International Journal of Science and Research (IJSR) ISSN (Online): 2319-7064 Index Copernicus Value (2013): 6.14 | Impact Factor (2014): 5.611 Volume 4 Issue 11, November 2015 www.ijsr.net Licensed Under Creative Commons Attribution CC BY High Security of Data Using Steganography with Hybrid Algorithm Madhugeeta Verma 1 , Poonam Dhamal 2 1 Savitribai Phule pune University, GH Raisoni College of Engineering and Management, Pune, India 2 GH Raisoni college of Engineering and Management , Savitribai Phule pune University, Pune, India Abstract: With the modern technology in communication, there need some security on computer network. This security is one of the significant problem in tha data communication. Steganography is the art of hiding the message such that its presence cannot be detected. Message or encrypted message is hidden in the other carrier object before passing it through the network. In the existing system, for hiding the data only one technique is used i.e. steganography with X-box. In this paper, we will use 4 X-box technique which will hide 3 secret bit in each pixel of 24 or 32 bit cover image with hybrid algorithm i.e. AES and SHA-512. This will improve the security and PSNR value. Keywords: Steganography; 2 X-Box technique; LSB; network security; AES; SHA-512; 1. Introduction Steganography word is originated from Greek words steganos (covered) and Graphy (writing) which literally means cover writing[1]. It does not alter the message but hide it in another cover object like text, image, audio, video and network. It is the advance version of cryptography where messages are only scrambled so that it could not be understood by unauthorized person. Steganography is different from watermarking. Watermarking is used to verify the identity and authenticity of the owner of a digital image[3]. The information are embedded into the digital image or signals. For example if a famous celebrity watermark his picture then if somebody want to copy that picture then that watermark is also copied. This watermarking can be visible as well as invisible. It is used for copyright protection,source tracing, etc, where as steganography is changing the image in a way that only the sender and the intended recipient is able to detect the message sent through it. It is invisible, and thus the detection is not easy. Information hiding using steganography Now days, security of information has become a fundamental issue. Steganography is a technique of hiding information in digital media. It is a Greek word, stego means “covered” and graphia means “writing” i.e. covered writing. It embed the message in digital media before passing it to network, so its existence become invisible. This confidentiality and data integrity are required to protect against the unauthorized access. Some terminologies of steganography are [1] Cover-Image: The image which is used as a carrier for hidden message. Message: Actual information which is used to hide into images. Message could be a plain text,cipher text, image, etc. Stego-Image: After embedding message into cover image is known as stego-image. Stego-Key: A key is used for embedding or extracting the messages from cover-images and stego-images. Steganographic measures are High Capacity: Maximum size of data that can be embedded. Perceptual Transparency: Quality of image that degrades. Robustness: After embedding, data should not be changed if stego-image goes into some transformation such as cropping, scaling, filtering and addition of noise. Temper Resistance: Alteration of message after embedding. Computation Complexity: Total expense for embedding and extraction of message Image steganography can be divided into 2 domain: Spatial and Transform domain. A picture in the spatial domain can be described as a collection of pixel values. Transform domain is a more complex way of hiding information in an image. Various algorithms and transformations are used on the image to hide information in it. Transform domain embedding can be termed as a domain of embedding techniques for which a number of algorithms have been suggested [6]. 2. Literature Survey The early instance of steganography is mentioned in Herodotos’s Histories[2] which clearly shows that the message are not encrypted but only hidden inside other object. Background Shaving a slave’s head: First, In this, the head of the slave had been shaved and then tattooed which was a kind of message. Then they wait for the hair to grow back. Once this happened, slave go to the recipient where his head is again shaved and finally recipient received their messages. Paper ID: NOV151226 2469