Image Steganography using Password Based Encryption Technique to secure e-banking Data

Similar documents
International Journal of Advance Engineering and Research Development IMAGE BASED STEGANOGRAPHY REVIEW OF LSB AND HASH-LSB TECHNIQUES

A Steganography Algorithm for Hiding Secret Message inside Image using Random Key

A SECURE IMAGE STEGANOGRAPHY USING LEAST SIGNIFICANT BIT TECHNIQUE

Analysis of Secure Text Embedding using Steganography

A New Image Steganography Depending On Reference & LSB

Chapter 3 LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING COMPRESSED ENCRYPTED DATA USING VARIOUS FILE FORMATS

Dynamic Collage Steganography on Images

IMAGE STEGANOGRAPHY USING MODIFIED KEKRE ALGORITHM

Exploration of Least Significant Bit Based Watermarking and Its Robustness against Salt and Pepper Noise

An Enhanced Least Significant Bit Steganography Technique

Hiding Image in Image by Five Modulus Method for Image Steganography

A Proposed Technique For Hiding Data Into Video Files

Investigation of Various Image Steganography Techniques in Spatial Domain

Steganography using LSB bit Substitution for data hiding

HSI Color Space Conversion Steganography using Elliptic Curve

Sterilization of Stego-images through Histogram Normalization

Image Quality Assessment for Defocused Blur Images

Comparative Analysis of Hybrid Algorithms in Information Hiding

A Reversible Data Hiding Scheme Based on Prediction Difference

Effect of Embedding Multiple Watermarks in Color Image against Cropping and Salt and Pepper Noise Attacks

Secure Image Steganography using N-Queen Puzzle and its Comparison with LSB Technique

Watermarking patient data in encrypted medical images

Image Steganography with Cryptography using Multiple Key Patterns

Block Wise Data Hiding with Auxilliary Matrix

Basic concepts of Digital Watermarking. Prof. Mehul S Raval

ScienceDirect. A Novel DWT based Image Securing Method using Steganography

Improved RGB -LSB Steganography Using Secret Key Ankita Gangwar 1, Vishal shrivastava 2

Sunil Karforma Associate Professor Dept. of Computer Science The University of Burdwan Burdwan, West Bengal, India

Data Hiding Technique Using Pixel Masking & Message Digest Algorithm (DHTMMD)

IMPROVED LSB BASED IMAGE STEGANOGRAPHY USING RUN LENGTH ENCODING AND RANDOM INSERTION TECHNIQUE FOR COLOR IMAGES

An Integrated Image Steganography System. with Improved Image Quality

Keywords Secret data, Host data, DWT, LSB substitution.

LSB Encoding. Technical Paper by Mark David Gan

Effective and Secure Method of Color Image Steganography

Colored Digital Image Watermarking using the Wavelet Technique

Digital Image Watermarking using MSLDIP (Modified Substitute Last Digit in Pixel)

International Journal of Advance Research in Computer Science and Management Studies

AN IMPROVED LSB METHOD OF STEGANOGRAPHY WITH JPEG COLORED IMAGE

A Comprehensive Review on Secure Image Steganography

A Secure Image Encryption Algorithm Based on Hill Cipher System

A Novel Image Steganography Based on Contourlet Transform and Hill Cipher

Concealing Data for Secure Transmission and Storage

DESIGNING EFFICIENT STEGANOGRAPHIC ALGORITHM FOR HIDING MESSAGE WITHIN THE GRAYSCALE COVER IMAGE

Vernam Encypted Text in End of File Hiding Steganography Technique

<Simple LSB Steganography and LSB Steganalysis of BMP Images>

CYCLIC COMBINATION METHOD FOR DIGITAL IMAGE STEGANOGRAPHY WITH UNIFORM DISTRIBUTION OF MESSAGE

Image Compression and Decompression Technique Based on Block Truncation Coding (BTC) And Perform Data Hiding Mechanism in Decompressed Image

Image Steganography using Sudoku Puzzle for Secured Data Transmission

A Novel Approach for Hiding Huge Data in Image

Image Quality Estimation of Tree Based DWT Digital Watermarks

FPGA Implementation of Secured Image STEGNOGRAPHY based on VIGENERE CIPHER and X BOX Mapping Techniques

