Improving Two-Layer Data Security in Image Steganography

Authors

  • Kaur A Deparatment of Computer Engineering, Punjabi University Patiala, Patiala, India Deparatment of Computer Engineering, Punjabi University Patiala, Patiala, India
  • Kaur J Deparatment of Computer Engineering, Punjabi University Patiala, Patiala, India Deparatment of Computer Engineering, Punjabi University Patiala, Patiala, India

DOI:

https://doi.org/10.26438/ijcse/v6i8.587591

Keywords:

Canny Edge Detection, RECTANGLE, PSNR, Multi-Layer Security

Abstract

In this paper, two security layers are added on the data using cryptography and steganography algorithms. The data is encrypted using lightweight RECTANGLE algorithm. Next, the data is hiding is done using steganography algorithm. In the steganography scheme, the edges of the cover image are determine using Canny Edge detection technique which can extract inclusive range of edges. Further, worked on theory of color which plane is more suitable for maximum/minimum data hiding. The encrypted data is splitted into 3:2:3 ratio and hide in the edges of the RGB plane simultaneously. The performance analysis is done based on PSNR and embedding capacity. The experimental results show that the Improved technique is secure, consume lesser area, less embedding capacity, and provide high PSNR. Further, data extraction is possible without communicating any extra information with stego image

References

[1] Rajendran, Sujarani, and ManivannanDoraipandian. "Chaotic Map Based Random Image Steganography Using LSB Technique." International Journal of Network Security, vol. 19, no. 4, pp. 593-598, 2017.

[2] Amrital Singh and Harpal Singh, “An improved LSB based image steganography technique for RGB images,” IEEE International Conference on Electrical, Computer and Communication Technologies, August 2015.

[3] Panghal, Sandeep, Sachin Kumar, and Naveen Kumar. "Enhanced Security of Data using Image Steganography and AES Encryption Technique." International Journal of Computer Applications Recent Trends in Future Prospective in Engineering & Management Technology 2016.

[4] Patel, Komal, SumitUtareja, and Hitesh Gupta. "Information hiding using least significant bit steganography and blowfish algorithm." International Journal of Computer Applications, vol. 63, no. 13, 2013.

[5] Ramaiya, Manoj, Naveen Hemrajani, and Anil Kishore Saxena. "Secured steganography approach using AES." International Journal of Computer Science Engineering and Information Technology Research (IJCSEITR), vol. 3, pp. 185-192, 2013.

[6] Zhang, Wentao, et al. "RECTANGLE: a bit-slice lightweight block cipher suitable for multiple platforms." Science China Information Sciences vol. 58, no.12, pp. 1-15, 2015.

[7] Li, Li, et al. "A color Images steganography method by multiple embedding strategy based on Sobel operator." 2009 International Conference on Multimedia Information Networking and Security. IEEE, 2009.

[8] Bassil, Youssef. "Image steganography based on a parameterized canny edge detection algorithm." arXiv preprint arXiv:1212.6259, 2012.

[9] Chen, Wen-Jan, Chin-Chen Chang, and T. Hoang Ngan Le. "High payload steganography mechanism using hybrid edge detector." Expert Systems with applications, vol. 37, no. 4, pp. 3292-3301, 2010.

[10] Goodarzi, Mahdi Hassani, ArashZaeim, and Amir Shahab Shahabi. "Convergence between fuzzy logic and steganography for high payload data embedding and more security." Telecommunication Systems, Services, and Applications (TSSA), 2011 6th International Conference on. IEEE, 2011.

[11] Kousik Dasgupta, J.K. Mandal, and Paramartha Dutta, “Hash based Least Significant Bit Technique for Video Steganography,” International Journal of Security, Privacy, and Trust Management, vol. 1, pp. 1-11, April 2012.

[12] Debiprasad Bandyopadhyay, Kousik Dasgupta, J.k. Mandal, Paramartha Dutta, “A Novel Secure Image Steganography Method Based on Chaos Theory in Spatial Domain,” International Journal of Security, Privacy, and Trust Management, vol. 3, pp. 11-22, February 2014.

[13] G. R. Manjula and AjitDanti, “A Novel Hash Based Least Significant Bit (2-3-3) Image Steganography in Spatial Domain,” International Journal of Security, Privacy, and Trust Management, vol. 4, pp. 11-20, Februry2015.

[14]http://sipi.usc.edu/database/database.php?volume=misc&image=13#top

[15] Muhammad, Khan, et al. "Image steganography for authenticity of visual contents in social networks." Multimedia Tools and Applications, vol. 76, no. 18, pp. 18985-19004, 2017.

Downloads

Published

2025-11-15
CITATION
DOI: 10.26438/ijcse/v6i8.587591
Published: 2025-11-15

How to Cite

[1]
A. Kaur and J. Kaur, “Improving Two-Layer Data Security in Image Steganography”, Int. J. Comp. Sci. Eng., vol. 6, no. 8, pp. 587–591, Nov. 2025.

Issue

Section

Research Article