Open Access   Article Go Back

Enhanced Hybrid Techniques for Data Hiding

Sukhjeet Kaur1 , Harpal Singh2

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-10 , Page no. 178-182, Oct-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i10.178182

Online published on Oct 31, 2018

Copyright © Sukhjeet Kaur, Harpal Singh . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Sukhjeet Kaur, Harpal Singh, “Enhanced Hybrid Techniques for Data Hiding,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.10, pp.178-182, 2018.

MLA Style Citation: Sukhjeet Kaur, Harpal Singh "Enhanced Hybrid Techniques for Data Hiding." International Journal of Computer Sciences and Engineering 6.10 (2018): 178-182.

APA Style Citation: Sukhjeet Kaur, Harpal Singh, (2018). Enhanced Hybrid Techniques for Data Hiding. International Journal of Computer Sciences and Engineering, 6(10), 178-182.

BibTex Style Citation:
@article{Kaur_2018,
author = {Sukhjeet Kaur, Harpal Singh},
title = {Enhanced Hybrid Techniques for Data Hiding},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {10 2018},
volume = {6},
Issue = {10},
month = {10},
year = {2018},
issn = {2347-2693},
pages = {178-182},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3001},
doi = {https://doi.org/10.26438/ijcse/v6i10.178182}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i10.178182}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3001
TI - Enhanced Hybrid Techniques for Data Hiding
T2 - International Journal of Computer Sciences and Engineering
AU - Sukhjeet Kaur, Harpal Singh
PY - 2018
DA - 2018/10/31
PB - IJCSE, Indore, INDIA
SP - 178-182
IS - 10
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
550 293 downloads 242 downloads
  
  
           

Abstract

Security is the occasions of anyone unfastened from hazard. Safety has very crucial difficulty in conversation. To solve the difficulty of security we arrange those integrate techniques. Cryptography is the artwork and science of observe of generating the secret message of the original message. As Steganography is the art and technological know-how of hiding verbal exchange, into some other media type file consisting of image, text and video. The numerous cryptography and steganography methods to cover statistics like LSB, DCT etc. However these strategies are wounded by a few problems like reduce quality of image, lower covering capacity. To success over this difficulty the proposed strategies use Substitution Encryption method to similarly encrypt the data and steganography method uses the Improved LSB Steganography technique which uses the formats like bmp, jpg and so forth. Performance of the proposed system is better than existing system.

