Analysis of Existing Text Hiding Algorithms for Image Steganography Using TLNUS and AES
In the last few years, many researchers putting many efforts for getting good data hiding algorithms which was complex in design and undergo rigorous investigation on starting from secret text sizes ranges from 4 kB to 1 MB file has been embedded in it so far for the sake of more secure communication among mobile nodes and local area networks. As of now, several steganographic concepts were conceived on data hiding approaches deployed in insecure channel. In this paper, authors designed new data hiding algorithm approach proposed based on three protection layers has been used to maintain secrecy of the embedded message in a true color image. Here, the data is embedded randomly instead of sequentially by an image segmentation algorithm that uses two-level non-uniform segmentation. Advanced encryption standard algorithm has been used to encrypt the secret text. Different performance measures from the experimental results have shown the reasonable prototype of the proposed steganography algorithm. The result after comparing the proposed algorithm and the wide spectrum of steganographic schemes confirm that the stego image with medium perception ratio has been reached even if the stego image holds a large amount of data with good visual quality and working under jpeg and gray-scale images and also resistant to statistical and visual problems.
KeywordsSteganography AES Data hiding process
The authors would like to thank Dr. S.C. Satapathy, Professor and Director (R&D), Anil Neerukonda Institute of Technology and Sciences, Visakhapatnam, for his great effort in helping to shaping the paper and proof reading the manuscript, and for making numerous helpful suggestions.
- 2.El-Emam, N.: Hiding a large amount of data with high security using steganography algorithm. J. Comput. Sci. 3(4), 32–223 (2007). doi: https://doi.org/10.3844/jcssp.2007.223.232
- 4.Sanyasi, P., Naidu, J.G.: Investigation and Analysis of Location Based Authentication and Security Services of Wireless LAN’s and Mobile Devices. published in IJCA, 146(8) (ISBN: 973-93-80893-84-7, July (2016)Google Scholar
- 5.El-Emam, N.: New Data-Hiding Algorithm Based on Adaptive Neural Networks with Modified Particle Swarm Optimization. Elsevier (2013)Google Scholar