Upload
vuxuyen
View
218
Download
5
Embed Size (px)
Citation preview
Investigation of Digital Image Steganography:A Survey
Chetna Mehto
M.tech scholar
Department of CSE TIT, Bhopal (India)
Rachana Kamble
Asst. Professor
Department of CSE TIT, Bhopal (India)
Dr. Bhupesh Gour
Professor
Department of CSE TIT, Bhopal (India)
Abstract
With the exponential growth in Internet usage, demand for
effective information security techniques is increasing day by
day. Digital image steganography is one of those techniques
that are used for effective secret communications. In this
technique, secret communication is achieved by embedding a
message into a cover image and generating a stego-image that
carries a hidden text message. This paper provides the details
of digital image steganography and presents a brief review of
various steganography techniques proposed recently by
various researchers around the globe. We propose a
technique that mingles up the hash code and ciphertext, and
embeds both of them in a single image so that it becomes very
hard for an attacker to separate them or replace. The
proposed algorithm will benefit the sender and receiver, as
they do not need to send two different files. On the other hand,
it will be much more difficult for the attacker to break the
proposed algorithm by unauthorized user.
1. Introduction When data is exchanged in an open network, the security of
information being exchanged becomes a major concern. Since
internet is a worldwide collection of loosely connected
networks having no geographical, national or international
boundaries hence there is even more risk associated with the
security of information that we put on there.
The essence of steganography lies in storing the secret
information inside an image file in such way that no one else
except the sender of the information and the intended receiver
can suspect about the existence of any sort of information
behind it. Although aim of both steganography and
cryptography is to hide the secret information but it is
achieved through entirely different ways in both the
techniques. Good imperceptibility and sufficient data capacity
are the two properties, which an effective steganography
technique must possess[1].
Section 2 presents the basic process of steganography named
by how steganography works, section 3 presents the basic
types of steganography along with their merits and demerits.
Section 4 discusses about stegnalysis, Section 5 presents the
image steganography tools. Section 6 presents technique used,
section 7 a brief discussion on related works section 8 presents
proposed work, and finally section 9 concludes the paper lastly section 10 represent references.
2. How Steganography Works Image Steganography means to conceal messages inside an
image where pixel intensities are used to hide the information.
The secret text message and a cover image are supplied as
input to the steganography algorithm, which writes the given
text message inside the cover image and as a result, it produces
the stego image. The secret message is written inside the image
in such a way that the quality of image does not change
significantly and thus no one can suspect that the image carries some secret information.
Fig. 1. Basic process of coding and decoding in steganography
Fig.1 illustrates the process of steganography where secret text
message is embedded inside the cover image to produce a
stego image. The receiver applies reverse algorithm to recover
the hidden text message from stego image. Many people think
MESSAGE
EMBEDDING
ALGORITHM
STEGO IMAGE
REVERSE ALGORITHM
RECOVERED MESSAGE
COVER IMAGE
Chetna Mehto et al, Int.J.Computer Technology & Applications,Vol 5 (5),1711-1717
IJCTA | Sept-Oct 2014 Available [email protected]
1711
ISSN:2229-6093
that cryptography and steganography are nearly same thing
but there is a huge difference between them. Cryptography
refers to converting the information in such a form that the
existence of the encrypted message is visible to the world but
no one can interpret the message except the sender and
receiver, whereas steganography deals in hiding messages
such that no one, except the sender and receiver knows that
the message even exists. Thus steganography prevents
unwanted attention of attackers towards the hidden message.
Fig.2(a) and (b) show the advantage of using digital
steganography over cryptography. Communication through
steganography increases the level of confidentiality and
privacy in electronic communication by transferring
information in an invisible form.
(a) Cryptography
(b) Steganography
Fig. 2. Cryptography and steganography
3. Types Of Steganography a) Spatial Domain Methods: It directly changes some bits in
the pixel values of the cover image while hiding the data.
