{"id":878,"date":"2018-12-03T10:49:50","date_gmt":"2018-12-03T10:49:50","guid":{"rendered":"http:\/\/www.gyanvihar.org\/journals\/?p=878"},"modified":"2019-05-28T13:20:56","modified_gmt":"2019-05-28T13:20:56","slug":"enhancing-security-of-steganographic-system-using-tdea","status":"publish","type":"post","link":"https:\/\/www.gyanvihar.org\/journals\/enhancing-security-of-steganographic-system-using-tdea\/","title":{"rendered":"Enhancing Security of Steganographic System using TDEA"},"content":{"rendered":"<p style=\"text-align: center\"><strong><sup>1<\/sup>Manoj Kumar Ramaiya,<sup> 2<\/sup>Dinesh Goyal, <sup>3<\/sup>Naveen Hemrajani<\/strong><\/p>\n<p style=\"text-align: center\"><sup>1<\/sup>Research Scholar, Computer Engineering, SGVU, Jaipur<\/p>\n<p style=\"text-align: center\"><sup>2<\/sup>Principal, School of Engineering, SGVU, Jaipur<\/p>\n<p style=\"text-align: center\"><sup>3<\/sup>Head Computer Engineering, JECRC University, Jaipur<\/p>\n<p style=\"text-align: justify\"><strong>Abstract: The security of data over unsafe communication network has always been a primary concern in the attention of researchers. With the rapidly growing practise of the internet in all personnel and business drives, the concern for the illegal access by an intruder and later misuse, has further put strain on the industry for developing means and techniques to overcome this.<\/strong><\/p>\n<p style=\"text-align: justify\"><strong>Cryptography involves transforming a confidential data into unintelligible forms or ciphertext might produce suspicious in the mind of opponents. On the other hand, Steganography implant secrete message in to a cover media and hides its presence. As a normal practise, data embedding is employed in communication, image, text or multimedia contents for the purpose of copyright, authentication and digital signature etc.<\/strong><\/p>\n<p style=\"text-align: justify\"><strong>Both techniques provides the sufficient degree of security but are vulnerable to intruder\u2019s attacks when used over unsecure communication channel. Attempt to combines the two techniques i.e. Cryptography and Steganography, did results in security improvement. The existing steganographic algorithms primarily focus on embedding strategy with less consideration to pre-processing of data which offer flexibility, robustness and high security level. The proposed work presents a unique techniques for image steganography based on \u201cTriple Data Encryption Algorithms (TDEA)\u201d using the strength of multiple encryption enhancing the security level over unsafe communication channel.<\/strong><\/p>\n<p><strong><em>Keywords: <\/em><\/strong>Image Steganography, Cryptography, LSB insertion, DES, Multiple encryption, TDEA.<\/p>\n<p>&nbsp;<\/p>\n<ol style=\"list-style-type: upper-roman\">\n<li>INTRODUCTION<\/li>\n<\/ol>\n<p style=\"text-align: justify\">Keeping an information safe while communicating it to somebody at a distance has been in the attentions of individuals since the early age, so very rudimentary to present day highly specified computer based methods have been developed. The past three or four decade led to the wide spread transfer of data from one end to the other end of the world. The remarkable growth of the internet also generate and eased various E- Commerce applications. This demand the assurance of security of data and any misuse possible from this theft data. Further the communication between private parties demanding absolute privacy also necessitate the data transmission in modified or encoded mode.<\/p>\n<p style=\"text-align: justify\">In multimedia communication the necessity of privacy and confidentiality gains additional importance mainly in open, unsecure communication network like internet. Present era of universal connectivity, of viruses, intruders, eavesdropping and digital fraud need to safe-guard information from releasing into erroneous hand.<\/p>\n<p style=\"text-align: justify\">Cryptography techniques [6,7] scramble a source message in to unintelligible form so it cannot be understood while steganography hides the message in to other media, so it cannot be perceived. The term steganography [2,4] derives from the Greek <em>Steganos<\/em> which means \u201ccovered\u201d and\u00a0<em>Grafia <\/em>means \u201cwriting\u201d i.e. Steganography means \u201ccovered writing \u201c [5] . Thus the stego image should not differ much from cover image.