Main Article Content

Abstract

The main goal of reversible data hiding algorithms is to embed the secret information in cover image and recover it back successfully. So we have implemented two methods. In first method, cover image is encrypted using stream cipher and pseudo randomly generated key and compressed using haar wavelet compression. The encrypted compressed image acts as a media for hiding secret image. And in second method, secret image is encrypted using randomly generated key and it is hidden in cover image. In both the method data hiding is done using LSB based image steganography. At the receiver, reverse process is done to extract secret image and recover cover image. At the end, we conclude that second method gives better security of image compared to method one.

Keywords

Image encryption steganography and reversible data hiding.

Article Details

How to Cite
Singh, S. B., Naik, A. K., Dwivedi, P., & Patil, S. (2015). ANALYSIS OF DATA HIDING ALGORITHMS FOR IMAGE SECURITY. International Journal of Students’ Research in Technology & Management, 3(5), 350–354. https://doi.org/10.18510/ijsrtm.2015.352

References

  1. S.I. Rosaline and C. Rengarajaswamy, “Reversible data hiding technique for stream ciphered and wavelet compressed image,†Department of Electronics and Communication Engineering Oxford Engineering College, IEEE 2013. DOI: https://doi.org/10.1109/ICPRIME.2013.6496504
  2. X. Zhang,“Reversible Data Hiding in encrypted image,†IEEE Signal Processing letters, vol. 18, no. 4, April 2011. DOI: https://doi.org/10.1109/LSP.2011.2114651
  3. T. Morkel and J.H.P. Eloff, M.S. Olivier, “An overview of image steganography,†ISCA Research Group, University of Pretoria.
  4. P. Murali and G. S Kumar, “Modified version of playfair cipher using linear feedback shift register†IJCSNS international journal of computer science and network security, vol.8, no.12, December 2008. DOI: https://doi.org/10.1109/ICIME.2009.86
  5. S. Channalli and A. Jadhav, “Steganography an art of hiding data,†International Journal on Computer Science and Engineering Vol. 1(3), 2009.
  6. Z. Ni, Yun-Qing Shi, N. Ansari, and W. Su, “Reversible Data Hiding,†IEEE Transactions On Circuits And Systems For Video Technology, Vol. 16, No. 3, March 2006. DOI: https://doi.org/10.1109/TCSVT.2006.869964