A Security Enhanced Approach For Digital Image Steganography Using DWT And RC4 Encryption

International Journal of Computer Trends and Technology (IJCTT)          
© - June Issue 2013 by IJCTT Journal
Volume-4 Issue-6                           
Year of Publication : 2013
Authors :Amritha.G, Meethu Varkey


Amritha.G, Meethu Varkey"A Security Enhanced Approach For Digital Image Steganography Using DWT And RC4 Encryption"International Journal of Computer Trends and Technology (IJCTT),V4(6):1710-1716 June Issue 2013 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract: - Steganography is the art of hiding the existence of data in another transmission medium to achieve secret communication . Steganography method used in this paper is based on biometrics, ie biometric steganography. And the biometric feature used to implement steganography is skin tone region of images. Here secret data is embedded within skin region of image that will provide an excellent secure location for data hiding. Before embedding secret data is needed to be encrypted using stream cipher encryption scheme RC4.Skin color tone detection is performed by using HSV color space.DWT is the frequency domain in which this biometric steganography is implemented.Secret data is embedded in one of the high frequency subband by tracing the number of skin pixels in that band. . Different embedding steps are applied on the cropped region of the image.ie value of this cropped region will act as a key at the decoder side. This study shows that by adopting an object oriented steganography mechanism, in the sense that, we track skin tone objects in image, we get a higher security and satisfactory PSNR obtained.


[1] A Secure Skin Tone based Steganography Using Wavelet Transform Anjali A. Shejul, Umesh L. Kulkarni, International Journal of Computer Theory and Engineering, Vol.3, No.1, February, 2011 1793-8201
[2] A. Cheddad, J. Condell, K. Curran and P. Mc Kevitt, ?Biometric inspired digital image Steganography?, in: Proceedings of the 15th Annual IEEE International Conference and Workshops on the Engg.of Computer-Based Systems (ECBS‘08), Belfast, 2008, pp. 159-168.
[3] A Novel Session Based Dual Steganographic Technique Using DWT and Spread Spectrum. International Journal of Modern Engineering Research (IJMER). Vol.1, Issue1, pp-157-161
[4] Schneier B.,“Applied Cryptography, Second Edition: Protocols, Algorithms andSource Code in C”,John Wiley & Sons, Inc., USA, 1996
[5] Exploring Steganography:Seeing the Unseen
[6]Methodology of Spread-Spectrum Image Steganography,army research laboratory
[7] Object Oriented steganography Based On Biomertic And spread Spectrum. International Journal of Scientific & Engineering Research Volume 3, Issue 6, June-2012
[8] Sobottka, K. and Pitas, I.:?Extraction of facial regionsand features using color and shape information.? Proc. IEEE International Conference on Image Processing, pp. 483-486.(1996)
[9] Skin Detection using HSV color spaceV. A. Oliveira,A. Conci Computation Institute – Universidade Federal Fluminense – UFF – Niter i, Brazil. {victor_oliveira , aconci}@ic.uff.br
[10] Yang, J., & Waibel, a. (1996). A real-time face tracker. Proceedings of the 3th IEEE Workshop on Applications of Computer Vision, Sarasota, Florida, 142-147

Keywords - Biometrics,Skin detection,DWT,cropping,PSNR,RC4