Analysis of Existing Text Hiding Algorithms for Image Steganography Using TLNUS and AES

被引:0
作者
Gurrala, Jagadish [1 ]
Naidu, P. Sanyasi [2 ]
机构
[1] Anil Neerukonda Inst Technol & Sci, Dept CSE, Visakhapatnam, Andhra Pradesh, India
[2] GITAM Univ, GITAM Inst Technol, Dept CSE, Visakhapatnam, Andhra Pradesh, India
来源
SMART COMPUTING AND INFORMATICS | 2018年 / 77卷
关键词
Steganography; AES; Data hiding process;
D O I
10.1007/978-981-10-5544-7_1
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In the last few years, many researchers putting many efforts for getting good data hiding algorithms which was complex in design and undergo rigorous investigation on starting from secret text sizes ranges from 4 kB to 1 MB file has been embedded in it so far for the sake of more secure communication among mobile nodes and local area networks. As of now, several steganographic concepts were conceived on data hiding approaches deployed in insecure channel. In this paper, authors designed new data hiding algorithm approach proposed based on three protection layers has been used to maintain secrecy of the embedded message in a true color image. Here, the data is embedded randomly instead of sequentially by an image segmentation algorithm that uses two-level non-uniform segmentation. Advanced encryption standard algorithm has been used to encrypt the secret text. Different performance measures from the experimental results have shown the reasonable prototype of the proposed steganography algorithm. The result after comparing the proposed algorithm and the wide spectrum of steganographic schemes confirm that the stego image with medium perception ratio has been reached even if the stego image holds a large amount of data with good visual quality and working under jpeg and gray-scale images and also resistant to statistical and visual problems.
引用
收藏
页码:1 / 11
页数:11
相关论文
共 5 条
  • [1] El-Emam N., 2008, INT J INF COMMUN ENG, V4, P95
  • [2] El-Emam N., 2013, NEW DATA HIDING ALGO
  • [3] Exploring steganography: Seeing the unseen
    Johnson, NF
    Jajodia, S
    [J]. COMPUTER, 1998, 31 (02) : 26 - +
  • [4] Naidu J.G, 2016, IJCA, V146
  • [5] Nameer NEE., 2007, J COMPUTER SCI, V3, P223, DOI [10.3844/jcssp.2007.223.232, DOI 10.3844/JCSSP.2007.223.232]