Least significant bit (LSB)-based steganography is one
such simplest techniques that hides secret message in the
LSBs of pixel values without introducing much human
perceptible distortions [2]. Embedding of message bits can
be done either sequentially or randomly by using bit
insertion or noise manipulation of cover image. LSB
replacement, LSB matching, Matrix embedding and Pixel
value differencing techniques fall under spatial domain.
b) Transform Domain Technique: Various algorithms and
transformations are applied on cover image in order to hide
information behind it. These techniques hide information
in those areas of cover image that are less exposed to
compression, cropping, and other image processing
operations. Discrete Fourier transformation technique
(DFT), Discrete cosine transformation technique (DCT),
and Discrete Wavelet transformation technique (DWT) fall
under transform domain. Smooth homogeneous areas in
images must be avoided whereas chaotic with natural
redundant noise background and salient rigid edges should
be targeted for embedding the message.
c) Distortion Techniques: Distortion techniques require
knowledge of the original cover image for embedding the
message into cover image. The decoder functions are
applied in order to check the dissimilarity between original
cover image and the stego image for restoring the secret
text message. The necessity of sending cover image along
with cover image delimits the benefits of this technique.
d) Masking and Filtering: This approach hides the
information by marking an image in the same manner as
paper watermark does. These techniques embed
information in more significant areas than simply hiding it
into the noise level. These techniques are applicable only
to gray scale images and are restricted only to 24 bits.
TABLE I. MERITS AND DEMERITS OF VARIOUS STEGANOGRAPHY
Spatial
Domain
Merit
Small probability of degradation in
original image.
High hiding capacity
Demerit
Data may be lost when image is manipulated
It is easy to destroy data by simple
attacks
Transform
Domain
Merit
Much stronger technique
Data do not lost easily when image is
manipulated
Demerit
Low hiding capacity
Cannot resist attacks based on multiple
image processing techniques
Distortion
Domain
Merit
Message is encoded at pseudo-randomly
chosen pixels
Intended receiver can easily detect any
type of tampering
Demerit Requires knowledge about cover image
while decoding
Masking &
Filtering
Merit It is more robust than LSB replacement
Demerit It is applicable only to 24 bits gray scale
images
4. Steganalysis Steganalysis is the science of attacking steganography in order
to extract the hidden text message. It is achieved by applying
various image processing techniques such as image filtering,
Encryption
Process
Plaintext
Plaintext
Decryption
Process
Encryption Key Decryption Key
Ciphertext
Encryption
Process
Plaintext
Plaintext
Decryption
Process
Encryption Key Decryption Key
Ciphertext
Stego- Image
Stego Key
Message Cover image
Embedding
algorithm
Secret Key
Encryption
Algorithm
Chetna Mehto et al, Int.J.Computer Technology & Applications,Vol 5 (5),1711-1717
IJCTA | Sept-Oct 2014 Available [email protected]
1712
ISSN:2229-6093
cropping, rotating, translating etc. [3] or more deliberately by
coding a program that examines the stego image structure and
measures its statistical properties e.g., histograms and
correlations between pixels. In order to resist various types of
attacks, following security measures should be taken to
achieve effective stenganography:
a) For eliminating the attack of comparing the original image
file with stego image, where a very simple kind of
steganalysis is essential, one should create a cover image
and destroy it after generating the stego image. Cover
images from Internet are not advisable as an attacker might
utilize them for decoding the stego image.
b) Any alteration up to the 5th LSBs of a given pixel yields a
dramatic change in its intensity. To avoid any Human
visual perceptual attack, the generated stego image must
not have visual artifacts. c) Smooth homogeneous areas must be avoided whereas
chaotic with natural redundant noise background and
salient rigid edges should be targeted for embedding the
message. 5. Image Steganography Tools We analyzed 14 open source and 34 commercial
steganographic tools, which are mentioned in Table.2. It was
observed that JPEG and BMP are good choice to be used as
cover image for open source tools as 9 of these tools support
these image formats. The next popular format is GIF, where
Mandlesteg, GifShuffle and F5 are useful. Wnstorm and dc-
Steganograph embeds information with PCX files on the other
hand PGMStealth and OutGuess uses PGM and PNG formats
respectively. Most of these tools embed information using
spatial domain techniques i.e. by changing or replacing pixel
values, whereas F5, OutGuess and dc-Steganograph works in transform domain.