<\/p>\n<p style=\"text-align: justify\">Cryptography and Steganography are extensively used in the field of information hiding [1] and has received attention from the businesses and academic world in the past. Former conceals the original data but latter conceal the very fact that data is hidden.<\/p>\n<p style=\"text-align: justify\">\u00a0 \u00a0 \u00a0 \u00a0II.RELATED WORKS<\/p>\n<p style=\"text-align: justify\">There are large number of steganographic techniques proposed in literature. Image steganography is a method for hiding information into a cover image. Least Significant-Bit (LSB) based methods [22] is common steganographic practise in spatial domain due to its easiness and hiding capacity. All the obtainable methods of steganography concentrate on the embedding method with less concern to the pre-processing, such as encryption of secrete image.<\/p>\n<p style=\"text-align: justify\">More recently, researcher\u2019s hides [5] secret messages in image by replacing the least significant bit of each byte of the image pixel with the bits of the message. The original image is not significantly changed. Most image format identify more shades of colour than the human eye can notice. The message is successfully be extracted this at the receiver end. Steganography goes well beyond simple embedding text in an image.<\/p>\n<p style=\"text-align: justify\">Considering the strengths and weakness of steganography and cryptography, researchers tried to combining them in practice, so that the new method would simultaneously possess the advantages of steganography and cryptography while overcoming the respective weaknesses.<\/p>\n<p style=\"text-align: justify\">Idea employing the two techniques in tandem, The techniques describe by Singh and Malik [13] uses blowfish encryption algorithm for encrypting the text message rendering it non readable and secure. The LSB techniques of steganography further enhance the security.<\/p>\n<p style=\"text-align: justify\">Text encryption with DES and LSB insertion Dhawal Seth et Al [14] combines cryptography and steganography, so as to ensure more security over insecure communication channel. DES cryptographic algorithm being used for encrypting the text message in conjunction with LSB substitution for embedding the encrypted message in the cover image.<\/p>\n<p style=\"text-align: justify\">Most of the hybrid system uses cryptographic algorithms to encrypt text message and hide the ciphertext by LSB steganography. To our knowledge no techniques proposed cryptography for encrypting image (image encryption). Proposed system uses cryptographic techniques for encrypting secrete message i.e. image and then hiding this encrypted image is hide in to cover image by using LSB embedding.<\/p>\n<p style=\"text-align: justify\"><strong>A. DES and TDEA<\/strong><\/p>\n<p>DES given the possible susceptibility to brute-force attack, there has been significant attention in finding an alternate to DES. One approach is to finding completely new algorithm and AES is example of that. Other alternative to use existing DES with multiple encryption and multiple keys. The initial standard that describes algorithm ANS<\/p>\n<p>X9.52 available in 1998 is \u201cTriple Data Encryption Algorithm (TDEA)\u201d . FIPS PUB 46-3 also describe TDEA.<\/p>\n<p>Triple DES uses a key package that consist of three keys. K1, K2 and K3 all of having 56 bits. These keys are applying in three different variant. The encryption of<\/p>\n<p>Ciphertext = <em>EK<\/em><em>3<\/em> (<em>DK<\/em>2 (<em>EK<\/em><em>1<\/em> ( Plaintext) ) )<\/p>\n<p>Means DES first encrypt with K1 , secondly DES decrypt with K2 and then DES encrypt with K3. The plaintext will be recovered by decrypt with K3 , encrypt with K2 then decrypt with K1.<\/p>\n<p>Plaintext = DK1 (EK2 (DK3 ( Ciphertext) ) )<\/p>\n<p>Each triple Des encryption encrypt one block of 64 bits of data. The TDEA offer three different variants with respect to keys.<\/p>\n<ul>\n<li>All three Keys are independent<\/li>\n<li>K1 and K2 are indepents and K3 = K1.