Advertisement

Analysis of Existing Text Hiding Algorithms for Image Steganography Using TLNUS and AES

  • Jagadish GurralaEmail author
  • P. Sanyasi Naidu
Conference paper
Part of the Smart Innovation, Systems and Technologies book series (SIST, volume 77)

Abstract

In the last few years, many researchers putting many efforts for getting good data hiding algorithms which was complex in design and undergo rigorous investigation on starting from secret text sizes ranges from 4 kB to 1 MB file has been embedded in it so far for the sake of more secure communication among mobile nodes and local area networks. As of now, several steganographic concepts were conceived on data hiding approaches deployed in insecure channel. In this paper, authors designed new data hiding algorithm approach proposed based on three protection layers has been used to maintain secrecy of the embedded message in a true color image. Here, the data is embedded randomly instead of sequentially by an image segmentation algorithm that uses two-level non-uniform segmentation. Advanced encryption standard algorithm has been used to encrypt the secret text. Different performance measures from the experimental results have shown the reasonable prototype of the proposed steganography algorithm. The result after comparing the proposed algorithm and the wide spectrum of steganographic schemes confirm that the stego image with medium perception ratio has been reached even if the stego image holds a large amount of data with good visual quality and working under jpeg and gray-scale images and also resistant to statistical and visual problems.

Keywords

Steganography AES Data hiding process 

Notes

Acknowledgements

The authors would like to thank Dr. S.C. Satapathy, Professor and Director (R&D), Anil Neerukonda Institute of Technology and Sciences, Visakhapatnam, for his great effort in helping to shaping the paper and proof reading the manuscript, and for making numerous helpful suggestions.

References

  1. 1.
    Johnson, N.F., Jajodia, S.: Exploring steganography: seeing the unseen. IEEE Comput. 31(2), 26–34 (1998)CrossRefGoogle Scholar
  2. 2.
    El-Emam, N.: Hiding a large amount of data with high security using steganography algorithm. J. Comput. Sci. 3(4), 32–223 (2007). doi: https://doi.org/10.3844/jcssp.2007.223.232
  3. 3.
    El-Emam, N.: Embedded a large amount of information using high secure neural based steganography algorithm. Int. J. Inf. Commun. Eng. 4(2), 95–106 (2008)MathSciNetGoogle Scholar
  4. 4.
    Sanyasi, P., Naidu, J.G.: Investigation and Analysis of Location Based Authentication and Security Services of Wireless LAN’s and Mobile Devices. published in IJCA, 146(8) (ISBN: 973-93-80893-84-7, July (2016)Google Scholar
  5. 5.
    El-Emam, N.: New Data-Hiding Algorithm Based on Adaptive Neural Networks with Modified Particle Swarm Optimization. Elsevier (2013)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  1. 1.Department of CSEAnil Neerukonda Institute of Technology and SciencesVisakhapatnamIndia
  2. 2.Department of CSEGITAM Institute of Technology GITAM UniversityVisakhapatnamIndia

Personalised recommendations