CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

Data Hiding in Image using multilevel 2-D DWT and ASCII Conversion and Cyclic Mathematical Function based Cryptography

by Abbas F. Tukiwala, Sheshang D. Degadwala
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 105 - Number 7
Year of Publication: 2014
Authors: Abbas F. Tukiwala, Sheshang D. Degadwala
10.5120/18389-9637

Abbas F. Tukiwala, Sheshang D. Degadwala . Data Hiding in Image using multilevel 2-D DWT and ASCII Conversion and Cyclic Mathematical Function based Cryptography. International Journal of Computer Applications. 105, 7 ( November 2014), 19-25. DOI=10.5120/18389-9637

@article{ 10.5120/18389-9637,
author = { Abbas F. Tukiwala, Sheshang D. Degadwala },
title = { Data Hiding in Image using multilevel 2-D DWT and ASCII Conversion and Cyclic Mathematical Function based Cryptography },
journal = { International Journal of Computer Applications },
issue_date = { November 2014 },
volume = { 105 },
number = { 7 },
month = { November },
year = { 2014 },
issn = { 0975-8887 },
pages = { 19-25 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume105/number7/18389-9637/ },
doi = { 10.5120/18389-9637 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:37:05.541247+05:30
%A Abbas F. Tukiwala
%A Sheshang D. Degadwala
%T Data Hiding in Image using multilevel 2-D DWT and ASCII Conversion and Cyclic Mathematical Function based Cryptography
%J International Journal of Computer Applications
%@ 0975-8887
%V 105
%N 7
%P 19-25
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The preserving secrecy of sensitive data becomes very important in today digital communication. Steganography is the discipline of exchanging top secret information by embedding it into a multimedia carrier and Cryptography is the art of protecting information by transforming it into an undetectable form. The ultimate aim, here is to hide the very existence of the embedded information within seemingly innocuous carriers and transmit in such a way that the existence of information is undetectable. In this paper, proposed method extracts by combining the features of cryptography and steganography. Cryptography using Modified ASCII Conversion & Mathematical Function involves converting the secret message into unprintable form of same size as original message in any cases. Steganography is then applied using multilevel 2-D DWT to embed this encrypted data into a cover media using High Frequency Coefficients of each Dimension at all levels of 2-D Haar DWT and hides its existence. Finally, Performance can be measured by using statistical parameters peak signal noise ratio (PSNR) and Mean Square error (MSE). This proposed method provides all three aspects of data hiding such as capacity, security and robustness.

References
  1. Mehdi Hussain and Mureed Hussain, "A Survey of Image Steganography Techniques", International Journal of Advanced Science and Technology Vol. 54, May, 2013
  2. Firas A. Jassim, "A Novel Steganography Algorithm for Hiding Text in Image using Five Modulus Method", International Journal of Computer Applications (0975 – 8887) Volume 72– No. 17, June 2013
  3. Chaithra H, Manjula Y, M Z Kurian, Dr. K. B. Shivakumar, Nuthan A C, "Hiding Technique Using FMM, Visual Cryptography and Genetic Algorithm", International Journal for Research and Development in Engineering (IJRDE) 2014. Vol2: Issue3
  4. Rahul Joshi, Lokesh Gagnani, Salony Pandey, "Image Steganography with LSB", International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 1, January 2013
  5. Shivani Kundra, Nishi Madaan, "A Comparative Study of Image Steganography Techniques", International Journal of Science and Research (IJSR) Volume 3 Issue 4, April 2014
  6. Saeed Ahmed Sohag, Dr. Md. Kabirul Islam, Md. Baharul Islam, "A Novel Approach for Image Steganography Using Dynamic Substitution and Secret Key", American Journal of Engineering Research (AJER) Volume-02, Issue-09,2013
  7. Barnali Gupta Banik, Prof. Samir K. Bandyopadhyay, "A DWT Method for Image Steganography", International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 6, June 2013
  8. Yung-Kuan Chan, Wen –Tang Chen, Shyr-Shen Yu, Yu-An Ho, Chwei-Shyong Tsai, Yen-Ping Chu, "A HDWT –based reversible data hiding method", Elsevier Inc. 2008
  9. Vikas pratap singh, Prof. Shrikant lade, "Haar wavelet domain analysis of image steganography", International Journal of Technical Research and Applications Volume 1, Issue 5 (Nov-Dec 2013)
  10. Mrs. D. Mathivadhani, Dr. C. Meena, "Digital Watermarking and Information Hiding Using Wavelets, SLSB and Visual Cryptography Method", IEEE, 2010
  11. Md. Palash Uddin, Md. Abu Marjan, Nahid Binte Sadia and Md. Rashedul Islam, "Developing a Cryptographic Algorithm Based on ASCII Conversions and a Cyclic Mathematical Function", 3rd international conference on informatics, electronics & vision 2014
  12. S. Shanmuga Priya, K. Mahesh, Dr. K. Kuppusamy, "Efficient Steganography Method to Implement Selected Lease Significant Bits in Spatial Domain (SLSB – SD)", International Journal of Engineering Research and Applications (IJERA) Vol. 2, Issue 3, May-Jun 2012
  13. Mr. Vikas Tyagi, "Data Hiding in Image using least significant bit with cryptography", International Journal of Advanced Research in Computer Science and Software Engineering, Volume 2, Issue 4, April 2012
  14. Ali Al-Ataby and Fawzi Al-Naima, "A Modified High Capacity Image Steganography Technique Based on Wavelet Transform", the International Arab Journal of Information Technology, Vol. 7, No. 4, October 2010
  15. Prabakaran. G, Bhavani R, "A Modified Secure Digital Image Steganography Based on Discrete Wavelet Transform", International Conference on Computing, Electronics and Electrical Technologies [ICCEET], 2012
  16. G. Prabakaran, Dr. R. Bhavani, K Kanimozhi, "Dual Transform Based Steganography Using Wavelet Families and Statistical Methods", IEEE, 2013
  17. Nadiya P v, B Mohammed lmran, "Image Steganography in DWT Domain using Double-stegging with RSA Encryption", International Conference on Signal Processing, Image Processing and Pattern Recognition [ICSIPR], 2013
  18. Pratibha Sharma, Shanti Swami, "Digital Image Watermarking Using 3 level Discrete Wavelet Transform", Conference on Advances in Communication and Control Systems 2013
  19. S. Bhargav Kumar, K. Esther Rani, "FPGA Implementation of 4-D DWT and BPS based Digital Image watermarking", International Journal of Engineering Trends and Technology- Volume 3 Issue2- 2012
  20. Nikita Kashyap, G. R. SINHA, "Image Watermarking Using 3-Level Discrete Wavelet Transform (DWT)", I. J. Modern Education and Computer Science, 2012
  21. N. V. S. Sree Rathna Lakshmi, "A Novel Steganalytic Algorithm based on III Level DWT with Energy as Feature", Research Journal of Applied Sciences, Engineering and Technology, May 15, 2014
Index Terms

Computer Science
Information Sciences

Keywords

2-D DWT Haar DWT ASCII Conversion Cyclic Mathematical Function PSNR MSE