Professional Documents
Culture Documents
d. JPEG FILE:
Joint Photographic Experts Group (JPEG) format is
one of the Transform Domain Techniques which has an Fig. 3 Flow chart for encryption algorithm.
advantage over LSB techniques because they hide
28 | P a g e
NOVATEUR PUBLICATIONS
International Journal Of Research Publications In Engineering And Technology [IJRPET]
ISSN: 2454-7875
VOLUME 2, ISSUE 6, June -2016
Next step is go through cover image, if the
coefficient value is less than threshold then replace the
LSB (Least Significant Bit) value of appropriate cover
image with MSB (Most significant Bit) of secret one. If
the value is replaced then write 1 to appropriate
position, else write 0 to that position. Next part is
addition of key for matrix. Select one of random valued
matrix, by selecting the key value the size of such
random valued matrix is same as cover image.[2]
Perform exclusive operation of random valued matrix
and embedded matrix which results in Encrypted form
of image.
CONCLUSION:
In our project i.e. Image security using
Steganography, we used LSB and DCT method. By using
IEEE papers on LSB and DCT steganography, we come to
know that LSB is the easiest method amongst all the
another methods of steganography as it provides high
PSNR around 86.3657 in our system. But in concern of
security, LSB is not that much efficient. In case of DCT, it
is complex to implement but it gives higher security, and
the PSNR value provided by DCT is less than LSB in our
system, it is up to 55.713. And for audio it gives very less
PSNR i.e 12.88 as the image is watermarked using LSB
technique and for DCT it gives PSNR around 90.3451.
REFERENCES:
1) Hardik Patel, Preeti Dave, “Steganography Technique
Based on DCT Coefficients” International Journal of
Engineering Research and Applications (IJERA)
Fig 4: Flow chart for decryption algorithm ISSN: 2248-9622
As this algorithm is implemented on computer 2) Kaladharan N,Unique “Key Using Encryption and
by considering transmitter and receiver together, we Decryption of Image”, International Journal of
proposed a GUI developed in MATLAB. This GUI is Advanced Research in Computer and
shown in figure 3. Communication Engineering Vol. 3, Issue 10,
October 2014 ISSN (Online) : 2278-1021 ISSN
(Print) : 2319-5940
29 | P a g e
NOVATEUR PUBLICATIONS
International Journal Of Research Publications In Engineering And Technology [IJRPET]
ISSN: 2454-7875
VOLUME 2, ISSUE 6, June -2016
3) N. Provos and P. Honeyman, “Hide and Seek: An 2073-4213.
Introduction to Steganography”, IEEE Security and 11) Mrs. Kavita Kadam, Ashwini Koshti, Priya Dunghav,
Privacy, 1540-7993/03,Mar 2003, 32-44. “Steganography using Least significant Algorithm”,
4) Neil F. Johnson and Sushil Jajodia, “Exploring International Journal of Engineering Research and
Steganography: Seeing the Unseen”, IEEE computer, Applications, Pune University, May-June 2012, 2248-
0018-9162/98 ,Feb 1998, 26-34. 9622.
5) Fabien A. P. Petitcolas, Ross J. Anderson and Markus 12) R. Amirtharajan, R. Akila, P. Deepikachodavarapu, “A
G. Kuhn,” Information Hiding-A Survey, IEEE, special Comparative Analysis of Image Steganography”,
issue on protection of multimedia content”,0018– International Journal of Computer Applications,
9219/99, VOL. 87, NO. 7, Jul 1999, 1062-1078. Tamil nadu University, May 2010, 0975-8887.
6) Rufeng Chu, Xinggang You, Xiangwei Kong and 13) Akanksha Kaushal, Vineeta Chaudhary, “Secured
Xiaohui Ba, “A DCT-based Image Steganographic Image Steganography Using Different Transform
Method Resisting Statistical attacks”, ICASSP IEEE,V- Domains”, International Journal of Computer
953, 2004, 953-956. Applications, ECE Department Ujjain, India
7) Vandana M. Ladwani, Srikanta Murthy K. “A new September 2012, 0975-8887.
approach to securing images”, International Journal
of Advanced Research in Computer and 14) Shahana T, “An Enhanced Security Technique For
Communication Engineering (IJARCCE), Bangalore, Steganography using DCT and RSA”, International
India.’ January Journal of Advanced Research in Computer Science
2015, 2319-5940. and Software Engineering, University of Calicut,
8) Ravindra Reddy, RojaRamani A, “The process of Kerala, India, July 2013, 2277-128X.
encoding and decoding of image steganography 15) Shiksha, Vidhu Kiran Dutt, “Steganography: The art
using LSB algorithm”, IJCSET November 2012, 2231- of Hiding Text in Image using Matlab”, International
0711. Journal of Advanced Research in Computer Science
9) Champakamala. B.S, Padmini. K, Radhika. D. K “Least and Software Engineering, University of Hissar, India
Significant Bit algorithm for image steganography”, September 2014, 2277-128X.
IJACT 2319-7900 Department of TCE, Don Bosco 16) Author C. Kurak, J. McHugh, A cautionary note on
Institute of Technology, Bangalore, India. image downgrading, in: Proceedings of the IEEE 8th
10) ConstanntinosPatsakis, Nikolaos G. Aroukatos “LSB Annual Computer Security Applications Conference,
and DCT Steganographic Detection using 30 November–4 December,1992, pp. 153–159
Compressive Sensing”, Journal of Information Hiding
and Multimedia Signal Processing, January 2014,
30 | P a g e