<\/li>\n<li>All three keys are identical i.e. K1=K2=K3.<\/li>\n<\/ul>\n<p style=\"text-align: justify\">Triple DES is beneficial because it has important sizes key length, which is longer than most key length associated with other encryption methods, i.e. 3\u00d756=168 independent key bits ensuing in a dramatic increase in cryptographic strength and obvious to the meet-in-the-middle attack.<\/p>\n<p><strong>B. Peak Signal to Noise Ratio ( PSNR )\u00a0<\/strong><\/p>\n<p>The dimension of the quality between the cover image f and stego-image g of sizes N x N is derived by PSNR [18] as:<\/p>\n<p style=\"text-align: center\">PSNR = 10 \u00d7 log (255<sup>2<\/sup> \/ MSE)<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-992 aligncenter\" src=\"http:\/\/www.gyanvihar.org\/journals\/wp-content\/uploads\/2018\/12\/Capture-31.jpg\" alt=\"\" width=\"297\" height=\"54\" \/><\/p>\n<p style=\"text-align: justify\">Where f(x,y) and g(x,y) characterize the pixel value at the position (x, y) in the cover-image and the stego-image correspondingly. The PSNR is stated in dB. PSNR is descriptive of the quality of image i.e. the higher the PSNR, lower in the difference between cover image and stego image and vice \u2013 versa.<\/p>\n<p>III. PROPOSED HYBRIDE MODEL<\/p>\n<p>Proposed steganographic model is based on Triple Data Encryption Algorithms (TDEA) as depicted as follows:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-1001 aligncenter\" src=\"http:\/\/www.gyanvihar.org\/journals\/wp-content\/uploads\/2018\/12\/Capture-32.jpg\" alt=\"\" width=\"350\" height=\"478\" \/><\/p>\n<p>A. Encoding Function<\/p>\n<p style=\"text-align: justify\">Initially the secrete image is chosen (e.g. of 64\u00d764). The intensity value of each pixel of secrete image is changed from decimal to binary. Now taking eight consecutive pixel values from secrete image, one block of 64 bits is formed. Input this block to triple DES encoding [19] function described below.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-1006 aligncenter\" src=\"http:\/\/www.gyanvihar.org\/journals\/wp-content\/uploads\/2018\/12\/Untitled-30.jpg\" alt=\"\" width=\"492\" height=\"367\" \/><\/p>\n<p style=\"text-align: center\">Figure 3.2: Formation of Input Block for DES<\/p>\n<p>One complete execution of Triple DES with three keys gives eight pixel value of secrete image into respective pixel values of encrypted secrete image.<\/p>\n<p>B. Embedding Function using LSB Method<br \/>\n1) Bit Division: Taking the cipher encrypted image, the<br \/>\nvalues are converted from decimal to binary<br \/>\nThe binary value of ( 173 )10 = ( 10101101)2<br \/>\nNext divide this 8 bit value into 4 part taking 2 bits in each<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-1116 aligncenter\" src=\"http:\/\/www.gyanvihar.org\/journals\/wp-content\/uploads\/2018\/12\/Capture-33.jpg\" alt=\"\" width=\"304\" height=\"105\" \/><\/p>\n<p style=\"text-align: center\">Figure 3.6: Bit Division for LSB Embedding<\/p>\n<p>After bit division, value of b1 = 10, b2 = 10, b3 = 11, b4 = 01 are getting.<\/p>\n<p style=\"text-align: justify\"><em>2) Insertion of Bit value into the cover image: <\/em>After receiving the values of b1, b2, b3, b4, these values are inserted into the cover image. The 2 bit LSB of the four consecutive pixels in cover image are replace. Taking the pixels one by one from the cover image, the 2 LSB bits are replaced by 10,10,11,01 respectively.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-1136 aligncenter\" src=\"http:\/\/www.gyanvihar.org\/journals\/wp-content\/uploads\/2018\/12\/Capture-34.jpg\" alt=\"\" width=\"345\" height=\"368\" \/><\/p>\n<p style=\"text-align: center\">Figure 3.7: Insertion of Bits into cover Image<\/p>\n<p style=\"text-align: justify\"><em>3) Formation of Stego Image: <\/em>After receiving the new pixel value the stego image is formed by replacing these values at their original position. Likewise the pixels value on by one from encrypted secrete image and insertion into the cover image and replaced them. Result becomes the stego image<\/p>\n<p><strong>Encoding &amp; Embedding Algorithm [19]:<\/strong><\/p>\n<p><strong>Input: <\/strong>A gray level Secrete Image (m \u00d7 n), A gray Level Cover of size (2m \u00d7 2n);<\/p>\n<p><strong>Output: <\/strong>Stego Image of size (2m \u00d7 2n);<\/p>\n<ol>\n<li>Input eight pixel value of the secrete image to form block of 64 bits to the image encoding Function (TDEA), which produces the encrypted secrete image.