International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-8 Issue-12, October 2019 1800 Published By: Blue Eyes Intelligence Engineering & Sciences Publication Retrieval Number: L28391081219/2019©BEIESP DOI: 10.35940/ijitee.L2839.1081219 High Capacity Image Steganography using Pixel Value Differencing Method with Data Compression using Neural Network Jayeeta Majumder, Chittaranjan Pradhan Abstract: The Digital Market Is Rapidly Growing Day By Day. So, Data Hiding Is Going To Increase Its Importance. Information Can Be Hidden In Different Embedding Mediums, Known As Carriers By Using Steganography Techniques. The Carriers Are Different Multimedia Medium Such As Images, Audio Files, Video Files, And Text Files .There Are Several Techniques Present To Achieve Data Hiding Like Least Significant Bit Insertion Method And Transform Domain Technique. The Data Hidden Capacity Inside The Cover Image Totally Depends On The Properties Of The Image Like Number Of Noisy Pixels. Data Compression Provides To Hide Large Amount Of Secret Data To Increase The Capacity And The Image Steganography Based On Any Neural Network Provides That The Size And Quality Of The Stego-Image Remains Unaltered After Data Embedding. In This Paper We Propose A New Method Combined With Data Compression Along With Data Embedding Technique And After Embedding To Maintain The Quality The Communication Channel Use The Neural Network. The Compression Technique Increase The Data Hiding Capacity And The Use Of Neural Network Maintain The Flow Of Data Processing Signal Keywords: Image steganography, Data Compression, Arithmetic coding, Pixel value differencing, Neural Network I. INTRODUCTION Communication using Internet is increasing rapidly in modern days. To secure our confidential data during data transmission through a public channel is a major issue in all aspect. The confidential data needs security from an unauthorized access. In digital communication secure data transfer session is very much essential. The performance of network is the major issue for secure data transmission. To maintain confidentiality and integrity of data is required for data transmission. Cryptography gives us some popular techniques [1] to protect the data from eavesdroppers and also secured communication over the channel. Steganography techniques [2] also protect the data along with no alteration. Revised Manuscript Received on October 05, 2019. Jayeeta Majumder, Computer Science & Engineering, Haldia Institute of Technology, Haldia, West Bengal, Email: jem2003_kolkata@yahoo.co.in Chittaranjan Pradhan, Computer Science & Engineering, KIIT University, Bhubaneswar, Odissa, In Steganography, the cover image is any one of the multimedia data like image, audio, video where the original secret message are embedded. After embedding of data into the cover media is known as the stego data. The human eye cannot distinguish the original cover data with stego data. In steganographic technique the unauthorized receiver cannot identify the secret data which are being transferred through the public channel. Various application like military communication, Internet of Things and multimedia [3-5] where steganography based security system is applied. In literature survey we find several numbers of combined cryptography and steganography schemes [5-6]. In the field of information security, both cryptography and steganography techniques are used. In general, image data taken as the cover media in different application. II. RELATED WORK Through literature survey, we found a number of image based steganographic schemes. The LSB (east Significant Bit) is the widely used methods for high data hiding capacity. The basic LSB method only consider three LSB bits replacements. In this method, after replacement the stego- image is visually good and also increase embedding capacity. By using optimal pixel adjustment process the visual quality can be improved. In Yang [5] scheme, cover pixel are not directly modified. The secret message bits are toggled and the new toggled patterns are recorded for extracting the secret message. Later Chen [7] proposed a modified scheme, where modulus function is used with LSB substitution which improves the visual quality for the stego-image. To minimize the distortion in the stego-image the repetition of the secret message is considered. Then, Xu, et al. [6] proposed a steganographic scheme with fixed payload. Some researchers [7-9] designed edge-based steganographic schemes. In paper [10], the authors classified the pixels into two categories, Edge-pixels and non-edge pixels and apply Data embedding concept. Islam et.al [11] proposes a method which increase the high visual quality of the stego-image. The process enhances the security level. Wu & Tsai [12] introduces Pixel Value Differencing [PVD] method.