CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

A Practical Approach for Secured Data Transmission using Wavelet based Steganography and Cryptography

by M. Indrasena Reddy, V. Uday Kumar, K. Subba Reddy
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 67 - Number 10
Year of Publication: 2013
Authors: M. Indrasena Reddy, V. Uday Kumar, K. Subba Reddy
10.5120/11431-6786

M. Indrasena Reddy, V. Uday Kumar, K. Subba Reddy . A Practical Approach for Secured Data Transmission using Wavelet based Steganography and Cryptography. International Journal of Computer Applications. 67, 10 ( April 2013), 18-23. DOI=10.5120/11431-6786

@article{ 10.5120/11431-6786,
author = { M. Indrasena Reddy, V. Uday Kumar, K. Subba Reddy },
title = { A Practical Approach for Secured Data Transmission using Wavelet based Steganography and Cryptography },
journal = { International Journal of Computer Applications },
issue_date = { April 2013 },
volume = { 67 },
number = { 10 },
month = { April },
year = { 2013 },
issn = { 0975-8887 },
pages = { 18-23 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume67/number10/11431-6786/ },
doi = { 10.5120/11431-6786 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:24:18.463255+05:30
%A M. Indrasena Reddy
%A V. Uday Kumar
%A K. Subba Reddy
%T A Practical Approach for Secured Data Transmission using Wavelet based Steganography and Cryptography
%J International Journal of Computer Applications
%@ 0975-8887
%V 67
%N 10
%P 18-23
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Steganography and cryptography methods are used together with wavelets to increase the security of the data while transmitting through networks. In the discrete wavelet transform, an image signal can be analyzed by passing it through an analysis filter bank. This analysis filter bank consists of a low pass and a high pass filter at each decomposition stage. Another technology, the digital watermarking is the process of embedding information into a digital (image) signal which may be used to verify its authenticity or the identity of its owners. The watermark to be embedded is 'text'. Before embedding the plain text into the image, the plain text is encrypted by using Data Encryption Standard (DES) algorithm. The plain text can be any sentence in English, and the key can be anything in English with a length of 8-characters. The encrypted text is embedded into the LL subband of the wavelet decomposed image using Least Significant Bit (LSB) method. Then the inverse wavelet transform is applied and the resultant image is transmitted to the receiver. At the receiver's end, the image is transformed using wavelet, from the LL subband the encrypted text is extracted by using the LSB method and the result is decrypted using DES.

References
  1. William Stallings, Cryptography and Network Security, Principles and Practice, Third editionPearsonEducation, Singapore, 2003.
  2. Clair, Bryan. "Steganography: How to Send a Secret Message. " 8 Nov. 2001
  3. Westfeld, A. , and G. Wolf, Steganography in a Video conferencing system, in proceedings of the second international workshop on information hiding, vol. 1525 of lecture notes in computer science, Springer, 1998. Pp. 32-47.
  4. C. C. Lin, and W. H. Tsai, "Secret Image Sharing with Steganography and Authentication," Journal of Systems and Software, 73 (3): 405-414, December 2004
  5. KafaRabah. Steganography - The Art of Hiding Data. Information Technology Journal 3 (3) - 2004.
  6. T. Morkel, J. H. P. Eloff, M. S. Olivier, "An Overview of Image Steganography", Information and Computer Security Architecture (ICSA) Research Group, Department of Computer Science, University of Pretoria, SA.
  7. Krenn, R. , "Steganography and Steganalysis", http://www. Krenn. nl/univ/cry/steg/article. pdf
  8. R. J. Anderson and F. A. P. Petitcolas (2001) On the limits of the Stegnography, IEEE Journal Selected Areas in Communications, 16 (4), pp. 474-481.
  9. Rafael C. Gonzalez and Richard E. Woods, "Digital Image Processing," 2nd Ed. , Pearson Education Pvt. Ltd, Indian Branch, 2003.
  10. Duane Hanselman and Bruce Littlefield, "Mastering MATLAB 7", Pearson Education, India.
  11. Daubechies Ingrid, "Ten Lectures on Wavelets," Society for Industrial and Applied Mathematics, 1992
  12. J. Fridrich, M. Long, "Steganalysis of LSB encoding in color images,"Multimedia and Expo, vol. 3 pp. 1279-1282, July 2000. .
  13. R. Chandramouli, M. Kharrazi, N. Memon, "Image Steganography and Steganalysis: Concepts and Practice "International Workshop on Digital Watermarking, Seoul, October 2004.
  14. Hide & Seek: An Introduction to Stegnography: http:\niels. xtdnet. nl/papers/practical. pdf.
  15. Y. Lee and L. Chen (2000) High capacity image steganographic model, IEE Proceedings on Vision, Image and Signal Processing, 147 (3), pp. 288-294.
Index Terms

Computer Science
Information Sciences

Keywords

Steganography Cryptography Wavelet Digital Watermarking