TABLE II. IMAGE STEGANOGRAPHIC TOOLS
Image stegano-
graphic tools JPEG BMP Other
Embeddin
g
Approach
Prod-
uction
Blindside Yes SDS Yes
Camera Shy Yes SDS Yes
dc-
Steganography PCX TDS
F5 Yes Yes GIF TDS Yes
Gif Shuffle GIF
Change
order of the
color map
Yes
Hide 4PGP Yes SDS Yes
JP Hide & Seek Yes SDS Yes
J steg J peg Yes SDS Yes
Mandelsteg GIF SDS Yes
Out Guess Yes PNG TDS Yes
PGM Stealth PGM Yes
Steghide Yes SDS Yes
wb Stego Yes SDS Yes
Wn Strom PCX Yes
6. Techniques used In this research we have used Advanced Encryption Standard
(AES) technique for encryption and decryption of text
message. We have used SHA-512 for calculating the hash
value for ensuring the integrity of hidden message.
a) Advanced Encryption Standard (AES)
It is a block cipher technique proposed by Joan Daemen and
Vincent Rijmen. This algorithm is very flexible in terms of
combination of data and key size, which can be either of 128,
192, or 256 bits. Conversely, AES requires that the plaintext
Expand Key
W[40,43]
Key Key
y
W [0,3]
W[4,7]
WKey
W [36, 39]
Key
Plaintext
Add Round Key
Subsitute bytes
Shift Rows
Mix Columns
Add Round Key
Subsitute bytes
Shift Rows
Add Round Key
Ciphertext
Subsitute byte
Shift Rows
Mix Columns
Add Round Key
Plaintext
R
ound 1
Round 9
Round 1
0
Round 1
0
Round 9
R
ound 1
Add Round Key
Inverse Substitute Bytes
Inverse Shift Rows
Add Round Key
Ciphertext
Inverse Mix Columns
Add Round Key
Inverse Substitute Bytes
Inverse Shift Rows
Inverse Mix Columns
Add Round Key
Inverse Substitute Bytes
Inverse Shift Rows
Chetna Mehto et al, Int.J.Computer Technology & Applications,Vol 5 (5),1711-1717
IJCTA | Sept-Oct 2014 Available [email protected]
1713
ISSN:2229-6093
must be 128 bits long, which can further be separated into four
operational blocks. These blocks operate on an array made up
of bytes arranged in a 4×4 matrix known as state. During
encryption, data passes through N number of rounds (N = 10,
12, 14). These rounds perform following transformations on the data:
Fig 3 AES Encryption Algorithm
Sub byte Transformation: This includes a non linear byte
substitution using a substitution table called s-box, which is
constructed by employing affine transformations and multiplicative inverse.
Shift rows transformation: It is an extremely simple yet quite
powerful byte transposition method where the bytes in last 3
rows of a state are shifted cyclically and offset of the left shift
is varied by 1 to 3 bytes.
Mix columns transformation: It It is similar to applying
multiplication of different columns in a matrix. Every column
vector is multiplied with the fixed matrix. It should be noted
that the bytes are calculated as polynomials, instead of
numbers.
Add round key transformation: It is a simple XOR operation
of state with the round key. This transformation has its own
inverse.
Inverse Substitute Bytes: It is the exact reverse process of
substituting byte transformation, where the inverse s-box
transformation is applied over every byte of the state. It can be
obtained by calculating inverse of the affine transformation
followed by multiplicative inverse.
