International Journal of Computer Applications (0975 8887) Volume 51No.21, August 2012 29 Steganography Enhancement by combining text and image through Wavelet Technique Najran N. H. Al_Dawla Department of CS & IT, Dr. B. A. M. University, Aurangabad, India M. M. Kazi Department of CS & IT, Dr. B. A. M. University, Aurangabad, India K. V. Kale, Professor and Head, Department of CS & IT, Dr. B. A. M. University, Aurangabad, India ABSTRACT The rapidly proliferated information and evolution of digital technologies by Information hiding in multimedia data has improved the ease of access to digital information enabling reliable, faster and efficient storage, transfer and processing of digital data and leads to the consequence of making the illegal production and redistribution of digital media easy and undetectable. Hence, it poses a novel challenges for researchers. In this paper we present a novel integration of an incorporating text and image steganography to find a solution for enhancing security and protecting data. We proposed an enhancement of steganography algorithm which involves the scheme of discrete wavelet transformation combining text and image by secretly embed encrypted secrete message text data (cipher text) ortext image in the content of a digital image. The system based on levels of encryption and decryption methods performed to enhance the security of the system. Here first generate secrete message text (cipher text) or text image, and then processing deals with embedding and extracting Steganography algorithms. Finally the process deals with extraction of the hiddensecrete message. The experimental result shows a high level of efficiency and robustness of the proposed system. Keywords Steganography, Cryptography, Text, Image, Secret Key, Security, DWT. 1. INTRODUCTION In this era, the incorporate of Digital Steganography and cryptography are the fascinating scientific area which falls under the umbrella of security system. Due to the escalation use of multimedia across the Internet, multimedia distribution became an imperative way to deliver services around the world. It is commonly applied in Internet marketing campaigns and electronic commerce web sites. In particular, has explored means of new business, scientific, entertainment, and social opportunities. One of the great advantages of digital data is that it can be reproduced without losing the quality. Digital media offer several distinct advantages over analog media, such as high quality, easy editing, high fidelity copying. The ease by which digital information can be duplicated and distributed has led to the need for effective copyright protection tools. [1] For instance, identity and verify document attacks are on the rise because easy-to-use digital image tools that available at decreasing prices [2] security has become an important issue during the storing and transmission of digital data. The security of images is an application layer technology to guard the transmitted information against unwanted disclosure as well as to protect the data from modification while in transit. There are many real life applications of Steganography being used [2, 4]. Digital Steganography describe techniques that are used to imperceptibly convey information by hide secrets into the cover-data such as an image, document, audio, video file, so that no other people can detect or extract the existence of the secrets. [1, 3] A steganography method consists of an embedding algorithm and an extraction algorithm. The embedding algorithm describes how to hide a message into the cover object and the extraction algorithm illustrates how to extract the message from the steganography object. On the other hand, Cryptography [6, 7] is the art or science of secret writing [4], studies the mathematical techniques of secrecy or information security such as confidentiality, data integrity, entity authentication and data origin authentication. Secrecy is at the heart of cryptography [5] Encryption and Decryption are a practical way of achieving information secrecy. This paper is organized as follows. In section 2, we discuss an introduction of generating an encryption and decryption of a secrete message. Embedding and extracting strategies is proposed and describes in section 3, Experimental result and conclusion are given in section 4 and 5 respectively. 2. GENERATE ENCRYPTION AND DECRYPTION OF SECRETE MESSAGE This section describe the generation of an encryption and decryption of a secrete message such as text or text image. Cryptography is formally the art and science of encoding data in a way that only the intended recipient can decrypt it, and know that the message is authentic and unchanged. Fig .1 Shows the process of how to Encrypt and decrypt the secrete message as text by using a complex mathematical algorithms [6] which take messages as numbers or algebraic elements on a space and then transform them into two regions, a region of meaningful messages as input called clear text; when an encryption algorithm is applied it will result in an unintelligible message as output i.e.cipher text (unreadable cipher) in a second region [4]. These algorithms transfer the data into streams or blocks of seemingly random characters. By applying the reverse process of encryption, that is, decryption, the encryption information will be restored to its original content. An encryption key might encrypt, decrypt, or perform both functions, depending on the type of encryption algorithm being used. The system of encryption and decryption algorithms together with the keys and description of the format of messages constitute a cryptosystem. The term key refers to a numerical value used by an algorithm to alter information, making that informationsecure and visible only to individuals who have the corresponding key to recover the information,where the security of the system is based on the difficulty of encrypt and decrypt computation without special side information known as keys. A cipher is a mathematical function that both encrypts and decrypts a message with the known (secret) key. The result of using the decryption method and the decryption