Image Steganography Using Discrete Cosine Transform (DCT) and Blowfish Algorithm

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2014 by IJCTT Journal
Volume-11 Number-4
Year of Publication : 2014
Authors : Monika Gunjal , Jasmine Jha
DOI :  10.14445/22312803/IJCTT-V11P131

MLA

Monika Gunjal , Jasmine Jha. R."Image Steganography Using Discrete Cosine Transform (DCT) and Blowfish Algorithm". International Journal of Computer Trends and Technology (IJCTT) V11(4):144-150, May 2014. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
Steganography is one of the methods of secret communication that hides the existence of message so that a viewer cannot detect the transmission of message and hence cannot try to decrypt it. It is the process of embedding secret data in the cover image without significant changes to the cover image. A cryptography algorithm is used to convert the secret messages to an unreadable form before embedding. These algorithms keep the messages from stealing, destroying from unintended users on the internet and hence provide security. Cryptography was introduced for making data secure. But alone cryptography cannot provide a better security approach because the scrambled message is still available to the eavesdropper. There arises a need of data hiding. So the propose technique use a combination of steganography and cryptography for improving the security. The proposed technique use Discrete Cosine Transform (DCT) and Blowfish algorithm. The proposed method calculates LSB of each DC coefficient and replace with each bit of secret message. The proposed embedding method using DCT with LSB obtained better PSNR values. Blowfish algorithm is used for encryption and decryption of text message using a secret-key block cipher. This technique makes sure that the message has been encrypted before hiding it into a cover image. Blowfish is an improvement over DES, 3DES, etc designed to increase security and to improve performance.

References
[1]. Mrs.Archana S. Vaidya, Pooja N. More., Rita K. Fegade., Madhuri A.Bhavsar., Pooja V. Raut, “Image Steganography using DWT and Blowfish Algorithm” Volume 8, Issue 6 (Jan. - Feb. 2013).
[2]. Ajit Singh, Swati Malik , “Securing Data by Using Cryptography with Steganography”, Volume 3, Issue 5, May 2013.
[3]. Shahana T, “An Enhanced Security Technique for Steganography Using DCT and RSA”, Volume 3, Issue 7, July 2013.
[4]. Dipti Kapoor Sarmah, Neha Bajpai, “Proposed System for data hiding using CryptographyAnd Steganography ”.
[5]. M. Anand Kumar and Dr.S.Karthikeyan, “Investigating the Efficiency of Blowfish and Rejindael (AES) Algorithms”, I. J. Computer Network and Information Security, 2012.
[6]. Diaa Salama Abd Elminaam, Hatem Mohamed Abdual Kader, and Mohiy Mohamed Hadhoud , “Evaluating The Performance of Symmetric Encryption Algorithms”,Vol.10,No.3, May 2010.
[7]. Stuti Goel, Arun Rana & Manpreet Kaur, “A Review of Comparison Techniques of Image Steganography”, Global Journal of Computer Science and Technology Graphics & Vision Volume 13 Issue 4 Version 1.0 Year 2013 .
[8]. Dr. Ekta Walia , Payal Jain , Navdeep, “An Analysis of LSB & DCT based Steganography”,Vol. 10 Issue 1 (Ver 1.0), April 2010.
[9]. Pratap Chandra Mandal, “Modern Steganographic technique: A survey”,International Journal of Computer Science & Engineering Technology(IJCSET), Vol. 3 No. 9 Sep 2012.
[10]. E. Thambiraja, G. Ramesh, Dr. R. Umarani, “A Survey on Various Most Common Encryption Techniques”, Volume 2, Issue 7, July 2012 .
[11]. Rajinder Kaur, Er. Kanwalpreet Singh , “Comparative Analysis and Implementation of Image Encryption Algorithms” International Journal of Computer Science and Mobile Computing Vol.2 Issue. 4, April- 2013.
[12]. C.Gayathri , V.Kalpana , “Study on Image Steganography Techniques ” International Journal of Engineering and Technology (IJET) Vol 5 No 2 Apr-May 2013.
[13]. S. M. Masud Karim, Md. Saifur Rahman, Md. Ismail Hossain, “A New Approach for LSB Based Image Steganography using Secret Key”, 987-161284-908-9/11 © 2011 IEEE.
[14]. Yam bern Jina Chanu, ThemrichonTuithung, Kh. Manglem Singh, “A Short Survey on Image Steganography and Steganalysis Techniques”, 978-1-4577-0748-3/12 © 2012 IEEE
[15]. AL.Jeeva,Dr.V.Palanisamy,K.Kanagaram,“Comparative analysis of performance efficiency and security measures of some encryption algorithms”, Vol. 2, Issue 3, May-Jun 2012.

Keywords
Steganography, Cryptography ,DCT, LSB, PSNR, MSE.