A Novel Implementation of Color Image Steganography Using PVD

International Journal of Advanced Research in Computer Science and Software Engineering

Modified Skin Tone Image Hiding Algorithm for Steganographic Applications

Implementation of Effective, Robust and BPCS Data Embedding using LSB innovative Steganography Method

AN ENHANCED EDGE ADAPTIVE STEGANOGRAPHY APPROACH USING THRESHOLD VALUE FOR REGION SELECTION

VARIABLE-RATE STEGANOGRAPHY USING RGB STEGO- IMAGES

Enhance Image using Dynamic Histogram and Data Hiding Technique

ORIGINAL ARTICLE A COMPARATIVE STUDY OF QUALITY ANALYSIS ON VARIOUS IMAGE FORMATS

A New Steganographic Method Based on the Run Length of the Stego-Message. Eyas El-Qawasmeh and Alaa Alomari

Comparative Histogram Analysis of LSB-based Image Steganography

Genetic Algorithm to Make Persistent Security and Quality of Image in Steganography from RS Analysis

Data Hiding Using LSB with QR Code Data Pattern Image

An Implementation of LSB Steganography Using DWT Technique

Enhancement of Information Hiding in Audio Signals with Efficient LSB based Methods

Implementation of Block based Mean and Median Filter for Removal of Salt and Pepper Noise

Hiding And Encrypting Binary Images Using A Different Approach

A Secure Robust Gray Scale Image Steganography Using Image Segmentation

MODBIT ALGORITHM BASED STEGANOGRAPHY ON IMAGES

High-Capacity Reversible Data Hiding in Encrypted Images using MSB Prediction

Embedding and Extracting Two Separate Images Signal in Salt & Pepper Noises in Digital Images based on Watermarking

A Study on Steganography to Hide Secret Message inside an Image

Medical Image Encryption and Compression Using Masking Algorithm Technique

Compendium of Reversible Data Hiding

An Improved Edge Adaptive Grid Technique To Authenticate Grey Scale Images

Chapter 4 MASK Encryption: Results with Image Analysis

A New Compression Method for Encrypted Images

Introduction to More Advanced Steganography. John Ortiz. Crucial Security Inc. San Antonio

A Review on Image Fusion Techniques

STEGO-HUNTER :ATTACKING LSB BASED IMAGE STEGANOGRAPHIC TECHNIQUE

An Efficient Neural Network based Algorithm of Steganography for image

International Conference on Advances in Engineering & Technology 2014 (ICAET-2014) 48 Page

Design and Implementation of Game Based Security Model to Secure the Information Contents

ENHANCED SECURITY SYSTEM USING SYMMETRIC ENCRYPTION AND VISUAL CRYPTOGRAPHY

A Novel (2,n) Secret Image Sharing Scheme

Exploiting the RGB Intensity Values to Implement a Novel Dynamic Steganography Scheme

LOSSLESS CRYPTO-DATA HIDING IN MEDICAL IMAGES WITHOUT INCREASING THE ORIGINAL IMAGE SIZE THE METHOD

A Lossless Large-Volume Data Hiding Method Based on Histogram Shifting Using an Optimal Hierarchical Block Division Scheme *

Meta-data based secret image sharing application for different sized biomedical

ENHANCED SECURITY SYSTEM FOR REAL TIME APPLICATIONS USING VISUAL CRYPTOGRAPHY

Data Security Using Visual Cryptography and Bit Plane Complexity Segmentation

Image Steganography by Variable Embedding and Multiple Edge Detection using Canny Operator

Image Compression Supported By Encryption Using Unitary Transform

An Overview of Image Steganography Techniques

Reversible Data Hiding in Encrypted color images by Reserving Room before Encryption with LSB Method

New High Capacity Secure Steganography Technique

An adaptive row-column least significant bit inlay approach for image steganography.

