International Journal for Research in Applied Science & Engineering Technology (IJRASET) ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 6.887 Volume 6 Issue VIII, August 2018- Available at www.ijraset.com 375 © IJRASET: All Rights are Reserved Secure Communication with Steganography Data Isolation and Analysis S. Johnrexamalan 1 , R. Saravanan 2 1 Research Scholar, SCSVMV University, Enathur, Kanchipuram (Tamil Nadu) 2 Assistant Professor, SCSVMV University, Enathur, Kanchipuram (Tamil Nadu) Abstract: Steganography, the craft of concealing messages inside different messages, from security enhanced by cryptography. Presently, steganography is picking up "reputation" with ongoing CIA reports prompting its utilization by psychological oppressor’s gatherings and other sorted out wrongdoing syndicates in proclaiming the exchange of mystery data over unmistakable channels to stay away from identification. The point of this paper is to introduce a scholarly research into the field of steganography, or information covering up, as it is some of the time known. And also analyzing the stegano image by using existing forensic tools. We describe method of steganography based on embedding encrypted message bits using AES Algorithm in the 1st least significant (LSB Technique) and last 4 significant bits (Modulus 4 bit technique – LZW Algorithm) of the pixel of image. Here we also provide integrity using MD5 hash algorithm. The analysis shows that the PSNR is improved in the case of LSB technique. Use of hash algorithm provides data integrity. Keywords: Data hiding, Data integrity, LSB technique, Forensic Analysis, MD5 Hash Algorithm, Substitution, PSNR, Encryption Algorithm, Steganography. I. INTRODUCTION To make a steganographic correspondence significantly more secure the message can be packed and scrambled before being covered up in the transporter. Cryptography and steganography can be utilized together [1] . On the off chance that compacted the message will take up far less space in the transporter and will limit the data to be sent. The arbitrary looking message which would come about because of encryption and compression [2] would also be less demanding to stow away than a message with a high level of normality. The picture imprinted on an archive could be commented on by metadata that could lead a client to its high determination variant. By and large, metadata gives extra data around a picture. Despite the fact that metadata can likewise be put away in the record header of a computerized picture, this approach has numerous confinements. Ordinarily, when a document is changed to another format (e.g., from TIFF to JPEG or to BMP), the metadata is lost. So also, editing or some other type of picture control annihilates the metadata [3] . At last, metadata must be connected to a picture as long as the picture exists in the computerized shape and is lost once the picture is printed. Data stowing away enables the metadata to movement with the picture paying little mind to the record configuration and picture state. The main objectives of this work is to provide high level security to sensitive digital data against steganalysis techniques [13] . This objective can be achieved by encrypting and authenticating the image that has user’s sensitive data and then embedding the resultant document on to a carrier and to implement proposed model and analysis of the various factors, with less dissertation and improved peak signal noise ratio [10] . In this paper, represents three important techniques based on the algorithm the least significant bit (LSB) [5] . This approach reduces the length of hidden message by LZW algorithm [12] which is a lossless data compression algorithm successor of LZ77 algorithm and the Huffman algorithm. Another important characteristic of this approach is to protect the reduced hidden