A Secure Framework for Communicating Multimedia Data in Cover Images using Hybrid Steganography Algorithms in Wireless Local Area Network
-
Published:2019-12-30
Issue:2S3
Volume:9
Page:35-43
-
ISSN:2278-3075
-
Container-title:International Journal of Innovative Technology and Exploring Engineering
-
language:en
-
Short-container-title:IJITEE
Abstract
This paper presents a critical analysis on new and original proposed algorithm based on hiding any data has been used that overcomes the disadvantages of the existing algorithms and helps to provide less similarity between cover image and stego image and obtain accuracy upto 69.6 percentage and increases its robustness using metrics called mean square error and peak signal to noise ratio. In the wireless environment cryptography suffers from various spyware programs that shows corrupted secret information to innocent users who uses image steganography services from user. In our proposed prototype helps to authenticate the sender to make the unnoticeable image from original image. In our proposal work discovers a secure authentication communication model would able to cover multimedia data like first text to be hide, second image to be hide and third audio secret data to be hide in cover image without much noticed to any user in between network. The proposed algorithm has been tested against various existing algorithms to develop how effectively the hybrid steganography algorithm is works, and how effectively it is overcoming the drawbacks of the present image steganography algorithms. The present work is projected to serve the purpose of prevention of changing secret data in cover image after evaluating the distraction values using PSNR and RMSE quality metrics under various image data set taken from facebook shared images . In the scientific investigation, researchers found that three reasons to show that given secure communication is successfully designed with the help of hybrid steganography algorithm that could break attackers intention using TLNUS merged with AES and Key based positioning system[4] gain access the sensitive information available in remote system
Publisher
Blue Eyes Intelligence Engineering and Sciences Engineering and Sciences Publication - BEIESP
Subject
Electrical and Electronic Engineering,Mechanics of Materials,Civil and Structural Engineering,General Computer Science
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Hiding Region of Interest in Image using Fuzzy Logic;Journal of Physics: Conference Series;2021-09-01