International Journal of Computer Techniques - Volume 3 Issue 5, Sep - Oct 2016

Reversible data hiding based on histogram modification using S-type and Hilbert curve scanning

Amalgamation of Cyclic Bit Operation in SD-EI Image Encryption Method: An Advanced Version of SD-EI Method: SD-EI Ver-2

Transcription:

International Journal of Applied Engineering Research ISSN 973-4562 Volume 13, Number 22 (218) pp. 15477-15483 Image Steganography using Password Based Encryption Technique secure e-banking Data Atanu Sarkar 1, Sunil Karforma 2 1,2 Dept. of computer Science,University of Burdwan,West Bengal,India Corresponding author Abstract e-banking is the essential financial transaction system via online. It is required keep the financial data intact and secure from the intruder. In this paper we have applied password based encryption technique on image Steganography secure e-banking data. Cusmer should require registration through personal data along with user_id and password access one s account and it requires eight characters for password preparation. Image is segmented in eight non overlapping blocks for embedding secret information. Eight characters are required form block key for eight consecutive blocks. Message bits are encrypted with block key using XOR method and embedded eight bit per pixel in RGB cover On the receiver side images are authenticated by password and retrieve message using XOR technique. Keywords: Steganography, XOR, LSB, IQM INTRODUCTION We are living in information age where large amount of valuable information is communicating through internet. Our goal is that how secure the information from unwanted intruder. In this digital world people are getting habituated with e-banking transaction through internet. People are getting various services through e Banking such as opening an account, money transfer from one account another account, bill payment, product purchasing etc. So, cusmer information has be secured during the transaction through internet. Crypgraphy and steganography are the two method by which we can provide the security of information. Crypgraphy [1, 2], a word with Greek origins, means Secret writing. We use the term refer the science and art of transforming messages make them secure and immune attack. Although in the past crypgraphy referred only the encryption and decryption of messages using secret keys, day it is defined as involving three distinct mechanisms : symmetric-key encipherment, asymmetric-key encipherment and hashing. Steganography [3,4] is an art of concealment of information through different cover media such as audio, video, text and Image steganography is a method where large amount of information is sred in images keeping its visual quality intact with original Image steganography is applied in two domain spatial domain and frequency domain. Our proposed method is focused in spatial domain with colour LITERATURE REVIEW Simple LSB substitution method There are lot of research work has carried on LSB method [6, 7].Chan al et al. [5] has proposed a simple LSB substitution method. In this LSB method secret data are directly embedded in least significant bit positions of cover Major advantageous of LSB method is that it is easy implement and archive high capacity. But one of the main drawback of this method is it is vulnerable slight image manipulation like cropping, compression. Manjula et.al [6] has applied hashing technique embed the secret with different bit position in colour cover They have used 2-3-3 bit for red, blue and green pixels. They have archived good capacity of secret bit as well as slight increase of security rather than simple LSB method. Sarkar and Karforma [7] have tried improve the security level by applying a new pixel selection technique. Here embedding has started at middle region of an image and successive diagonal pixels have selected form quadrilateral through which secret data are inserted in pixels. Pixel differencing method Wu and Tsai [8] have proposed high capacity embedding method using pixel differentiation method. In this paper pixels image are divided in some blocks containing two consecutive pixels. Calculate the intensity difference between two consecutive pixels and modifies the pixel differences of each block (pair) for embedding data bit. A larger pixel difference allows greater modification in original pixel. In extraction phase, original range table is necessary portioned of stego image by the same method as used cover Tsang and Leng [9] have proposed a steganographic method based on PVD and perfect square number. In this paper before embedding secret data, the function Nearest_PerfectSquare () is defined find the nearest perfect square number for difference of two consecutive pixels. The function Nearest_PerfectSquare () returns the nearest perfect square number which is the range number of difference of two consecutive pixels. According range number, the secret data is embedded in the cover image by the embedding procedure. This method has achieved high capacity than Wu and Tsai method. 15477

