A Computational Approach of Highly Secure Hash Algorithm for Color Image Steganography Using Edge Detection and Honey Encryption Algorithm

  • Authors

    • K Dhanasekaran
    • P Anandan
    • A Manju
    2018-04-25
    https://doi.org/10.14419/ijet.v7i2.24.12056
  • Steganography, Advanced Encryption Algorithm, Encoding And Decoding.
  • Securing and transmitting data through images without being hacked is important in stegnography. Identification of the hidden data without the knowledge of appropriate algorithm is beyond bounds. In this paper we propose a highly secure algorithm for hiding data using advanced encryption algorithm, wherein the hidden data could be identified by canny edge detection and appropriate hash algorithm method. Color images are converted into grayscale images and edges are retrieved and honey encryption algorithm is used for encoding and decoding process. Simulated results in Matlab exhibits high security of the proposed method over other methods on comparison.

     

     

  • References

    1. [1] Abbas Cheddad, Joan Condell, Kevin Curran, Paul Kevitt, “Enhancing Steganography in Digital Imagesâ€. Proc. Canadian Conference on Computer and Robot Vision.

      [2] Alain,C.Brainos, “A study of Steganography and Art Of Hiding Information,†East Carolina University. International Journal Of Engineering And Computer Science ISSN: 2319-7242 Volume 4 Issue 8 Aug 2015,Page No. 13760-13764.

      [3] 3.Soumyendu Das, Subhendu Das, BijoyBandyopadhyay and SugataSanyal, “Steganography and Steganalysis: Different Approachesâ€.International Journal of Computers, Information Technology and Engineering (IJCITAE), Vol. 2, No 1, June, 2008.

      [4] NedeljkoCvejic and TapioSeppÄanen, “Increasing Robustness of LSB Audio Steganography by Reduced Distortion LSB

      [5] Codingâ€.Proc. International Conference on Image Processing, Rochester, NY, 641–644.

      [6] Domenico Bloisi and Luca Iocchi, “Image Based Steganography And Cryptographyâ€.VISAPP 2007: Proceedings of the Second International Conference on Computer Vision Theory and Applications, Barcelona, Spain, March 8-11, 2007 - Volume 1.

      [7] Pund-Dange, S. Desai, C.G. “Secured data communication system using RSA with mersenne primes and Steganographyâ€. Computing for Sustainable Global Development (INDIA Com), 2015 IEEE 2nd International Conference on 11-13 March 2015.

      [8] Ziguan Cui, ZongliangGan, Guijin Tang, Feng Liu, Xiuchang Zhu. “simple and effective image quality assessment based on edge enhanced mean square error†Wireless Communications and Signal Processing (WCSP), 2014 Sixth International IEEE conference on September 11 , 2014.

      [9] Yu-chi chen, chih-weishiu, gwoboahorng. “Encrypted signal-based reversible data hiding with public key cryptosystem†IEEE article Journal of visual communication and image representation, volume 25, issue 5, July 2014, pages 1164-1170.

      [10] MrithaRamalingam, Nor Ashidi Mat Isa, “Video steganography based on integer Har wavelet transforms for secured data transferâ€, Indian Journal of Science and Technology, Vol 7(7), 897904, July 2014.

      [11] Hemant Gupta, SetuChaturvedi, “Video Steganography through LSB Based Hybrid Approachâ€, IJCSNS International Journal of Computer Science and Network Security, VOL.14 No.3, March 2014.

      [12] PritishBhotmage et al, “Advance Video Steganography algorithmâ€, IJERA, Volume 4,Issue 6, June 2014, ISSN: 2277 128X.

      [13] Falesh M. Shelke1, Ashwini A. Dongre, Pravin D. Soni. “Comparison of different techniques for Steganography in images†International Journal of Application or Innovation in Engineering & Management Volume 3, Issue 2, February 2014.

      [14] Quynh Dang, “Recommendation for Applications Using Approved Hash Algorithmâ€, NIST special publication 800-107, Computer security Division, National Institute of Standards and Technology, Dept of commerce, USA, pp. 1-21, 2011.

      [15] Zhou Hua and Liu Qiao, “Hardware Design for SHA -1 Base d on FPGAâ€, IEEE International Conference Publications On Electronics, Communications and Control (ICECC), pp.2076-2078, 2011.

      [16] N.V Rao, J.TL Philjon, “Metamorphic Crypto- A Paradox between Cryptography and Steganography using Dynamic

      [17] Encryptionâ€, IEEE Xplore International Conference on Recent

      Trends in Information Technology, June 2011, pp. 217-222.

      [18] Cheng Xiao-hui and Deng Jian-zhi, “Design of SHA-1 Algorithm based on FPGAâ€, IEEE Second International Conference on Networks Security, Wireless Communications and Trusted Computing, (NSWCTC), Vol-1, pp. 532-534, 2010.

      [19] Data Hiding and Retrieval, A.Nath ,S.Das, A.Chakrabarti, Proceedings of IEEE International conference on Computer Intelligence and Computer Network held at Bhopal from 26-28 Nov, 2010.

      [20] Zhang Yun-peng, Liu Wei, Cao Shui-ping, Zhai Zheng-jun, Nie Xuan, Dai Wei-di, “Digital image encryption algorithm based on chaos and improved DESâ€, IEEE International Conference on Systems, Man and Cybernetics, 2009.

      [21] Neil F. Johnson, Sushil Jajodia, “Exploring Steganography: Seeing the Unseenâ€, IEEE, Feb1998, pp. 26-34.

      [22] S.V.Manikanthan and T.Padmapriya “Recent Trends In M2m Communications In 4g Networks And Evolution Towards 5gâ€, International Journal of Pure and Applied Mathematics, ISSN NO:1314-3395, Vol-115, Issue -8, Sep 2017.

      [23] S.V. Manikanthan , T. Padmapriya “An enhanced distributed evolved node-b architecture in 5G tele-communications network†International Journal of Engineering & Technology (UAE), Vol 7 Issues No (2.8) (2018) 248-254.March2018

      [24] T. Padmapriya and V. Saminadan, “Priority based fair resource allocation and Admission Control Technique for Multi-user Multi-class downlink Traffic in LTE-Advanced Networksâ€, International Journal of Advanced Research, vol.5, no.1, pp.1633-1641, January 2017.

  • Downloads

  • How to Cite

    Dhanasekaran, K., Anandan, P., & Manju, A. (2018). A Computational Approach of Highly Secure Hash Algorithm for Color Image Steganography Using Edge Detection and Honey Encryption Algorithm. International Journal of Engineering & Technology, 7(2.24), 239-242. https://doi.org/10.14419/ijet.v7i2.24.12056