International Journal of Research Studies in Computer Science and Engineering (IJRSCSE)
Volume 2, Issue 4, April 2015, PP 28-33
ISSN 2349-4840 (Print) & ISSN 2349-4859 (Online)
www.arcjournals.org
©ARC Page 28
Secure Data Hiding
Himanshu Chhabra
B.E Student/Dept. of Computer Engineering
Shah & Anchor Kutchhi Engineering College
Mumbai University
Mumbai, India
himanshu.chhabra9304@gmail.com
Dhiraj Thakur
B.E Student/Dept. of Computer Engineering
Shah & Anchor Kutchhi Engineering College
Mumbai University
Mumbai, India
dhiraj_thakur37@yahoo.in
Riddhi Thacker
B.E Student/Dept. of Computer Engineering
Shah & Anchor Kutchhi Engineering College
Mumbai University
Mumbai, India
riddhi_thacker@yahoo.com
Rupali Kale
Asst. Prof./Dept. of Computer Engineering
Shah & Anchor Kutchhi Engineering College
Mumbai University
Mumbai, India
kalerupalis@gmail.com
Abstract: Steganography is an ability of concealing information inside the cover in such a way it looks
like simple cover. The goal is data hiding without much deteriorating the quality of the picture under
consideration and successfully retrieve the data when needed. This approach focuses first on encrypting the
secret data and then hiding the existence of the cipher so that any attacker would never know that a secret
message is being passed over the insecure channel. This hiding is done using steganographic technique
using image as a cover media. In this method, secret data is initially encrypted using Advance Encryption
Standard (AES) and steganography scheme is used for hiding the cipher text into a grey cover image. The
encryption key is sent securely through the exposed insecure channel using Diffie-Hellman Key Exchange
Protocol. On reception of the stego-image, it undergoes extraction process. The extraction model is
actually the reverse of the embedding model. The stego-image is resulable.
Keywords: Steganography AES, Cover Image, Stego-Image, Key Exchange Protocol.
1. INTRODUCTION
Data hiding [1] using image steganography is the process to hide secret data into a selected cover
media. The proposed technique has been applied to various test images and gives a Peak Signal to
Noise Ratio above 49 dB and the stego image was successfully reused to hide new secret data [1,
2].Generally the types of media used as cover are text, images, videos etc [6]. The technique used
is lossless and the image under consideration is reusable. To increase the security the message is
first encrypted using Advance Encryption Standard technique. The encrypted data is then
embedded into the cover image. The key used in AES [9] technique will be shared between the
sender and the receiver using Diffie Hellman Key Exchange Protocol. The system block diagram
is as shown below:
Figure.1 Block Diagram of the System