International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 6 Issue: 4 267 - 277 ______________________________________________________________________________________ 267 IJRITCC | April 2018, Available @ http://www.ijritcc.org _______________________________________________________________________________________ Web Service Deployment for Selecting a Right Steganography Scheme for Optimizing Both the Capacity and the Detectable Distortion R. Pavithra PG Scholar, Department of IT, P.S.V. College, Krishnagiri, India R.Srinivasan Head of the Department, Department of IT, P.S.V. College, Krishnagiri, India V.Saravanan Assistant Professor, Department of IT, P.S.V. College, Krishnagiri, India ABSTRACT: The principal objective of this effort is to organize a network facility to hide the secret information in an image folder without disturbing its originality. In the literature lot of algorithms are there to hide the information in an image file but most of it consumes high resource for completing the task which is not suitable for light weight mobile devices. Few basic algorithms like 1LSB, 2LSB and 3LSB methods in the literature are suitable for mobile devices since the computational complexity is very low. But, these methods either lack in maintaining the originality of the source image or in increasing the number of bits to be fixed. Furthermore, every algorithm in the literature has its own merits and demerits and we cannot predict which algorithm is best or worst since, based on the parameters such as size of the safety duplicate and encryption algorithm used to generate the cipher text the steganography schemes may produce best or worst result with respect to computational complexity, capacity, and detectable distortion. In our proposed work, we have developed a web service that takes cover image and plain text as the input from the clients and returns the steganoimage to the clients. The steganoimage will be generated by our proposed work by analyzing the above said parameters and by applying the right steganography scheme. The proposed work helps in reducing the detectable distortion, computational complexity of the client device, and in increasing the capacity. The experimental result says that, the proposed system performs better than the legacy schemes with respect to capacity, computational complexity, and detectable distortion. This proposed work is more useful to the client devices with very low computational resource since all the computational tasks are deployed in the server side. __________________________________________________*****_________________________________________________ 1. Introduction Steganography is mainly focused on hiding of asecret communication withinaregular communication and the abstraction of it at its purpose. Steganography can be used along cryptography a footstep by hiding a coded message so that no one respondents it occurs. Preferably, if someone scan your data will fail to know it contains codeddata. The systems can be functional to images, a video file or an audio file that can be an extra-secure method in which to protect data. Steganography can be used for top- secret communications that contract with terroristplans Data can be stolen and encrypted through a file transfer or in many way through email. In ancient Greece, a message would be written on a wooden panel and then covered in wax. These and other methods of hiding communications are nothing compared to what we can do today with the advent of computer technology. It is now so much easier to hide information and so much harder to detect it. Steganography defends from exciting copyrighted materials as well as aiding in unauthorized viewing. It must be encrypted, which can be nearly impossible. As an industry we are moving towards the encryption of data on our laptops and desktops and through our computer security policies we block the writing of data to our USB devices, any employee can use the corporate network to send out anything they wish through email. Many companies employ a type of email monitoring which scans the email for key expressions to try to detect if someone is sending out knowledgeable property other companies will block the sending of word or excel documents and allow only PDF documents to be sent out.This prevents fake actions and gives copyright protected media secured filed with extra protection. Steganography code is an art of hiding one communication in additionalmissive, here it‟s the art of hiding text in the image. Data Safety is becoming an extremely significant part of Information Communication. Steganography is datasecurity ariskystatementnetwork is one of the most challenging issues. Cryptography and steganography, a punishment of data hiding, are two different popular security offering methods.Security organizationscontain both cryptography and steganography in their working code. To handle up with those systems, we have proposed a format-based pure text steganography system including a private key cryptography providing a higher level of security. The protectionscript has been made as normal as imaginable. After successful embedding of the secret note into the protectionscript, the stego-text also looks like an ordinary text because only an alphanumeric puzzle is added at the end of the cover text to make up the stego- text.Increasing the growth of the communication segments the higher level of security of data has become one of the basic needs for transmitting information over the unsecured