<\/li>\n<li>Divide each pixel value of encrypted secrete image into 4 parts containing 2 bits each.<\/li>\n<li>Insert these pixel values into the LSB position of first four pixels in the cover image one by one.<\/li>\n<\/ol>\n<p><em>C.\u00a0 Image Recovery Function<\/em><\/p>\n<p>At the receiving end, decoding of stego image perform the following process:<\/p>\n<ol>\n<li><em>Generate the 2 LSB bits from the stego Image : <\/em>The pixels value are handled one by one from the stego image. Convert these pixel value from decimal to binary values and take 2 LSB bits from first four consecutive pixel values:<\/li>\n<\/ol>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-1148 aligncenter\" src=\"http:\/\/www.gyanvihar.org\/journals\/wp-content\/uploads\/2018\/12\/Capture-35.jpg\" alt=\"\" width=\"324\" height=\"443\" \/><\/p>\n<p><em>\u00a0 \u00a0 \u00a0 \u00a0 \u00a02.\u00a0 \u00a0 Concatenation of bits:<\/em><\/p>\n<p>Now concatenating the input, the 8 bits of first pixel value of encrypted secrete image is acquired as<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-1154 aligncenter\" src=\"http:\/\/www.gyanvihar.org\/journals\/wp-content\/uploads\/2018\/12\/Capture-36.jpg\" alt=\"\" width=\"331\" height=\"134\" \/><\/p>\n<p>3.\u00a0 Reformation of Encrypted Secrete Image:<\/p>\n<p>Now the generated value is placed into first position. Similarly taking the next four pixel value from stego image, the process is repetitive and the whole encrypted secrete image is recovered.<\/p>\n<p>D. TDEA Decoding Function<\/p>\n<p>1) Creation of Secrete image:<br \/>\nNow the eight consecutive pixel value from encrypted\u00a0secrete image are again inputted to TDEA decoding\u00a0function with same constraint and keys one by one (but\u00a0used in reverse order) to obtained respective eight pixels\u00a0value of original secrete image.<\/p>\n<p>Image Retrieval \/ Decoding Algorithm [19]:<br \/>\nInput: Stego Image of size (2m \u00d7 2n);<br \/>\nOutput: A grey level Secrete Image (m \u00d7 n);<br \/>\nSteps:<br \/>\n1. Input each pixel and take 2 bit LSB from 4<br \/>\nconsecutive pixel value of the stego image.<br \/>\n2. Concatenated four 2bit LSB to get 8 bits of each<br \/>\npixel of encrypted secrete image.<br \/>\n3. Now taking eight consecutive pixel value form\u00a0block of 64 bits are input to decoding Function\u00a0\u00a0 \u00a0(TDEA) using\u00a0 \u00a0 \u00a0 \u00a0 \u00a0same parameter but keys value\u00a0used in reverse order getting first eight pixel value\u00a0of secrete image and so on.<br \/>\n4. End.<\/p>\n<p>IV. RESULTS AND ANALYSIS:<\/p>\n<p style=\"text-align: justify\">Proposed model is robust Steganography technique because\u00a0without knowing the secrete keys package the extraction of\u00a0secrete image from the stego image is impossible.Furthermore quality of cover image is also not degrading due to variation in two LSB of each pixel which replicates\u00a0only 0 \u2013 3 difference in pixel value.\u00a0Moreover the proposed system is capable of not just\u00a0scrambling data but it also changes the intensity of the\u00a0pixels which contributes to the safety of the encryption.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-1166 aligncenter\" src=\"http:\/\/www.gyanvihar.org\/journals\/wp-content\/uploads\/2018\/12\/Capture-37.jpg\" alt=\"\" width=\"360\" height=\"139\" \/><\/p>\n<p>V. CONCLUSION:<\/p>\n<p style=\"text-align: justify\">In the proposed Triple DES based steganographic model\u00a0the strength of conventional DES and bundle of secrete key<br \/>\nfor encrypting secrete image, improves image quality and\u00a0security compare to existing systems. Steganography,\u00a0especially combined with the cryptography is a powerful\u00a0tool which enables to communicate safely with the little\u00a0computational overload in the system. This model also\u00a0counter to the meet in the middle attack with 168 bit key\u00a0security<\/p>\n<p>References<\/p>\n<ol>\n<li style=\"text-align: justify\">D. N.F. Johnson, S. Jajodia, Exploring steganography:\u00a0seeing the unseen, IEEE Computer 31 (2) (1998)\u00a0pp.26\u201334.