New Approach of Information Security through Steganography by using Wavelet Transformation and Symmetric Encryption Komal Hirachandani MTech. Scholar in Dept. of CSE TIT-S, Bhopal, INDIA Gaurav Soni Dept. of CSE TIT-S, Bhopal, INDIA Prof. Rajesh Nigam Dept. of CSE TIT-S, Bhopal, INDIA Abstract—This Steganography is the skills of concealing secrete information into other object like image has been widely used in term of information security. The technique of standard steganography allows the secrete information for not being perceptible to an viewer. Moreover, there is another technique that is normally used to enhance the security of the information, which is usually called Cryptography. Cryptography is also the skill and knowledge of transforming information into a series of bits that appears as arbitrary and worthless for the viewer. Most of the time, user have used only single method either Cryptography or Steganography to protected the secrete information. The encryption/decryption process have gained high recognition in broadcast of secrete information like images and those generated for the security organizations which may enclose images of tactical planning information and geographical position images. However, the amalgamation of Steganography and Cryptography that is proposed can be useful for improving the security of secrete information. The presented concept in this paper also provides an easiness of exchanging confidential information secretly between a sender and a receiver with multimedia files like images as carriers of the information. For the purpose, proposed work has designed an efficient encryption algorithm considering the various cryptanalytic attacks which evolved as the security enhancements were formulated. Proposed technique is the implementation with high PSNR and entropy with correlation complexity. Keywords — Internet, Steganography, Cryptography, Symmetric Key, Key, Algorithm, bit I. INTRODUCTION As the development of Internet technologies increases, the transmission of digital media is now-a-days convenient over the networks. But secret information broadcasting over the network suffers from severe security overhead. So, defensive of secret information for the period of transmission becomes a significant matter [1]. Though cryptography changes the message so that it cannot be understood but this can generates curiosity level of a hacker. It would be rather more sensible if the secret message is cleverly embedded in another media so that no one can guess if anything is hidden there or not [2,3]. This idea results in steganography, which is a branch of information hiding by camouflaging secret information within other information. The word steganography in Greek means "covered writing" ( Greek words "stegos" meaning "cover" and "grafia" meaning "writing") [5]. The main objective of steganography is to hide a secret message inside harmless cover media in such a way that the secret message is not visible to the observer. Thus the stenography image should not diverge much from original cover image. In this generation, steganography is mostly used on computers with digital data being the carriers and networks being the high speed delivery channels [6, 7]. The following formula can provide a very generic description of the steganography process: Cover Information + Secrete Information + stego key = stego Information In this formula, the cover information is the box file in which we hide the secrete information, which may also be encrypted through special key called the stegos key. The resultant file is the stegos data which will be of the same type as the cover data [8,10]. The cover data and stegos data are typically image. Secret Image Cover Image f of size N x N The block diagram of a simple steganography system Normally, the large amount is fixed in a cover image; the more identified artifacts would be introduced into the stegos [11]. As per many applications, the most important requirement for steganography is unidentified, which means that the stegos should be visually and statistically same to the cover image while keeping the fixed rate as high as possible. Figure 1 shows the block diagram of a simple image steganography system. The amalgamation of Steganography and Cryptography that is proposed can be useful for improving the security of secrete information [13,14]. The following formula can give us a effective standard way of the security Process: Komal Hirachandani et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (5) , 2014, 6253-6260 www.ijcsit.com 6253