International Journal of Applied Engineering Research ISSN 973-4562 Volume 13, Number 22 (218) pp. 15477-15483 Grey level modification method Potdar et al.[1] has introduced Grey Level Modification method which is used map the data by modifying grey level s of image pixels.glm method use odd even technique for embedding data in pixels. They have used mathematical function for selection of pixels and modify all odd pixels even by incrementing one for representing one. To represent 1, modify the appropriate pixel by decrementing its grey level by one. The processes of retrieval are completely opposite that of embedding. Pixel Mapping Method Bhattacharyya and Sanyal [11] proposed a new image transformation technique in known as Pixel Mapping Method (PMM), a method for information hiding within the spatial domain of an Embedding pixels are selected based on some mathematical function which depends on the pixel intensity of the seed pixel and its 8 neighbours are selected in counter clockwise direction. Before embedding a checking has been done find out whether the selected embedding pixels or its neighbours lies at the boundary of the image or not. Data embedding are done by mapping each two or four bits of the secret message in each of the neighbour pixel based on some features of that pixel. blocks for embedding secret information. Eight characters are required form block key for eight consecutive blocks. Message bits are encrypted with block key using XOR method and embedded eight bit per pixel in RGB cover Our proposed work has been described in followings subsections. E-Banking registration Cusmer should register his account by following steps. Step1: Visit the authentic e-banking Website. Step 2: Open registration page and fill up registration form by giving his/her personal information. Step 3: Put userid and eight character password. Step 4: Submit the form. Segment an image in blocks Segment the image in eight non overlapping blocks and generate block key with help of password. Figure 1 depicts an image with eight blocks with password atanu123. Steganography using encryption Method Various encryption techniques have been applied on Steganography increase the security level of message bit. Kaur and Pooja [12] have applied XOR encryption method for embedding secret message bit in video cover media. In this method1 random frames are selected on the basis of 1 digit secret key. The secret message is encrypted using XOR encryption make it secure. From receiver side message is extracted using secret key and combined with XOR technique. Panghal et al. [13] has proposed image Steganography using AES encryption technique. Here data are encrypted using AES method and inserted in pixels using LSB method. Desmukh et al. [14] has introduced new Steganographic technique using double layer security by AES and DES method. Our proposed method based on LSB Steganography using encryption technique where secret information are encrypted with user password and embedded in cover image using LSB method. PROPOSED METHOD Our proposed method may be applied on e-banking environment where cusmers transact various secure financial documents through internet.we have applied password based encryption technique on image Steganography secure e- Banking data. Cusmer should require registration through personal data along with user_id and password access one s account and it requires eight characters for password preparation. Image is segmented in eight non overlapping Block1Key a Block2key t Block3key a Block4key n Block5key u Block6key 1 Block7key 2 Block8key 3 Figure 1. Segmentation of an image with password atanu123 Encryption Technique using XOR method XOR is the simplest method for encryption of message and convert it in cipher text. Cipher Text = XOR (Message, block key) Consider a message Bank which is embedded in 1st block with key a. Message: B a n k ASCII : 11 111 11111 11111 Block key (a): 111 111 111 111 After xor : 1 1111 11 LSB Steganography Method: After encryption the cipher text has been embedded using LSB Steganography method. We have applied 3-3-2 15478