<\/li>\n<li style=\"text-align: justify\">Ross J. Anderson, Fabien A.P. Petitcolas , \u201cOn The\u00a0Limits of Steganography \u201c, IEEE Journal of Selected\u00a0Areas in Communications, 16(4):474-481, May 1998<\/li>\n<li style=\"text-align: justify\">J.C.Judge, \u201cSteganography: past, present, future\u201d,\u00a0SANS Institute publication,\u00a0\/http:\/\/www.sans.org\/reading_room\/whitepapers\/steng\u00a0anography\/552.phpS, 2001.<\/li>\n<li style=\"text-align: justify\">N. Provos, P. Honeyman, \u201cHide and Seek: an\u00a0Introduction to Steganography\u201d, IEEE Security and\u00a0Privacy 1 (3) (2003) 32\u201344.<\/li>\n<li style=\"text-align: justify\">Cheddad, A., Condell, J., Curran, K. &amp; Mc Kevitt,\u00a0Paul, 2010. \u201cDigital image steganography: survey and\u00a0analysis of current methods\u201d, Signal Processing, 2010,\u00a090(3), pp.727-52<\/li>\n<li style=\"text-align: justify\">Mohammed AbuTaha, Mousa Farajallah, Radwan\u00a0Tahboub, Mohammad Odeh, \u201cSurvey Paper:\u00a0Cryptography Is the Science of Information Security \u201c,\u00a0International Journal of Computer Science and\u00a0Security (IJCSS), Volume (5): Issue (3): 2011, pp. 298\u00a0\u2013 309<\/li>\n<li style=\"text-align: justify\">E. Thambiraja , G. Ramesh , R. Umarani , \u201cA Survey\u00a0on Various Most Common Encryption Techniques \u201c ,\u00a0International Journal of Advanced Research in\u00a0Computer Science and Software Engineering , Volume<br \/>\n2, Issue 7, July 2012 , pp. 226-233.<\/li>\n<li style=\"text-align: justify\">William M. Daley, Raymond G. Kammer, \u201cData\u00a0Encryption Standard (DES)\u201d, Federal Information\u00a0Processing Standards Publication FIPS Pub 46-3\u00a0National Institute Of Standards And Technology, 1999\u00a0October 25, pp. 1-22.<\/li>\n<li style=\"text-align: justify\">D.Coppersmith, \u201cThe Data Encryption Standred\u00a0(DES) and its Strength against attack \u201c, IBM Journal<br \/>\nResearch Development Vol 38 No. 3, May 1994, pp.\u00a0243- 250.<\/li>\n<li style=\"text-align: justify\">[10] Rijndael,\u201d ADVANCED ENCRYPTION\u00a0STANDARD (AES) \u201c, Federal Information Processing\u00a0Standards FIPS Publication 197 November 26, 2001,\u00a0pp. 1-47. National Institute of Standards and\u00a0Technology, Information Technology Laboratory\u00a0(ITL).<\/li>\n<li style=\"text-align: justify\">H. Al-Barhmtoshy, E. Osman, and M. Ezzat, \u201cA Novel\u00a0Security Model Combining Cryptography and\u00a0Steganography \u201c, 2004, pp- 483-490.<\/li>\n<li style=\"text-align: justify\">Cheddad, A., Condell, J., Curran, K. &amp; Mc Kevitt, P. \u201c\u00a0Securing information content using new encryption<br \/>\nmethod and steganography\u201d, In Proceedings of the 3rd\u00a0IEEE International Conference on Digital Information<br \/>\nManagement. London, UK, 2008d. 13-16 Nov. pp.\u00a0563-568.<\/li>\n<li style=\"text-align: justify\">Ajit Singh, Swati Malik, \u201c Securing Data by Using\u00a0Cryptography with Steganography \u201c, International\u00a0Journal of Advanced Research in Computer Science\u00a0and Software Engineering, Volume 3, Issue 5, May\u00a02013. Pp 404-409.\u00a0Dhawal Seth, L. Ramanathan,\u00a0Abhishek Pandey, \u201cSecurity Enhancement: Combining\u00a0Cryptography and Steganography\u201d, International\u00a0Journal of Computer Applications (0975 \u2013 8887)\u00a0Volume 9\u2013 No.11, November 2010, pp. 3-6.<\/li>\n<li style=\"text-align: justify\">Shouchao Song, Jie Zhang, Xin Liao, Jiao Du,\u00a0Qiaoyan Wen,\u201d A Novel Secure Communication<br \/>\nProtocol Combining Steganography and\u00a0Cryptography\u201d, Advanced in Control Engineering and\u00a0Information Science , Procedia Engineering 15 (2011)\u00a0, pp. 2767 \u2013 2772.<\/li>\n<li style=\"text-align: justify\">Khalil Challita, Hikmat Farhat,\u201d Combining Steganography and Cryptography: New Directions\u201d,\u00a0International Journal on New Computer Architectures and Their Applications (IJNCAA) 1(1): pp.199-208.