Loading

Efficient Approach for Steganography Using DWT and RSA Algorithm
Ambika1, Rajkumar L Biradar2, Vishwanath Burkpalli3

1Ambika, Assistant Professor, Department of CSE, APPA Institute of Engineering and Technology, Kalaburagi (Karnataka), India.
2Dr. Rajkumar L Biradar, Professor, Department of Electronics and Telematics, G. Narayanamma Institute of Tech & Science, Hyderabad (Telangana), India.
3Dr. Vishwanath Burkpalli, Professor, Department of ISE, PDA College of Engineering Kalaburagi (Karnataka), India.

Manuscript received on 18 June 2019 | Revised Manuscript received on 25 June 2019 | Manuscript published on 30 June 2019 | PP: 1435-1443 | Volume-8 Issue-5, June 2019 | Retrieval Number: E7351068519/19©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Steganography is the mechanism of masking (i.e. hiding) the available data in other transmission area to achieve secure and secret transmission of data. Steganography is much secured technique and can also be applied for various file formats (Ex: Image, Video, Audio, text etc.). Several steganogrphic mechanisms are available for secret data or information hiding utilizing images. Steganography is one of the best data transmission method including security and privacy and it is utilizing in so many applications. In those applications, few applications require complete secret data invisibility and some applications require a big secret message hiding. This steganogrphic technique masks the secret or private data into the cover image. Transmission of secret information securely without data loss in the communication system inspired us to develop a proposed communication system. This proposed technique mainly comprises of two sections i.e. data transmission section and data extraction section. In data transmission section, sensitive data (i.e. secret data) is pre-processed and encrypted utilizing RSA technique or algorithm mean while preprocessing of cover image is performed and knight tour technique is utilized to make path for knight. Finally encrypted sensitive (secret)information or data is embedding with cover image utilizing DWT (Discrete Wavelet Transform). Similarly in the receiver section i.e. data extraction section, data is extracted by applying inverse transformation and RSA algorithm, hence resulting in secure transmission.
Keywords: Image Steganography, Encryption, Cover Image, Dwt, Rsa. Stego Image,

Scope of the Article: Image Processing