, secrecy is accomplished by hide the secret message in cover image using steganography techniques. There are different types of steganography techniques each have their merits and demerits. Using Steganography techniques on cover image we can improve the security and robustness. For improving second level security we are using cryptography. Cryptography is used to convert the secret message in cipher text means unreadable form of message. Cryptography introduces many algorithms. This algorithm converts the secret message in cipher text. In our proposed method we are using Blowfish and AES algorithm for converting the message in cipher text and then hide this cipher text in cover image using DCT steganography technique. Using this combine technique we can get the stego-image. Here using this proposed method we can get the security and robustness in terms of message when we retrieve the message from the stego-image.

References

JasleenKour, DeepankarVerma “Steganography Techniques-A Review Paper”, International Journal of Emerging Research in Management & Technology, vol-3, May 2014.

Abbas Cheddad, Joan Condell, Kevin Curran and Paul McKevitt “Digital Image Steganography: Survey and Analysis of Current Methods”, signal processing, vol-90, march 2010.

NavneetKaur, Sunny Behal “A Survey on various types of Steganography and Analysis of Hiding Techniques” International Journal of Engineering Trends and Technology (IJETT) – Volume 11 Number 8 - May 2014

Anjali Tiwari, Seema Rani Yadav, N.K. Mittal “A Review on Different Image Steganography Techniques “International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 7, January 2014

StutiGoel,ArunRana,ManpreetKaur “ A Review of Comparison Techniques of Image Steganography “ IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE) e-ISSN: 2278-1676,p-ISSN: 2320-3331, Volume 6, Issue 1 (May. - Jun. 2013)

GurmeetKaur* and AartiKochhar“ Transform Domain Analysis of Image Steganography “ International Journal for Science and Emerging ISSN No. (Online):2250-3641 Technologies with Latest Trends” 6(1): 29-37 (2013)

Maulik P. Chaudhari, Sanjay R. Patel „‟A Survey on Cryptography Algorithms “International Journal of Advance Research in Computer

Science and Management Studies , vol-2, march-2014

Pratap Chandra Mandal“ Evaluation of performance of the Symmetric Key Algorithms: DES, 3DES ,AES and Blowfish “Journal of Global Research in Computer Science ,vol-3, Aug-2012.

LokeshKumar “Novel Security Scheme for Image Steganography using Cryptography Technique” International Journal of Advanced Research in Computer Science and Software Engineering, Volume 2, Issue 4, April 2012 ISSN: 2277 128X

Joseph Raphael and Dr. V. Sundaram, “Cryptography and Steganography – A Survey” A.JosephRaphael,Dr.VSundaram, Int. J. Comp.

Tech. Appl., Vol 2 (3), 626-630, ISSN:2229-6093

Saejung, S. ; Dept. of Comput., Silpakorn Univ., NakhonPathom, Thailand ; Boondee, A. “On the comparison of digital image steganography algorithm based on DCT and wavelet” 2013 International Computer Science and Engineering Conference (ICSEC): ICSEC 2013.

Md. Rashedul Islam1, Ayasha Siddiqa2, Md. Palash Uddin3, Ashis Kumar Mandal4 and Md. Delowar Hossain5 “An Efficient Filtering Based Approach Improving LSB Image Steganography using Status Bit along with AES Cryptography” 3rd INTERNATIONAL CONFERENCE ON INFORMATICS, ELECTRONICS & VISION 2014

McCaffrey, James. "Keep your data secure with the new advanced encryption standard." MSDN Magazine 11 (2003).

Guthaus, Matthew R., et al. "MiBench: A free, commercially representative embedded benchmark suite." Workload Characterization,

WWC-4. 2001 IEEE International Workshop on. IEEE, 2001.

Gunjal, Monika, and Jasmine Jha. "Image Steganography Using Discrete Cosine Transform (DCT) and Blowfish Algorithm."

MrsArchana S. Vaidya, Pooja N. More, Rita K. Fegade, Madhuri A. Bhavsar, Pooja V. Raut “Image Steganography using DWT and BLOWFISH Algorithms” IOSR Journal of Computer Engineering (IOSR-JCE)

Downloads

Published

2024-02-26

How to Cite

Gajjar, J. (2024). Image Steganography Based on Transform Domain, Blowfish and AES for second level security. COMPUSOFT: An International Journal of Advanced Computer Technology, 4(06), 1852–1856. Retrieved from https://ijact.in/index.php/j/article/view/324

Issue

Section

Original Research Article

Similar Articles

<< < 1 2 3 4 > >> 

You may also start an advanced similarity search for this article.