<\/li>\n<li style=\"text-align: justify\">Smita P. Bansod , Vanita M. Mane, Leena R. Ragha ,\u201dModified BPCS steganography using Hybrid Cryptography for Improving Data embedding Capacity\u00a0\u201c,\u00a0\u00a0\u00a0 2012\u00a0\u00a0\u00a0 IEEE\u00a0\u00a0\u00a0 International\u00a0\u00a0\u00a0 Conference\u00a0\u00a0\u00a0 on\u00a0Communication, Information &amp; Computing Technology (ICCICT), Oct. 19-20, Mumbai, India. Pp 1-6.<\/li>\n<li style=\"text-align: justify\">Joseph Raphael, Dr. V. Sundaram, \u201cCryptography and Steganography \u2013 A Survey \u201c, International Journal\u00a0Comp. Tech. Appl., Vol 2 (3), 626-630.<\/li>\n<li style=\"text-align: justify\">Manoj Kumar\u00a0 Ramaiya,\u00a0 Naveen\u00a0 Hemrajani,\u00a0 Anil\u00a0Kishore Saxena , \u201c Security Improvisation in Image Steganography using DES \u201c , 3rd IEEE International Advance Computing Conference (IACC &#8211; 2013) ,Jan 2013, Gaziabad New Delhi , India ,pp 1082 \u2013 1087.<\/li>\n<li style=\"text-align: justify\">Manoj Kumar\u00a0 Ramaiya,\u00a0 Naveen\u00a0 Hemrajani,\u00a0 Anil\u00a0Kishore Saxena , \u201c Improvisatio of Security Aspect in Steganography applying DES \u201c , IEEE International Conference on Communication Systems and Network Technologies (CSNT &#8211; 2013) ,April 2013, Machine Intelligence Research Lab Gwalior , India ,pp 431 \u2013 436.<\/li>\n<li style=\"text-align: justify\">Manoj Kumar\u00a0 Ramaiya,\u00a0 Naveen\u00a0 Hemrajani,\u00a0 Anil\u00a0Kishore Saxena \u201cSecured Steganography Approach using AES \u201c , accepted for publication in International journal of Computer Science Engineering and\u00a0Information Technology Research journal, Transstellar Journal Publications and Research Consultancy Private Limited, (www.tjprc.org), TJPRC Global Research Community, which has offices all over the world &#8211; USA, UK, Singapore, Qatar and India with Impact Factor (JCC) &#8211; 6.3925, as published by <a href=\"http:\/\/www.journal-metrics.com\/\">www.journal-<\/a><a href=\"http:\/\/www.journal-metrics.com\/\">metrics.com.<\/a><\/li>\n<li style=\"text-align: justify\">S. Sutaone, M.V. Khandare, \u201cImage Based Steganography Using LSB Insertion Technique \u201c,\u00a0IEEE. pp 146-151.<\/li>\n<\/ol>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1177\" src=\"http:\/\/www.gyanvihar.org\/journals\/wp-content\/uploads\/2018\/12\/Capture-38.jpg\" alt=\"\" width=\"374\" height=\"230\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>1Manoj Kumar Ramaiya, 2Dinesh Goyal, 3Naveen Hemrajani 1Research Scholar, Computer Engineering, SGVU, Jaipur 2Principal, School of Engineering, SGVU, Jaipur 3Head Computer Engineering, JECRC University, Jaipur Abstract: The security of data over unsafe communication network has always been a primary concern in the attention of researchers. With the rapidly growing practise of the internet in all [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[26,31],"tags":[],"class_list":["post-878","post","type-post","status-publish","format-standard","hentry","category-international-journal-of-converging-technologies-management","category-volume-3-issue-1-2017"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>research journal - Research Journal<\/title>\n<meta name=\"description\" content=\"The security of data over unsafe communication network has always been a primary concern in the attention of researchers. SGVU Jaipur.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.gyanvihar.org\/journals\/enhancing-security-of-steganographic-system-using-tdea\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Enhancing Security Of Steganographic System Using TDEA | SGVU\" \/>\n<meta property=\"og:description\" content=\"The security of data over unsafe communication network has always been a primary concern in the attention of researchers. SGVU Jaipur.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.gyanvihar.org\/journals\/enhancing-security-of-steganographic-system-using-tdea\/\" \/>\n<meta property=\"og:site_name\" content=\"research journal\" \/>\n<meta property=\"article:published_time\" content=\"2018-12-03T10:49:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-05-28T13:20:56+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.gyanvihar.org\/journals\/wp-content\/uploads\/2018\/12\/Capture-31.jpg\" \/>\n<meta name=\"author\" content=\"gyanvihar3\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Enhancing Security Of Steganographic System Using TDEA | SGVU\" \/>\n<meta name=\"twitter:description\" content=\"The security of data over unsafe communication network has always been a primary concern in the attention of researchers. SGVU Jaipur.