International Journal of Applied Engineering Research ISSN 973-4562 Volume 13, Number 22 (218) pp. 15477-15483 combination for embedding cipher text in R, G and B pixels of an image and have achieved capacity of eight bit per pixel. Sender side algorithm: Step 1: Register any authentic e-banking website using userid and eight character password. Step 2: Step 3: Step 4: Step 5: Step 6: Segments the image in eight consecutive non overlapping blocks. Generate block key using password. Encrypt the message using XOR method. Embeds the encrypted message using LSB Steganography. finally stego image is transmitted through channel. Receiver side algorithm: Step 1: Stego image is received by receiver. Step 2: Step 3: Step 4: Step 5: Step 6: Step 7: put the correct password by receiver if sever send any information registered cusmer or use password at server side accesses cusmer request when it comes from cusmer server end. Segments the image in eight consecutive non overlapping blocks. Generate block key using password. Retrieve the encrypted message from the Decrypt the message using XOR method. Construct the original message. IMAGE QUALITY MATRICES In the development of image processing algorithms, IQM (Image Quality Measurement) plays an important role. To evaluate the performance of processed image, IQM can be utilized. Image Quality is defined as a characteristic of an image that measures the processed image degradation by comparing an ideal We have considered following image quality parameters. Mean square error (MSE) In statistics, the mean squared error (MSE) [15] of an estimar (of a procedure for estimating an unobserved quantity) measures the average of the squares of the errors that is, the average squared difference between the estimated s (Stego image) and what is estimated (cover image). MSE is a risk function, corresponding the expected of the squared error loss. The fact that MSE is almost always strictly positive (and not is because of randomness or because the estimar does not account for information that could produce a more accurate estimate. The MSE is a measure of the quality of an estimar it is always non-negative, and s closer zero are better. MSE= 1 M N (I MN I MN=Stego Image I MN=Cover Image M=512, N=512. i=1 j=1 MN IMN) 2 Root-mean-square error (RMSE) The root-mean-square error (RMSE) [15] is a frequently used measure of the differences between s (sample or population s) predicted by a model or an estimar and the s observed. RMSE= MSE Normalized Root-mean-square error (RMSE) Normalizing the RMSE [15] facilitates the comparison between datasets or models with different scales. Though there is no consistent means of normalization in the literature, common choices are the mean or the range (defined as the maximum minus the minimum ) of the measured data. NRMSE= RMSE MAX(I) MIN(I) Here I is the cover Structural Similarity Index (SSIM) SSIM [15] is used for measuring the similarity between two images. The SSIM index is a full reference metric; in other words, the measurement or prediction of image quality is based on an initial uncompressed or disrtion-free image as reference. SSIM is designed improve on traditional methods such as peak signal--noise ratio(psnr) and mean squared error (MSE). The resultant SSIM index is a decimal between -1 and 1, and 1 is only reachable in the case of two identical sets of data. The SSIM metric is calculated on various windows of an The measure between two images x and y of common size N x N is: (2 x y C(2 xy C2) 2 2 2 2 x y C1 x y C2 SSIM ( xy, ) ( )( ) Where μ x, μ y, σ x,σ y, and σ xy are the local means, standard deviations, and cross-covariance for images x, y. C 1=(k 1L) 2 and C 2=(k 2L) 2.Two variables stabilize the division with weak denominar. L is the dynamic range of the pixel-s k 1=.1 andk 2=.3 and by default. 15479

International Journal of Applied Engineering Research ISSN 973-4562 Volume 13, Number 22 (218) pp. 15477-15483 Entropy Image entropy [16] is an important indicar for evaluating the richness of image information; it represents the property of combination between images. The larger the combination entropy of an image, the richer the information contained in the The entropy of an image is L 1 H=- i= p i log 2 p i Where H is the entropy, L is the overall gray-scales of image, pi is the probability of gray level i. We calculate entropy difference using the following formula H diff = H stego O riginal H original= Entropy of original H stego=entropy of stego H diff=entropy difference between stego image and original Cross Correlation Normalized cross correlation [16] is the simplest but effective method as a similarity measure, which is invariant linear brightness and contrast variations. NC (Normalized Cross Correlation) measures the comparison of the processed image and reference NC is expressed as follows: NC= [(a(i,j) Mean(a)][b(i,j) Mean(b)] squrt( [(a(i,j) Mean(a)] 2 [b(i,j) Mean(b)] 2 ) Average s AD [16] is simply the average of difference between the reference signals (x (i, j)) and test image(y (i, j)). It is given by the equation AD= 1 M MN i=1 Maximum N j=1 ( x(i, j) y(i, j)) MD [16] is the maximum of the error signal (difference between the reference signal and test image). MD=MAX x (i, j) y (i, j) Mean Absolute percentage Error MAPE [16] is average percentage of absolute difference between the reference signal and test It is given by the following equation. MAPE = 1 M MN i=1 N j=1 x(i,j) y(i,j) x(i,j) Structural Content (SC) SC [16] is also correlation based measure and measures the similarity between two images. Structural Content (SC) is given by the following equation. SC= M i=1 N j=1 ( y(i,j)2 ) M i=1 N j=1 ( x(i,j)2 ) Normalized Absolute Error This quality measure can be expressed as follows. NAE = M i=1 N j=1 x(i,j) y(i,j) M N i=1 j=1 x(i,j) A higher NAE [16] shows that image is of poor quality. R 2 The coefficient of determination or R 2 [16] is a statistic that will give some information about the goodness of fit of a model. In regression, the R 2 coefficient of determination is a statistical measure of how well the regression predictions approximate the real data points. An R 2 of 1 indicates that the regression predictions perfectly fit the data. R 2 = 1- M i=1 N (x(i,j) y(i,j))2 j=1 M i=1 N j=1 x(i,j)2 RESULT AND ANALYSIS We have selected two BMP colour images of size namely Leena and Pepper for experiment and have considered different image quality parameter for analysis of our proposed method. Table1 and Table2 shows image quality parameters with variable message size. We can compare of different image quality parameters with their best from Table1 and Table2. Original image with its stego image has shown in Figure 1 and Figure 2. In Table 4 and Table 5 we also compare the performance of our proposed method with existing PVD [8], GLM [1], PMM [11] method in terms of PSNR and capacity. Figure3 and Figure 4 shows hisgram analysis of cover image with stego s of image quality parameters are very close their best with message size 5 byte and 1 byte. But s of image quality parameter with message size 2 and 262144 are slightly deviated with their best. From Table5 and table6 we have seen that our proposed method has archived better result than existing PVD, GLM, and PMM method in terms of PSNR and capacity. From hisgram analysis we say that stego images with massage size 5 byte and 1 byte are very similar that of selected cover images. Our proposed method works best with message size less than or equal 1 byte. 1548

