CFP last date
20 May 2024
Reseach Article

Steganography Enhancement by Combining Text and Image through Wavelet Technique

by Najran N. H. Al_dawla, M. M. Kazi, K.v. Kale
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 51 - Number 21
Year of Publication: 2012
Authors: Najran N. H. Al_dawla, M. M. Kazi, K.v. Kale
10.5120/8328-1855

Najran N. H. Al_dawla, M. M. Kazi, K.v. Kale . Steganography Enhancement by Combining Text and Image through Wavelet Technique. International Journal of Computer Applications. 51, 21 ( August 2012), 29-32. DOI=10.5120/8328-1855

@article{ 10.5120/8328-1855,
author = { Najran N. H. Al_dawla, M. M. Kazi, K.v. Kale },
title = { Steganography Enhancement by Combining Text and Image through Wavelet Technique },
journal = { International Journal of Computer Applications },
issue_date = { August 2012 },
volume = { 51 },
number = { 21 },
month = { August },
year = { 2012 },
issn = { 0975-8887 },
pages = { 29-32 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume51/number21/8328-1855/ },
doi = { 10.5120/8328-1855 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:50:56.856123+05:30
%A Najran N. H. Al_dawla
%A M. M. Kazi
%A K.v. Kale
%T Steganography Enhancement by Combining Text and Image through Wavelet Technique
%J International Journal of Computer Applications
%@ 0975-8887
%V 51
%N 21
%P 29-32
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The rapidly proliferated information and evolution of digital technologies by Information hiding in multimedia data has improved the ease of access to digital information enabling reliable, faster and efficient storage, transfer and processing of digital data and leads to the consequence of making the illegal production and redistribution of digital media easy and undetectable. Hence, it poses a novel challenges for researchers. In this paper we present a novel integration of an incorporating text and image steganography to find a solution for enhancing security and protecting data. We proposed an enhancement of steganography algorithm which involves the scheme of discrete wavelet transformation combining text and image by secretly embed encrypted secrete message text data (cipher text) ortext image in the content of a digital image. The system based on levels of encryption and decryption methods performed to enhance the security of the system. Here first generate secrete message text (cipher text) or text image, and then processing deals with embedding and extracting Steganography algorithms. Finally the process deals with extraction of the hiddensecrete message. The experimental result shows a high level of efficiency and robustness of the proposed system.

References
  1. Saraju P. Mohanty 1999. "Digital Watermarking: A Tutorial Review," Dept. of Comp Sci. and Eng. University of South Florida Tampa, FL 33620 smohanty@csee. usf. edu.
  2. S. Katzenbeisser, A. P Fabien. Petitcolas, 2000. "Information hiding techniques forSteganography and digital watermarking" editors. p. cm. (Artech House Computing library).
  3. Chung-Li Hou, ChangChun Lu, Shi-Chun Tsai, andWen-Guey Tzeng2011. "An Optimal Data Hiding Scheme With Tree-Based Parity Check," IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 20, NO. 3.
  4. Furht, B. , Muharemagic, E. , Socek, D. ,2005 Multimedia Encryption and Watermarking, Multimedia Systems and Application Series, vol. 28, Springer Science BusinessMedia, Inc.
  5. Wenbo Mao,2004 Modern Cryptography: Theory and Practice, Prentice Hall PTR,, Prentice-HallInc.
  6. William Stallings,2002 Cryptography and Network security: principles and Practice, Prentice HallInternational Inc.
  7. Jae K. Shim, Anique A. Qureshi and Joel G. Siegel, 2000The International Hand book of ComputerSecurity, Glenlake Publishing Company, Ltd.
  8. Cryptography,Wikipedia,http://en. wikipedia. org/ wiki/Cryptography
  9. Poularikas, A. D. , 1996"The Transforms and Applications Handbook", CRC Press LLC (with IEEE Press).
  10. Grigoryan, A. M. , Agaian, S. S. ,2003 Multidimensional Discrete Unitary Transforms:Representation, Partitioning, and Algorithms, Marcel Dekker, Inc. , New York.
  11. P. Y. Chen, E. C. Liao,2002"A NewAlgorithm for Haar Wavelet Transform. " IEEE Int. Symposium on IntelligentSignal Processing and Communication System: 453-457.
  12. Po-Yueh Chen, Hung-Ju Lin,2006 "A DWT Based Approach for Image Steganography," Int. J. Appl. Sci. Eng. , 4, 3.
  13. S. Youssef, A. Abu Elfarag, R. Raouf,2011 "A Robust Steganography Model Using Wavelet-Based Block-Partitionmodification," Int. J. Comp. Sci. & I. T, Vol. 3, No 4.
  14. Huang Daren, L. Jiufen, H. Jiwu and L. Hongmei "A DWT-Based image watermarking algorithm," IEEE Int. Conf. on Multimedia and Expo.
  15. HONG CAI, M. S. 2007 "Wavelet Structure Based Transform: Information Extraction and Analysis," University Of Texas, Dissertation.
  16. Ali Al-Ataby and Fawzi Al-Naima,2010. "A Modified High Capacity Image SteganographyTechnique Based on Wavelet Transform," The International Arab Journal of Information Technology, Vol. 7, No. 4.
  17. Xu Jianyun, A. H. Sung, P. Shi, Liu Qingzhong, 2004 "JPEG Compression Immune Steganography Using Wavelet Transform," IEEE International Conference on Information Technology, Vol. 2, pp. 704 – 708.
Index Terms

Computer Science
Information Sciences

Keywords

Steganography Cryptography Text Image Secret Key Security DWT