Inverse Shift rows: It is an inverse operation of the shift rows
transformation. The first row of any state array remains
unaltered, and the bytes on second, third and forth rows are
shifted cyclically by one, two and three bytes respectively
towards right.
Inverse Mix columns: Each column in the state array is
considered as a polynomial. After multiplying modulo x4+1
with a fixed polynomial, the corresponding column of output state is obtained.
b) Secure Hash Algorithm-512(SHA-512)
SHA512 is a cryptographic hash functions developed by U.S.
National Security Agency (NSA) in 2001. Cryptographic hash
functions are sort of mathematical operations that operate on
digital data. When the hash value of received message is
compared with that of original message, the authenticity of the
data can be determined. For example calculating a hash over
the downloaded software and analyzing the result by
comparing it with the hash result published by the developer
one can decide the genuineness of that software and weather it
is safe to run or not. Besides this, it is about impractical for an attacker to reverse engineer and recreate the data.
Fig.4 Generation of SHA-512 message digest
The SHA-512 compression function shown in Fig.4, is the
heart of this algorithm. It processes the message in 1024-bit
(128-word) blocks using a module that consists of 80 rounds.
Each round takes 512-bit buffer value as input, and updates the
contents of buffer. Each round makes use of a 64-bit value
derived using a message schedule from the current 1024-bit
block being processed. Each round makes use of an additive
constant based on the fractional parts of the cube roots of first
eighty prime numbers. The output of eightieth round is
supplied as input to the first round to produce final hash value
for a message block. The resulting block forms the input for
next iteration of compression function.
7. Related Work Hemalatha et al. [4] proposed an image steganography
technique to hide multiple secret images and keys in color
cover image using Integer Wavelet Transform (IWT). Authors
claim that there is no visual difference between the
stegoimage and cover image, also a very good PSNR (Peak
Signal to Noise Ratio) values obtains for both stego images.
Shamim Ahmed Laskar et al. [5] proposed a high capacity
data embedding approach by the combination of
Steganography and cryptography. In this process, a message is
first encrypted using transposition cipher method and then the
+ = word by word addition (mod 264)
1024
bits
1024
bits
1024
bits
IV=
H0
512 H1 H2
1024 1024
HN=
Hash
Code
1024
F + F + F +
128
bits
M1 M2
Message
Nx1024 bits
L bits
100..0
MN
L
Chetna Mehto et al, Int.J.Computer Technology & Applications,Vol 5 (5),1711-1717
IJCTA | Sept-Oct 2014 Available [email protected]
1714
ISSN:2229-6093
encrypted message is embedded inside an image using LSB
insertion method. The authors claim that combination of these
two methods enhances the security of the data embedded, and
this combinational methodology satisfies the requirements
such as capacity, security and robustness for secure data
transmission over an open channel.
Usha B.A. et al. [6] proposed a neural network based
technique for steganography. The amount of data that can be
hidden inside the cover image chosen depends on the
properties of the image like number of noisy pixels. The
neural network based image steganography ensures that
quality and size of the image remains same after embedding
the data.
Current trend in steganalysis generally suggests two extreme
approaches (a) little or no statistical assumption about the
image under investigation, where statistics are learned using a
large database of training image and (b) a parametric model is
assumed for the image and its statistics are computed for
steganalysis detection. P. T. Anitha et al. [4] developed a new
hybrid approach, which comprises of neural network and S-
DES encryption scheme which is used to detect the stego
content in corporate mails. For this purpose, authors
implemented the combination of compression, encryption, and
steganography to enhance the security of the data sent and
steganalysis methods.
Inderjeet Kaur et al. [8] proposed a transform domain based
technique with the aid of segmentation and watermarking
(TDSSW) that combines steganography and watermarking to
provide copyright protection to the information being
transmitted secretly. The carrier (cover image) is segmentated
into 8×8 blocks and Discrete Cosine Transform (DCT) is
applied on each segment. The MSB of payload is embedded
into DCT coefficients of the cover image based on the values
of DCT coefficients to obtain the stego image. Authors claim
that this technique is capable to improve peak signal to noise
ratio.