International Journal of Applied Engineering Research ISSN 973-4562 Volume 13, Number 22 (218) pp. 15477-15483 Table1: Different Image quality parameters with variable message size of Leena cover Image Leena Image Quality Parameter Message size MSE PSNR RMSE NRMSE MAPE SSIM Entropy Cross Correlation Average Maximum Structural Content Absolute Error 5.6586 49.9444.8116.39.3892.9967.54.9989.128 7 1.22.3.9999 1 1.3243 46..9111 1.158.55.8641.9932.59 1.2.2667 4.9958.6.9999 2 2.7159 43.79 1.648.79 1.6671.9864.236.9954.5664 7 1.91.121.9997 262144 3.574 3.574 42.636.91 2.434.9824.3817.9937.7266 6 1.12.159.9997 Best (Close (>4) ( close (close ( close + zero R 2 ( close Peeper Message size Table2: Different Image quality parameters with variable message size of Pepper cover Image MSE PSNR RMSE NRMSE MAPE SSIM Entropy Image Quality Parameter Cross Correlation Average Maximum Structural Content Absolute Error R 2 5.6567 49.95.391.15.9967.95.9991.1154 6 1.17.24.9999 1 1.337 46.979 1.1418.51.863.9926.542.9984.239 6 1.32.48.9999 2 2.678 43.8526 1.6365.72 1.4987.9872.2235.9961.5529 6 1.77.97.9998 262144 3.5392 42.6456 1.8813.83 1.8837.9833.3856.9949.6941 7 1.12.128.9998 Best (Close (>4) ( close (close ( close + zero ( close Cover Image Stego Image with variable message size Message Size 5 1 2 262144 Figure 1. Cover image and stego image with variable message size for Leena Cover Cover Image Stego Image with variable message size Message Size 5 1 2 262144 Figure 2. Cover image and stego image with variable message size for Pepper Cover Message Size 3 5 1 2 262144 (peeper) 2 1 1 2 3 2 1 1 2 3 2 1 1 2 3 2 1 1 2 3 2 1 1 2 Figure 3. Hisgram analysis of cover image and stego image with variable message size for Leena image Message Size 5 1 2 262144 (peeper) 3 2 1 1 2 3 2 1 1 2 3 2 1 1 2 Figure 4. Hisgram analysis of cover image and stego image with variable message size for Peeper image 3 2 1 1 2 3 2 1 1 2 15481

