Skip to main content

Analysis of Existing Text Hiding Algorithms for Image Steganography Using TLNUS and AES

  • Conference paper
  • First Online:
  • 1271 Accesses

Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 77))

Abstract

In the last few years, many researchers putting many efforts for getting good data hiding algorithms which was complex in design and undergo rigorous investigation on starting from secret text sizes ranges from 4 kB to 1 MB file has been embedded in it so far for the sake of more secure communication among mobile nodes and local area networks. As of now, several steganographic concepts were conceived on data hiding approaches deployed in insecure channel. In this paper, authors designed new data hiding algorithm approach proposed based on three protection layers has been used to maintain secrecy of the embedded message in a true color image. Here, the data is embedded randomly instead of sequentially by an image segmentation algorithm that uses two-level non-uniform segmentation. Advanced encryption standard algorithm has been used to encrypt the secret text. Different performance measures from the experimental results have shown the reasonable prototype of the proposed steganography algorithm. The result after comparing the proposed algorithm and the wide spectrum of steganographic schemes confirm that the stego image with medium perception ratio has been reached even if the stego image holds a large amount of data with good visual quality and working under jpeg and gray-scale images and also resistant to statistical and visual problems.

This is a preview of subscription content, log in via an institution.

References

  1. Johnson, N.F., Jajodia, S.: Exploring steganography: seeing the unseen. IEEE Comput. 31(2), 26–34 (1998)

    Article  Google Scholar 

  2. El-Emam, N.: Hiding a large amount of data with high security using steganography algorithm. J. Comput. Sci. 3(4), 32–223 (2007). doi:https://doi.org/10.3844/jcssp.2007.223.232

  3. El-Emam, N.: Embedded a large amount of information using high secure neural based steganography algorithm. Int. J. Inf. Commun. Eng. 4(2), 95–106 (2008)

    MathSciNet  Google Scholar 

  4. Sanyasi, P., Naidu, J.G.: Investigation and Analysis of Location Based Authentication and Security Services of Wireless LAN’s and Mobile Devices. published in IJCA, 146(8) (ISBN: 973-93-80893-84-7, July (2016)

    Google Scholar 

  5. El-Emam, N.: New Data-Hiding Algorithm Based on Adaptive Neural Networks with Modified Particle Swarm Optimization. Elsevier (2013)

    Google Scholar 

Download references

Acknowledgements

The authors would like to thank Dr. S.C. Satapathy, Professor and Director (R&D), Anil Neerukonda Institute of Technology and Sciences, Visakhapatnam, for his great effort in helping to shaping the paper and proof reading the manuscript, and for making numerous helpful suggestions.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jagadish Gurrala .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Gurrala, J., Sanyasi Naidu, P. (2018). Analysis of Existing Text Hiding Algorithms for Image Steganography Using TLNUS and AES. In: Satapathy, S., Bhateja, V., Das, S. (eds) Smart Computing and Informatics . Smart Innovation, Systems and Technologies, vol 77. Springer, Singapore. https://doi.org/10.1007/978-981-10-5544-7_1

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-5544-7_1

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-5543-0

  • Online ISBN: 978-981-10-5544-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics