Securing Information Using Sterganoraphy

Now a day's the medium of communicating the information is through the internet and there are enough hackers to hack the information because the data has transferred through covert channels. The information will encrypt using cryptographic algorithms and the cipher text can see by a third - party adversary and by applying cryptanalysis the information can retrieve back. The major problem in applying cryptography is that, the cipher text is visible to unauthorized user. We can avoid this by using steganography. Different techniques are available to hide the information in steganography. Transformation techniques produce more noise in the image when the information has embedded. To avoid the noise distortion in the image, the LSB insertion method is used to insert the bits in an image by using random number generators. In this proposed technique before embedding the secret information into an image, the secret information has been compressed using the wavelet transform technique. The obtained bits after compression are encoded using quantum gates.

[1]  Fawzi M. Al-Naima,et al.  A modified high capacity image steganography technique based on wavelet transform , 2010, Int. Arab J. Inf. Technol..

[2]  Jessica J. Fridrich,et al.  Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.

[3]  N. C. Debnath,et al.  LCS based text steganography through Indian Languages , 2010, 2010 3rd International Conference on Computer Science and Information Technology.

[4]  Andreas Westfeld,et al.  F5—A Steganographic Algorithm High Capacity Despite Better Steganalysis , 2001 .

[5]  Ivan W. Selesnick,et al.  Wavelet Transforms | A Quick Study , 2007 .

[6]  Paresh Marwaha,et al.  Visual cryptographic steganography in images , 2010, 2010 Second International conference on Computing, Communication and Networking Technologies.

[7]  Mamta Juneja,et al.  Designing of Robust Image Steganography Technique Based on LSB Insertion and Encryption , 2009, 2009 International Conference on Advances in Recent Technologies in Communication and Computing.

[8]  Amir-Masoud Eftekhari-Moghadam,et al.  Digital Image Steganography Based on Assignment Algorithm and Combination of DCT-IWT , 2012, 2012 Fourth International Conference on Computational Intelligence, Communication Systems and Networks.

[9]  Jie Zhang,et al.  A Novel Secure Communication Protocol Combining Steganography and Cryptography , 2011 .

[10]  Niels Provos,et al.  Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..

[11]  T. Narasimmalou,et al.  Optimized discrete wavelet transform based steganography , 2012, 2012 IEEE International Conference on Advanced Communication Control and Computing Technologies (ICACCCT).

[12]  Chin-Chen Chang,et al.  An Adaptive Steganography for Index-Based Images Using Codeword Grouping , 2004, PCM.

[13]  Christian Cachin,et al.  An information-theoretic model for steganography , 1998, Inf. Comput..

[14]  K. Shanthi,et al.  Comparative Analysis of Various Median Filters Using Peak Signal TO Noise Ratio (PSNR) , 2014 .

[15]  Ajith Abraham,et al.  Significance of steganography on data security , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..

[16]  Nyein Aye,et al.  A Modified High Capacity Image Steganography using Discrete Wavelet Transform , 2013 .