An Implementation of Text and Color Image Steganography Technique Using Cryptographic AlgorithmAuthor : Prakhar Agrawal and Arvind Upadhyay
Volume 7 No.1 January-June 2018 pp 93-98
The craft of data stowing away has gotten much consideration in the ongoing years as security of data has turned into a major worry in this web time. As sharing of delicate data by means of a typical correspondence channel have become inevitable, Steganography techniques aimed at secretly hiding data in a multimedia carrier such as text, audio, image or video, without raising any suspicion of alteration to its contents. The original carrier is referred to as the cover object. In this paper, we proposed a mechanism of end user data security by means of image steganography technique using ECDH (Elliptic Curve Diffie–Hellman) algorithm for improving image quality while we hide data in image. Our proposed approach is simplified yet efficient algorithm that can be implemented for end user application that strictly enforces the data integrity over the communication channel. The performance of the proposed approach is measured in terms of time, memory, MSE and PSNR which was better improved from the previous approach in the similar parameters.
Steganography, Images, Cryptography, ECDH, RSA, Security, Data Hiding, Communication Channel
 A. Westfield and A. Pfitzmann, “Attacks on Steganographic Systems in Information Hiding”, Springer-Verlag Heidelberg, pp. 61-76, 1999.
 A. Abraham and M. Paprzycki, “Significance of Steganography on Data Security”, in Proc. of the Information Technology: Coding and Computing, ITCC, IEEE, Vol. 2, pp. 347-351, 2004.
 R. J. Anderson and F. A. P. Petitcolas, “On the Limits of Steganography”, IEEE Journal on Selected Areas in Communications, Vol. 16, No. 4, pp. 474-481, 1998.
 S. Gandharba and S. K. Lenka. “Classification of Image Steganography Techniques in Spatial Domain: A Study”, International Journal of Computer Science & Engineering Technology, Vol. 5, No. 3, pp. 219-232, 2014.
 K. Patel and S. Utareja, “Information Hiding using Least Significant Bit Steganography and Blowfish Algorithm”, International Journal of Computer Applications (IJCA), Vol. 63, No. 13, 2013.
 G. R. Manjula and A. Danti, “A Novel Hash Based Least Significant Bit (2-3-3) Image Steganography in Spatial Domain”, International Journal of Security, Privacy and Trust Management (IJSPTM), Vol. 4, No. 1, 2015.
 H. Wang and S. Wang, “Cyber warfare: Steganography vs. Steganalysis”, Communications of the ACM, Vol. 47, No.10, pp. 76-82, 2004.
 S. A. Laskar and K. Hemachandran, “An Analysis of Steganography and Steganalysis Techniques”, Assam University Journal of Science and Technology, Vol.9, No-2, pp. 88-103, 2012.
 S. Venkatraman, A. Abraham and M. Paprzycki, “Significance of Steganography on Data Security”, Information Technology: Coding and Computing, Vol. 2, pp. 347-351, 2004.