In [9], authors Atallah et al. proposed a method that hides the
secret message based on searching about the identical bits
between the secret messages and image pixels values. They
claimed that this technique works better as compared to LSB.
They also claim that the proposed technique is efficient, simple
and fast it robust to attack and improve the image quality,
which obtains an accuracy ratio of 83%.
Pragya Agarwal et al. [10] proposed a scheme under which, a
SHA-1 hash code is generated from original text message,
which is sent to the receiver through a secure channel. The
receiver can authenticate the received hash to ensure the
integrity of the original message. The message is sent to receiver by hiding it into an image using image steganography.
Soumik Das et al. [11] proposed a technique in which, a 32-bit
secret key is provided by encrypter, which is applied on the
text with a hash function to generate a pseudo byte stream. This
stream is written directly to image pixels and thus the text
becomes physical property of encrypted image. An intruder
cannot succeed if he tries to perform the extraction of text with
a wrong secret key. The extraction of the text is blind i.e. except the secret key nothing is required for text decryption.
In [12], Rinu Tresa et al. came up with a technique that
combines both steganography and cryptography so that
attacker doesn’t know about the existence of message and the
message itself is encrypted to ensure more security. The textual
data entered by the user is encrypted using AES algorithm.
After encryption, the encrypted data is stored in the colour
image by using a hash based algorithm. This technique does
not corrupt images quality in any form. Its major advantage is
that it is suitable for almost all image formats such as
JPEG/JPG, BMP, TIFF and GIFF.
Kritika Singla et al. [13] proposed a scheme that achieves high
embedding capacity and enhances the quality of the encoded
image. It first detects the edges in the image by well known
canny edge method and then the hash sort is employed to
embed the text data in to the edges of the color image. The
hash function provides a secure and fast approach for image
steganography.
Seongho Cho et al.[14] proposed A block-based image
steganalysis system and conducted extensive performance
evaluation of block-based image steganalysis. They studied the
performance of block-based steganalysis by varying different
parameters, including block number, block size, effects of
block overlapping, class number of block, classifier choice and
the decision fusion scheme. It was practically seen that the
performance of block-based image steganalysis is not much
sensitive to the decision fusion approach but more responsive to classifier choice.
Firas A. Jasim[15] proposed a novel method for steganography
which is based on FMM method The stego images obtained
has been tested using PSNR value. Author analysed the PSNR
value and proved that the stego images are having high PSNR,
the ST-FMM novel steganography algorithm is very effective
in hiding the information inside an image.
Dr. Ekta Walia et al.[16] proposed LSB & DCT based
Steganography to calculated the PSNR ratio. Result reveal that
PSNR ratio for DCT based steganography scheme is higher
than LSB based steganography scheme for various types of
images. They have also shown that as DCT based
steganography scheme has the minimum distortion of image
quality, so DCT is preferred over LSB steganography scheme
inspite the fact that amount of secret data that can be hidden
using this technique is quite small.
Deepesh Rawat et al. [17] proposed a technique for hiding text
information in color images. They improved the well known
LSB method, they chose Bitmap and JPEG image formats, and
calculated PSNR, MSE (Mean Squared Error) and histogram.
Results showed that on increasing the size of cover image, a
large amount of secret information can be embedded. It is
because only a single bit of every pixel gets changed, and only
Chetna Mehto et al, Int.J.Computer Technology & Applications,Vol 5 (5),1711-1717
IJCTA | Sept-Oct 2014 Available [email protected]
1715
ISSN:2229-6093
minor changes in histogram are observed hence stego image is visually identically same as was the original cover-image.