International Journal of Applied Engineering Research ISSN 973-4562 Volume 13, Number 22 (218) pp. 15477-15483 8 6 4 2 5byte 1byte 2byte 262144byte Figure 5. 2D column analysis of various image quality parameters for Leena 8 6 4 2 5byte 1byte 2byte 262144byte Figure 6. 2D column analysis of various image quality parameters for Peeper image Table 4. Capacity comparison of proposed method with existing method Image name & size Leena Peeper PVD[8] GLM[1] PMM[11[ Proposed Method 596 32768 963 262144 5685 32768 93184 262144 Table 5. PSNR comparison of proposed method with existing method Image name & size Leena Peeper CONCLUSIONS PVD[8] GLM[1] PMM[11] Proposed Method 41.79 35.2 33.83 42.6 41.73 34.6 33.86 42.64 Our Block based Steganography method has achieved better result than existing one in terms of PSNR and capacity. Our proposed method will be applied with two aspects. First one where high security data are transacted through internet we can embed small amount of message (less than information in stego But where large amount information (less secure) transacted through internet such as print saving statement, we can apply our proposed method with message size greater than 1 lakh byte. Our proposed method can be applied on document associated with e- governance, e-commerce, e-learning etc where valuable information is transacted through internet. REFERENCES [1] Forouzan B. A., Data Communication and Networking,MacGraw Hill Education ( India) Private Limited. [2] Provos N, Honeyman P, Hide and Seek: An Introduction Steganography, IEEE Security and Privacy, Vol. 1, No. 3, pp. 32 44,23. [3] Kumar A, Pooja M. K., Steganography a Data Hiding Technique, International Journal of Computer Applications, Vol-9,No-7,Nov 21. [4] Bender W, Gruhl D, Morimo N, Lu A., Techniques for data hiding, IBM Systems Journal Vol. 35(3-4),pp. 313-336, 1996. [5] Chan. C.K. and Cheng L.M., Hiding data in images by simple lsb substitution. Pattern Recognition, 37:469 474, 24. [6] Manjula G.R.,Danti A., A novel hash based LSB (2-3-3) image Steganography in spatial domain, International Journal of Security, Privacy and Trust Management (IJSPTM) Vol. 4, No 1, February 215. [7] Sarkar A., Karforma S., A new pixel selection Technique of LSB based steganography for data hiding,ijrcs, Vol-5,Issue-3,pp.12-125,March 218. [8] Wu C.D., Tsai H.W., A Steganographic method for images by pixel- differencing, Pattern Recognition Letters, Vol. 24, pp. 1613-1626, 23. [9] Tseng W.H. and Leng S.H., A Steganographic Method Based on Pixel- Differencing and the Perfect Square Number, Hindwai Journal of Applied Mathematics, Vol. 213, 213. [1] Potdar V. and Chang E. Gray level modification steganography for secret communication. In IEEE 15482

International Journal of Applied Engineering Research ISSN 973-4562 Volume 13, Number 22 (218) pp. 15477-15483 International Conference on Industria linformatics., pages 355 368, Berlin, Germany, 24. [11] Bhattacharyya S. and Sanyal G., Hiding data in images using pixel mapping method (pmm). In Proceedings of 9th annual Conference on Security and Management (SAM) under The 21 World Congress in Computer Science, Computer Engineering, and Applied Computing(World Comp 2, LasVegas,USA, July 12-15,21. [12] Kaur R. and Pooja, XOR Encryption Based Video Steganography, IJSR, Vol. 4, Iss. 11,pp. 1467-1471,Nov 215 [13] Panghal S., Kumar S. and Kumar N., Enhanced Security of Data using Image Steganography and AES Encryption Technique, IJCA Proceedings on Recent Trends in Future Prospective in Engineering and Management Technology RTFEM 216(:1-4, July 216 [14] Deshmukh E., Dangle J., Ghadi S, Kewat S. and Shewale K, Image Steganography-Hiding Data within Image, Vol.5,Iss.1,jun 216. [15] Varnan S. C., Jagan A., Kaur J., Jyoti D., Rao S.D., Image Quality Assessment Techniques in Spatial Domain, IJCST, Vol. 2, Iss. 3, September 211. [16] Memon F.,Unar A,M. and Memon S., Image Quality Assessment for Performance Evaluation of Focus Measure Operars,MURJET, Vol. 34, No. 4, Ocber 215. 15483