An Improved Data Hiding Technique using Context Aware System Majed Aborokbah * Faculty of Computers and Information Technology, University of Tabuk, Tabuk City, Saudi Arabia; m.aborokbah@ut.edu.sa Indian Journal of Science and Technology, Vol 12(6), DOI: 10.17485/ijst/2019/v12i6/141437, February 2019 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 *Author for correspondence Abstract Objectives: The study presents a novel DH (Data Hiding) technique which is the combination of DH and context aware system (CAS) for developing/improving the conventional DH scheme. It ensures that the decoder/receiver authenticity be- fore proceeding into the decode process. Methods/Statistical Analysis: This validation operation is performing in three different layers using the CAS properties. The decode action is performed based on the validation result by the proposed system at receiver side. In detail, if the decoder validation is success then he/she may permit to decode the encoded data by Modified Steganography for Image Decode (MSID) process else the system will give another chance to make their validation. If the validation is failed maximum of three times then the system will be deleted the encoded without the knowledge of the receiver. Findings: This feature has been added with the conventional DH system. The proposed system is divided into two different stages of DH and validation using CAS. The secret image is hiding inside of the known image using Modified Steganography for Image encode (MSIE) process and the validation parameters of the user name, location where the decode should be performed and time schedule are appended and it sent to the receiver in the sender side. He/ she must perform the validation process and the CAS will take a decision based on the validation result once the receiver/ decoder received the data. As the outcome of this system, the intruder can’t be access the encoded data 99%, the strength- en ratio is improved up to 95% than the existing scheme, the secret data is reconstructed without any loss, it can ensure the reliability, availability and confidentiality of the secret data up to 98%. Application/Improvements: It has implemented for the clandestine image/data transmission between sender and receiver using CAS. 1. Introduction Essentially, the DH is a technique where the clandestine image is hiding inside of a known/cover image for the secure transmission. As the outcome, the encoded image is look like the given cover image. e intruders may fails to hack data while transmitting due to this attitude. e medical image is considered as a secret image and it has sent to the authenticated user/receiver for the decode pro- cess. ey had incorporated the new compression scheme which is suitable for the DH. As the outcome, they were claiming that their method is providing fast and secure transmission 4-6 . e paper had introduced the SDIHID scheme (Spatial-Domain Image Hiding using Image Differencing) in 2000. e deliberate technique is to implant a HI (Hidden Image) into a CI (Cover Image). e approach became supported by the parallel among the grey values in sequence of picture pixels variant insensitiveness from sleek to contrastive due to the truth of human visual order. An encoded image turned into generating by means of change the pixel values of a various results attained from the HI with those of a differencing outcome received from the secret image. e method preserves the HI with no loss and it produces the encoded with low degradation 7 . A Grey scale IH scheme based on VQ (Vector Quantization) had proposed in 2003. It is to decrease the amount of Keywords: Context Aware System, Data Hiding, Data Hiding Technique, Receiver, Secret Data, Sender