Key-Words / Index Term

Cryptography, Steganography, Encryption, LSB, Security

References

[1] Amritpal Singh, Harpal Singh “ An improved LSB based Image Steganography Technique for TGB Images” , 978-1-4799-6085-9/15/$31.00 ©2015 IEEE.
[2] Amritpal Singh, Satinder Jeet Singh, “An Overview of Image Steganography Techniques”, International Journal of Engineering and Computer Science ISSN: 2319-7242 Volume 3 Issue 7 July, 2014 Page No. 7341-7345.
[3] Atish Jain, Ronak Dedhia, Abhijit Patil, "Enhancing the Security of Caesar Cipher Substitution Method using a Randomized Approach for more Secure Communication ", International Journal of Computer Applications (0975 – 8887) Volume 129 – No.13, November2015.
[4] Balvinder Singh, Sahil Kataria, Tarun Kumar, Narpat Singh Shekhawat, "A Steganography Algorithm for Hiding Secret Message inside Image using Random Key", International Journal of Engineering Research & Technology (IJERT) ISSN: 2278-0181 IJERTIJERT IJERTV3IS120844 www.ijert.org Vol. 3 Issue 12, December-2014.
[5] B.Ramesh Kumar, K.Suresh, S.K.Basheer, M. Raja Krishna Kumar, "Enhanced Approach to Steganography Using Bitplanes", International Journal of Computer Science and Information Technologies, Vol. 3 (6), 2012.
[6] Deepanshi Nanda, Sonia Sharma, “Security in Cloud Computing using Cryptographic Techniques”, IJCST Vol. 8, Issue 2, April - June 2017
[7] Dipti Kapoor Sarmah, Neha Bajpai, "Proposed System for data hiding using Cryptography and Steganography", https://www.researchgate.net/publication/46585135. 15 April 2016.
[8] Dr.M.Umamaheswari, Prof.S.Sivasubramanian, S.Pandiarajan, " Analysis of Different Steganographic Algorithms for Secured Data Hiding", IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.8, August 2010.
[9] Dr. Mohammed A. F. Al-Husainy, Dr. Diaa Mohammed Uliyan," Image Encryption Technique based on the Entropy Value of a Random Block", (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 8, No.7, 2017.
[10] E.Thmbiraja, G.Ramesh, Dr.R.Umarani, “A survey on various most common encryption techniques”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol 2, Issue 7, July 2012.
[11] Er. Munish Katoch, Reenu Jaswal, “Image Steganography: A Review”, International Journal of Advanced Research in Computer and Communication Engineering Vol. 5, Issue 4, April 2016.
[12] Gurpreet Singh, Supriya, “A Study of Encryption Algorithm( RSA,DES,3DES and AES) for information Security” , International Journal of Computer application, Vol. 67- No 19, april 2013.
[13] G.Prashanti, B.V.Jyothirmai, K.Sai Chandana, " Data Confidentiality Using Steganography and Cryptographic Techniques", 978-1- 5090-4967- 7/17/$31.00 © 2017 IEEE
[14] Gurjeevan Singh, Ashwani Kumar Singla, K.S. Sandha “Performance Evaluation of Symmetric Cryptographic Algorithms”, International Journal of Electronics and Communication Technology Vol 2 Issue 3, Sep 2011.
[15] Hayfaa Abdulzahra, Robiah Ahmad1, Norliza Mohd Noor, " Combining Cryptography And Steganography for Data Hiding in Images", ISBN: 978-960-474-368.
[16] Jagdish Mali1, Viraj Sonawane, Prof. R.N.Awale, “Image Steganography Using Block Level Entropy Thresholding Technique”, International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622, Vol. 3, Issue 4, Jul-Aug 2013, pp. 412-415.
[17] K.Thangadurai and G.Sudha Devi, "An analysis of LSB Based Image Steganography Techniques", 2014 International Conference on Computer Communication and Informatics (ICCCI -2014), Jan. 03 – 05, 2014, Coimbatore, INDIA.
[18] K. Arora, G. Gandhi, "A Review of Approaches for Steganography", International Journal of Computer Sciences and Engineering, Vol.2, Issue.5, pp.118-122, 2014.
[19] Mandeep Kaur Gill and Rupinder Kaur Randhawa , "Comparative Study of Multibit LSB Steganography with Cryptography", International Journal of Computer Sciences and Engineering, Vol.3, Issue.7, pp.120-123, 2015.
[20] Manoj Kumar, Gursewak Singh, “Block based Image Steganography using Entropy with LSB and 2-bit Identical Approach”, International Journal of Computer Application (0975-8887) Volume 171-No. 8, August 2017.
[21] Mehdi Hussain and Mureed Hussain, “ A Survey of Image Steganography Techniques” , ”, International Journal of Advanceed Science and Technology Vol. 54, May,2013.
[22] Marwa E. Saleh, Abdelmgeid A. Aly, Fatma A. Omara, " Data Security Using Cryptography and Steganography Techniques" , (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 7, No. 6, 2016.
[23] Navneet Kaur, Sunny Behal, "A Survey on various types of Steganography and Analysis of Hiding Techniques", International Journal of Engineering Trends and Technology (IJETT) – Volume 11 Number 8 - May 2014.
[24] Priyanka Haridas, Gouri Shankar Prajapati, " A Combined Approach of Steganography and Cryptography Techniques for Information Security: A Survey", International Journal of Engineering Research & Technology (IJERT) ISSN: 2278-0181 Vol. 4 Issue 12, December-2015.
[25] Shashi Mehrotra Seth, Rajan Mishra, “Comparative Analysis of Encryption Algorithms for Data Communication” IJCST Vol. 2, Iss ue 2, June 2011
[26] S Ushll, G A Sathish Kumal, K Boopathybagan, "A Secure Triple Level Encryption Method Using Cryptography and Steganography", 978-1-4577-1587-7/111$26.00 ©20111EEE.