\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"gyanvihar3\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"12 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.gyanvihar.org\/journals\/enhancing-security-of-steganographic-system-using-tdea\/\",\"url\":\"https:\/\/www.gyanvihar.org\/journals\/enhancing-security-of-steganographic-system-using-tdea\/\",\"name\":\"Enhancing Security Of Steganographic System Using TDEA | SGVU\",\"isPartOf\":{\"@id\":\"https:\/\/www.gyanvihar.org\/journals\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.gyanvihar.org\/journals\/enhancing-security-of-steganographic-system-using-tdea\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.gyanvihar.org\/journals\/enhancing-security-of-steganographic-system-using-tdea\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/www.gyanvihar.org\/journals\/wp-content\/uploads\/2018\/12\/Capture-31.jpg\",\"datePublished\":\"2018-12-03T10:49:50+00:00\",\"dateModified\":\"2019-05-28T13:20:56+00:00\",\"author\":{\"@id\":\"https:\/\/www.gyanvihar.org\/journals\/#\/schema\/person\/0fee890b071b4083d5422be043bb99e9\"},\"description\":\"The security of data over unsafe communication network has always been a primary concern in the attention of researchers. SGVU Jaipur.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.gyanvihar.org\/journals\/enhancing-security-of-steganographic-system-using-tdea\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.gyanvihar.org\/journals\/enhancing-security-of-steganographic-system-using-tdea\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.gyanvihar.org\/journals\/enhancing-security-of-steganographic-system-using-tdea\/#primaryimage\",\"url\":\"https:\/\/www.gyanvihar.org\/journals\/uploads\/2018\/12\/Capture-31.jpg\",\"contentUrl\":\"https:\/\/www.gyanvihar.org\/journals\/uploads\/2018\/12\/Capture-31.jpg\",\"width\":297,\"height\":54},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.gyanvihar.org\/journals\/enhancing-security-of-steganographic-system-using-tdea\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.gyanvihar.org\/journals\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Enhancing Security of Steganographic System using TDEA\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.gyanvihar.org\/journals\/#website\",\"url\":\"https:\/\/www.gyanvihar.org\/journals\/\",\"name\":\"research journal\",\"description\":\"Research Journal\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.gyanvihar.org\/journals\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.gyanvihar.org\/journals\/#\/schema\/person\/0fee890b071b4083d5422be043bb99e9\",\"name\":\"gyanvihar3\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.gyanvihar.org\/journals\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ea51e7e852346f1b6b7715e7b9b893df?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ea51e7e852346f1b6b7715e7b9b893df?s=96&d=mm&r=g\",\"caption\":\"gyanvihar3\"},\"url\":\"https:\/\/www.gyanvihar.org\/journals\/author\/gyanvihar3\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"research journal - Research Journal","description":"The security of data over unsafe communication network has always been a primary concern in the attention of researchers. SGVU Jaipur.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.gyanvihar.org\/journals\/enhancing-security-of-steganographic-system-using-tdea\/","og_locale":"en_US","og_type":"article","og_title":"Enhancing Security Of Steganographic System Using TDEA | SGVU","og_description":"The security of data over unsafe communication network has always been a primary concern in the attention of researchers. SGVU Jaipur.","og_url":"https:\/\/www.gyanvihar.org\/journals\/enhancing-security-of-steganographic-system-using-tdea\/","og_site_name":"research journal","article_published_time":"2018-12-03T10:49:50+00:00","article_modified_time":"2019-05-28T13:20:56+00:00","og_image":[{"url":"http:\/\/www.gyanvihar.org\/journals\/wp-content\/uploads\/2018\/12\/Capture-31.jpg","type":"","width":"","height":""}],"author":"gyanvihar3","twitter_card":"summary_large_image","twitter_title":"Enhancing