8. Proposed Work In the work proposed by Soumik Das et al. [11], it was not so
hard for an attacker to generate a ciphertext and hash code of a
new plaintext and replace them both. The entire problem was
due to the reason that attacker can have access to both
ciphertext and the hash code separately. We propose a solution
to this problem by mingling up the hash code and ciphertext,
and then embedding them in a single image so that it becomes
very hard for an attacker to separate them and replace. On the
one hand, proposed algorithm will benefit the sender and
receiver as they will not need to send two different files.
Whereas on the other hand, it will be much more difficult for
the attacker to break the algorithm as he cannot separate the
ciphertext and hash code. The proposed technique makes use
of the AES algorithm. The AES is more resistant towards
differential and linear cryptanalysis as a bit flip at some point
quickly propagates to the complete internal state AES [18] due to the fact that:
AES is highly desirable for large block size inputs.
AES is highly efficient, secure with high speed of encryption & decryption processes.
AES uses varying Key Length of 128 bits, 192 bits,
256 bits for each 128 bits input text block. Input is
processed in form of multiples of 128 bit blocks. At a time, each 128 bits block are feeds as a input.
AES uses four stages for each round except last round.
In the last round it uses only three stages to produce
128 bit encrypted cipher text.
Four stages are: Substitute Bytes, Shift Rows, Mix
Columns, and Add Round Keys. Last round uses three stages excluding Mix column stages.
The proposed work also uses SHA-512, which is a variant of
SHA-256 and is more cost effective to be computed as
compared to SHA-256 over a given size of data. The SHA-512
algorithm delivers a 50% performance improvement over SHA-
256 [19]. It is essentially a 512-bit block cipher algorithm,
which encrypts the intermediate hash value using the message
block. The key for the calculation of hash as SHA-512 has
following strengths:
Input message divided into multiple of 1024 bits of
block. Each 1024 further divides in 16 sub-blocks of 64 bits of each word size for proceeds.
Each round has 20 stages, and four such rounds are
carried out for performing 80 iterations to produce 512
bits of message digest as output.
SHA-512 uses eight 64 bits buffer’s to hold intermediate and final results.
The algorithm for the proposed steganography technique can be summarized as follow:
2) Initially, the secret information is provided as input, which
has to be sent over a vulnerable network.
3) AES encryption is applied over this information and the
result obtained is so called ciphertext.
4) Simultaneously SHA-512 is also applied on secret
information which produces the message digest (MD).
5) After this, a mixing algorithm is applied for mixing the
ciphertext and MD to produce a mingled code.
6) The resultant mingled code is then embedded into a cover
image and sent to the receiver end.
7) On receiving this stego image, the receiver dig up the
mingled code from the stego image and applies reverse
mix up algorithm to separate the cipher text and MD code.
8) AES decryption takes the ciphertext as input and produces
original secret message as output.
9) SHA-512 is applied on retrieved secret message to obtain
the new message digest (MD’).
10) Receiver compares the MD value with MD’, if the values
are equal then the received message is intact and has not
been altered.
9. Scope of the survey This paper briefly describes the concept of steganography and
its major types. Since each technique comes with its own weak
points hence the merits and demerits of available techniques
were also elaborated. The steganographic system leaves unique
patterns on the cover images and these patterns feats the
steganalyst. Hence the properties that an effective
steganography algorithm should possess are also elaborated in
this paper. After a long tenure of research in this area, there is
still a requirement for a robust and efficient steganography
technique that can overcome the demerits of existing
techniques.
REFERENCES
[1] Sandeep et al., “A Review on the Various Recent
Steganography Techniques,” IJCSN International Journal of
Computer Science and Network, Vol.2, No.6, Dec.2013,
pp.142-156. [2] Mehdi Hussain et al., “A Survey of Image Steganography
Techniques,” International Journal of Advanced Science and
Technology, Vol.54, May.2013, pp.113-124.
