A Robust Hybrid Algorithm for Image Steganography
DOI:
https://doi.org/10.26438/ijcse/v8i2.5968Keywords:
Image Steganography, Slant let Transformation, PSNR, MSEAbstract
Image Steganography is the mechanism of hiding the critical information on the segment of the image that can either be least significant or most significant in nature. Image Steganography involves multiple images that are merged together to achieve a common image that is transferred over a digital medium. Proposed system uses slant let transformation to achieve better result of image security in terms of accuracy. Accuracy is achieved by minimising mean square error and improving peak signal to noise ratio.
References
[1] C. Science and S. Engineering, “Steganography Digital Images : A Hybrid Approach,” vol. 5, no. 5, pp. 1778–1785, 2015.
[2] P. Parmar and N. Jindal, “Image Security with Integrated Steganography and Encryption 1 1 2,” vol. 9, no. 3, pp. 24–29, 2014.
[3] T. Bathinda, “Invisible Video Multiple Steganography Using Optimized Techniques,” 2016.
[4] R. T. Mohammed and B. E. Khoo, “Image Steganography using slantlet transform,” ISIEA 2012 - 2012 IEEE Symp. Ind. Electron. Appl., pp. 281–286, 2012.
[5] R. K. Sheth and V. V. Nath, “Secured digital image Steganography with discrete cosine transform and discrete wavelet transform method,” 2016 Int. Conf. Adv. Comput. Commun. Autom., pp. 1–5, 2016.
[6] R. V Mahule, “Analysis of Image Security Techniques using Digital Image Steganography in Spatial Domain,” no. Nckite, pp. 19–26, 2015.
[7] Z. J. Xu, Z. Z. Wang, and Q. Lu, “Research on Image Steganography Algorithm based on DCT,” vol. 10, pp. 1129– 1135, 2011.
[8] A. U. Islam, F. Khalid, M. Shah, Z. Khan, T. Mahmood, A. Khan, U. Ali, and M. Naeem, “An improved image steganography technique based on MSB using bit differencing,” 2016 6th Int. Conf. Innov. Comput. Technol. INTECH 2016, pp. 265–269, 2017.
[9] V. Saravanan and A. Neeraja, “Security issues in computer networks and stegnography,” 7th Int. Conf. Intell. Syst. Control. ISCO 2013, pp. 363–366, 2013.
[10] P. Singhai and A. Shrivastava, “An efficient Image Security mechanism based on Advanced Encryption Standard,” no. 13, 2015.
[11] S. S. Gonge, “An Integration of SVD Digital Image Steganography with AES Technique for Copyright Protection and Security of Bank Cheque Image,” pp. 769–778, 2016.
[12] Q. Chen, H. Hu, and J. Xu, “Authenticated Online Data Integration Services,” pp. 167–181.
[13] J. Singh and A. K. Patel, “An Effective Telemedicine Security Using Wavelet Based Steganography,” pp. 2–7, 2016.
[14] M. Rizal, M. Isa, and S. Aljareh, “A Steganography technique to improve the security level in face recognition systems,” Multimed. Tools Appl., 2016
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