Security Of Steganographic System Using TDEA | SGVU","twitter_description":"The security of data over unsafe communication network has always been a primary concern in the attention of researchers. SGVU Jaipur.","twitter_misc":{"Written by":"gyanvihar3","Est. reading time":"12 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.gyanvihar.org\/journals\/enhancing-security-of-steganographic-system-using-tdea\/","url":"https:\/\/www.gyanvihar.org\/journals\/enhancing-security-of-steganographic-system-using-tdea\/","name":"Enhancing Security Of Steganographic System Using TDEA | SGVU","isPartOf":{"@id":"https:\/\/www.gyanvihar.org\/journals\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.gyanvihar.org\/journals\/enhancing-security-of-steganographic-system-using-tdea\/#primaryimage"},"image":{"@id":"https:\/\/www.gyanvihar.org\/journals\/enhancing-security-of-steganographic-system-using-tdea\/#primaryimage"},"thumbnailUrl":"http:\/\/www.gyanvihar.org\/journals\/wp-content\/uploads\/2018\/12\/Capture-31.jpg","datePublished":"2018-12-03T10:49:50+00:00","dateModified":"2019-05-28T13:20:56+00:00","author":{"@id":"https:\/\/www.gyanvihar.org\/journals\/#\/schema\/person\/0fee890b071b4083d5422be043bb99e9"},"description":"The security of data over unsafe communication network has always been a primary concern in the attention of researchers. SGVU Jaipur.","breadcrumb":{"@id":"https:\/\/www.gyanvihar.org\/journals\/enhancing-security-of-steganographic-system-using-tdea\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.gyanvihar.org\/journals\/enhancing-security-of-steganographic-system-using-tdea\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.gyanvihar.org\/journals\/enhancing-security-of-steganographic-system-using-tdea\/#primaryimage","url":"https:\/\/www.gyanvihar.org\/journals\/uploads\/2018\/12\/Capture-31.jpg","contentUrl":"https:\/\/www.gyanvihar.org\/journals\/uploads\/2018\/12\/Capture-31.jpg","width":297,"height":54},{"@type":"BreadcrumbList","@id":"https:\/\/www.gyanvihar.org\/journals\/enhancing-security-of-steganographic-system-using-tdea\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.gyanvihar.org\/journals\/"},{"@type":"ListItem","position":2,"name":"Enhancing Security of Steganographic System using TDEA"}]},{"@type":"WebSite","@id":"https:\/\/www.gyanvihar.org\/journals\/#website","url":"https:\/\/www.gyanvihar.org\/journals\/","name":"research journal","description":"Research Journal","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.gyanvihar.org\/journals\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.gyanvihar.org\/journals\/#\/schema\/person\/0fee890b071b4083d5422be043bb99e9","name":"gyanvihar3","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.gyanvihar.org\/journals\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ea51e7e852346f1b6b7715e7b9b893df?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ea51e7e852346f1b6b7715e7b9b893df?s=96&d=mm&r=g","caption":"gyanvihar3"},"url":"https:\/\/www.gyanvihar.org\/journals\/author\/gyanvihar3\/"}]}},"_links":{"self":[{"href":"https:\/\/www.gyanvihar.org\/journals\/wp-json\/wp\/v2\/posts\/878","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.gyanvihar.org\/journals\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.gyanvihar.org\/journals\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.gyanvihar.org\/journals\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.gyanvihar.org\/journals\/wp-json\/wp\/v2\/comments?post=878"}],"version-history":[{"count":5,"href":"https:\/\/www.gyanvihar.org\/journals\/wp-json\/wp\/v2\/posts\/878\/revisions"}],"predecessor-version":[{"id":2811,"href":"https:\/\/www.gyanvihar.org\/journals\/wp-json\/wp\/v2\/posts\/878\/revisions\/2811"}],"wp:attachment":[{"href":"https:\/\/www.gyanvihar.org\/journals\/wp-json\/wp\/v2\/media?parent=878"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.gyanvihar.org\/journals\/wp-json\/wp\/v2\/categories?post=878"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.gyanvihar.org\/journals\/wp-json\/wp\/v2\/tags?post=878"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}