Open Access   Article Go Back

A Robust Hybrid Algorithm for Image Steganography

Divya Soi1 , Bhupinder 2

Section:Research Paper, Product Type: Journal Paper
Volume-8 , Issue-2 , Page no. 59-68, Feb-2020

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v8i2.5968

Online published on Feb 28, 2020

Copyright © Divya Soi, Bhupinder . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Divya Soi, Bhupinder, “A Robust Hybrid Algorithm for Image Steganography,” International Journal of Computer Sciences and Engineering, Vol.8, Issue.2, pp.59-68, 2020.

MLA Style Citation: Divya Soi, Bhupinder "A Robust Hybrid Algorithm for Image Steganography." International Journal of Computer Sciences and Engineering 8.2 (2020): 59-68.

APA Style Citation: Divya Soi, Bhupinder, (2020). A Robust Hybrid Algorithm for Image Steganography. International Journal of Computer Sciences and Engineering, 8(2), 59-68.

BibTex Style Citation:
@article{Soi_2020,
author = {Divya Soi, Bhupinder},
title = {A Robust Hybrid Algorithm for Image Steganography},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {2 2020},
volume = {8},
Issue = {2},
month = {2},
year = {2020},
issn = {2347-2693},
pages = {59-68},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=5032},
doi = {https://doi.org/10.26438/ijcse/v8i2.5968}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v8i2.5968}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=5032
TI - A Robust Hybrid Algorithm for Image Steganography
T2 - International Journal of Computer Sciences and Engineering
AU - Divya Soi, Bhupinder
PY - 2020
DA - 2020/02/28
PB - IJCSE, Indore, INDIA
SP - 59-68
IS - 2
VL - 8
SN - 2347-2693
ER -

VIEWS PDF XML
175 285 downloads 145 downloads
  
  
           

Abstract

Image Steganography is the mechanism of hiding the critical information on the segment of the image that can either be least significant or most significant in nature. Image Steganography involves multiple images that are merged together to achieve a common image that is transferred over a digital medium. Proposed system uses slant let transformation to achieve better result of image security in terms of accuracy. Accuracy is achieved by minimising mean square error and improving peak signal to noise ratio. 

Key-Words / Index Term

Image Steganography, Slant let Transformation. PSNR, MSE

References

[1]   C. Science
and S. Engineering, “Steganography Digital Images : A Hybrid Approach,” vol. 5, no. 5, pp. 1778–1785, 2015.



[2]   P. Parmar and N.
Jindal, “Image Security with Integrated Steganography and Encryption 1 1 2,” vol. 9, no. 3, pp. 24–29, 2014.



[3]   T. Bathinda,
“Invisible Video Multiple Steganography Using Optimized Techniques,” 2016.



[4]   R. T. Mohammed and
B. E. Khoo, “Image Steganography using slantlet transform,” ISIEA 2012 -
2012 IEEE Symp. Ind. Electron. Appl.
, pp. 281–286, 2012.



[5]   R. K. Sheth and V.
V. Nath, “Secured digital image Steganography with discrete cosine transform
and discrete wavelet transform method,” 2016 Int. Conf. Adv. Comput. Commun.
Autom.
, pp. 1–5, 2016.



[6]   R. V Mahule,
“Analysis of Image Security Techniques using Digital Image Steganography in
Spatial Domain,” no. Nckite, pp. 19–26,
2015.



[7]   Z. J. Xu, Z. Z.
Wang, and Q. Lu, “Research on Image Steganography Algorithm based on DCT,” vol. 10, pp. 1129–1135, 2011.



[8]   A. U. Islam, F.
Khalid, M. Shah, Z. Khan, T. Mahmood, A. Khan, U. Ali, and M. Naeem, “An
improved image steganography technique based on MSB using bit differencing,” 2016
6th Int. Conf. Innov. Comput. Technol. INTECH 2016
, pp. 265–269, 2017.



[9]   V. Saravanan and
A. Neeraja, “Security issues in computer networks and stegnography,” 7th
Int. Conf. Intell. Syst. Control. ISCO 2013
, pp. 363–366, 2013.



[10] P. Singhai and A.
Shrivastava, “An efficient Image Security mechanism based on Advanced
Encryption Standard,” no. 13, 2015.



[11] S. S. Gonge, “An
Integration of SVD Digital Image Steganography with AES Technique for Copyright
Protection and Security of Bank Cheque Image,” pp. 769–778, 2016.



[12] Q. Chen, H. Hu, and
J. Xu, “Authenticated Online Data Integration Services,” pp. 167–181.



[13] J. Singh and A. K.
Patel, “An Effective Telemedicine Security Using Wavelet Based Steganography,” pp. 2–7, 2016.



[14] M. Rizal, M. Isa,
and S. Aljareh, “A Steganography technique to improve the security level in
face recognition systems,” Multimed. Tools Appl.,
2016.