Loading

Dual Protectıon for Data usıng Steganographıc Technıques with Embedded Framework
T. R. Kowshika1, K. Geetha2
1T.R. Kowshika, Department of Embedded Systems, SASTRA Deemed to be University, Thanjavur (Tamil Nadu), India.
2K.Geetha, Department of CSE, SASTRA University, Thanjavur (Tamil Nadu), India.
Manuscript received on 25 August 2019 | Revised Manuscript received on 01 September 2019 | Manuscript Published on 14 September 2019 | PP: 155-159 | Volume-8 Issue-5S3, July 2019 | Retrieval Number: E10370785S319/19©BEIESP | DOI: 10.35940/ijeat.E1037.0785S319
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: As the world is getting digitalized, the rush for need of secured data communication is overtop. Provoked by the vulnerability of human visual system to understand the progressive changes in the scenes, a new steganography method is proposed. The paper represents a double protection methodology for secured transmission of data. The original data is hidden inside a cover image using LSB substitution algorithm. The image obtained is inserted inside a frame of the video producing a stego-video. Stego-video attained is less vulnerable to attacks. After decryption phase, the original text is obtained which is error-free and the output image obtained is similar as the cover image. The quality of stego-video is high and there is no need for additional bandwidth for transmission. The hardware implement is required in order to calculate the corresponding analytical results. The proposed algorithm is examined and realized for various encryption standards using Raspberry Pi3 embedded hardware. The results obtained focuses on the attributes of the proposed model. On comparing with other conventional algorithms, the proposed scheme exhibits high performance in both encryption and decryption process with increase in efficiency of secured data communication.
Keywords: Data Hiding, Data Security, Steganography.
Scope of the Article: Patterns and Frameworks