[3] Abbas Cheddad, “Digital Image Steganography: Survey and Analysis of Current Methods,” Elsevier, Signal Processing,
Vol.90, No.3, Mar.2010, pp.727–752.
[4] Hemalatha S et al. “A Secure and High Capacity Image
Steganography Technique,” Signal & Image Processing: An International Journal (SIPIJ) Vol.4, No.1, Feb.2013, pp.83-89.
[5] Shamim Ahmed Laskar et al., “High Capacity data hiding
using LSB Steganography and Encryption,” International Journal of Database Management Systems (IJDMS) Vol.4,
No.6, Dec.2012, pp.57-68.
[6] Usha B A et al., “Data Embedding Technique In Image
Steganography Using Neural Network,” International Journal
Chetna Mehto et al, Int.J.Computer Technology & Applications,Vol 5 (5),1711-1717
IJCTA | Sept-Oct 2014 Available [email protected]
1716
ISSN:2229-6093
of Advanced Research in Computer and Communication Engineering, Vol.2, No.5, May.2013, pp. 2177-2180.
[7] P. T. Anitha et al., “An Efficient Neural Network Based
Algorithm For Detecting Steganography Content In
Corporate Mails: A Web Based Steganalysis,” IJCSI International Journal of Computer Science Issues, Vol. 9,
No.1, May.2012, pp.509-513.
[8] Inderjeet et al., “Transform Domain Based Steganography
Using Segmentation And Watermarking,” International Journal of Computing and Business Research (IJCBR), Vol.4
No.1 Jan.2013.
[9] Atallah M. Al-Shatnawi, “A New Method in Image
Steganography with Improved Image Quality,” Applied Mathematical Sciences, Vol.6, No.79, 2012, pp.3907-3915.
[10] Pragya Agarwal et al., “Transmission and Authentication of
Text Messages through Image Steganography,” IJCA
Proceedings on 4th International IT Summit Confluence 2013, No.2, pp.16-20.
[11] Soumik Das et al., “A Secured Key-based Digital Text
Passing System through Color Image Pixels,” IEEE
International Conference On Advances In Engineering, Science And Management (ICAESM-2012), Mar.2012,
pp.320-325.
[12] Rinu Tresa et al. “A Novel Steganographic Scheme Based On
Hash Function Coupled With Aes Encryption,” Advanced Computing: An International Journal (ACIJ), Vol.5, No.1,
Jan.2014, pp.25-34.
[13] Kritika Singla et al., “Hash Based Approach For Secure Image Steganography Using Canny Edge Detection Method,”
IJCSC, Vol.3, No.1, Jan.-Jun.2012, pp.155-157.
[14] Seongho Cho et al. “Block-based image steganalysis: Algorithm and Performance evaluation,” J. Vis. Commun.
Image R .24( june 2013) Elsevier 846-856.
[15] Firas A. Jassim, “A Novel Steganography Algorithm for
Hiding Text in Image using Five Modulus Method,” International Journal of Computer Applications(IJCA),
Vol.72, No.17, June 2013.
[16] Dr. Ekta Walia et al. “An Analysis of LSB & DCT based
Steganography,” Global Journal of Computer Science & Technology,Vol.10 Issue1(Ver 1.0),April 2010.
[17] Deepesh Rawat et al. “Steganography Technique for Hiding
Text Information in Color Image Using Improved LSB
Method,” International Journal of Computer Applications (IJCA), Vol.67, No.1, April 2013.
[18] Gurpreet Singh et al “A Study of Encryption Algorithms
(RSA, DES, 3DES and AES) for Information Security”
International Journal of Computer Applications (IJCA), Vol.67, No.19, April 2013.
[19] Shay Gueron et al. “SHA-512/256” International Association
for Cryptologic Research.
Chetna Mehto et al, Int.J.Computer Technology & Applications,Vol 5 (5),1711-1717
IJCTA | Sept-Oct 2014 Available [email protected]
1717
ISSN:2229-6093