International Journal of Research Studies in Computer Science and Engineering (IJRSCSE) Volume 2, Issue 4, April 2015, PP 28-33 ISSN 2349-4840 (Print) & ISSN 2349-4859 (Online) www.arcjournals.org ©ARC Page 28 Secure Data Hiding Himanshu Chhabra B.E Student/Dept. of Computer Engineering Shah & Anchor Kutchhi Engineering College Mumbai University Mumbai, India himanshu.chhabra9304@gmail.com Dhiraj Thakur B.E Student/Dept. of Computer Engineering Shah & Anchor Kutchhi Engineering College Mumbai University Mumbai, India dhiraj_thakur37@yahoo.in Riddhi Thacker B.E Student/Dept. of Computer Engineering Shah & Anchor Kutchhi Engineering College Mumbai University Mumbai, India riddhi_thacker@yahoo.com Rupali Kale Asst. Prof./Dept. of Computer Engineering Shah & Anchor Kutchhi Engineering College Mumbai University Mumbai, India kalerupalis@gmail.com Abstract: Steganography is an ability of concealing information inside the cover in such a way it looks like simple cover. The goal is data hiding without much deteriorating the quality of the picture under consideration and successfully retrieve the data when needed. This approach focuses first on encrypting the secret data and then hiding the existence of the cipher so that any attacker would never know that a secret message is being passed over the insecure channel. This hiding is done using steganographic technique using image as a cover media. In this method, secret data is initially encrypted using Advance Encryption Standard (AES) and steganography scheme is used for hiding the cipher text into a grey cover image. The encryption key is sent securely through the exposed insecure channel using Diffie-Hellman Key Exchange Protocol. On reception of the stego-image, it undergoes extraction process. The extraction model is actually the reverse of the embedding model. The stego-image is resulable. Keywords: Steganography AES, Cover Image, Stego-Image, Key Exchange Protocol. 1. INTRODUCTION Data hiding [1] using image steganography is the process to hide secret data into a selected cover media. The proposed technique has been applied to various test images and gives a Peak Signal to Noise Ratio above 49 dB and the stego image was successfully reused to hide new secret data [1, 2].Generally the types of media used as cover are text, images, videos etc [6]. The technique used is lossless and the image under consideration is reusable. To increase the security the message is first encrypted using Advance Encryption Standard technique. The encrypted data is then embedded into the cover image. The key used in AES [9] technique will be shared between the sender and the receiver using Diffie Hellman Key Exchange Protocol. The system block diagram is as shown below: Figure.1 Block Diagram of the System