IMAGE STEGANOGRAPHY FOR SECURE DATA TRANSMISSION USING BLOWFISH ALGORITHM



Similar documents
A Secure Data Transmission By Integrating Cryptography And Video Steganography

STEGANOGRAPHY: TEXT FILE HIDING IN IMAGE YAW CHOON KIT CA10022

A Robust and Lossless Information Embedding in Image Based on DCT and Scrambling Algorithms

Safer data transmission using Steganography

Security and protection of digital images by using watermarking methods

Alaa Alhamami, Avan Sabah Hamdi Amman Arab University Amman, Jordan

Triple Security of Information Using Stegnography and Cryptography

Image Authentication Scheme using Digital Signature and Digital Watermarking

Multi-factor Authentication in Banking Sector

A Secure File Transfer based on Discrete Wavelet Transformation and Audio Watermarking Techniques

AN ENHANCED MECHANISM FOR SECURE DATA TRANSMISSION USING STEGANOGRAPHY MERGED WITH VISUAL CRYPTOGRAPHY

Image Compression through DCT and Huffman Coding Technique

CHAPTER 7 CONCLUSION AND FUTURE WORK

International Journal of Advanced Computer Technology (IJACT) ISSN: Least Significant Bit algorithm for image steganography

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

Fuzzy Keyword Search over Encrypted Stego in Cloud

A Concept of Digital Picture Envelope for Internet Communication

Multimedia Document Authentication using On-line Signatures as Watermarks

SECURE DATA TRANSMISSION USING DIGITAL IMAGE WATERMARKING

2695 P a g e. IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India

PERFORMANCE ANALYSIS OF HIGH RESOLUTION IMAGES USING INTERPOLATION TECHNIQUES IN MULTIMEDIA COMMUNICATION SYSTEM

A comprehensive survey on various ETC techniques for secure Data transmission

JPEG Image Compression by Using DCT

Friendly Medical Image Sharing Scheme

Soumendu Chakraborty, Anand Singh Jalal* and Charul Bhatnagar

ROI Based Medical Image Watermarking with Zero Distortion and Enhanced Security

Reversible Data Hiding for Security Applications

Video-Conferencing System

CHAPTER 1 INTRODUCTION

Steganography and Visual Cryptography in Computer Forensics

Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies

Broadband Networks. Prof. Dr. Abhay Karandikar. Electrical Engineering Department. Indian Institute of Technology, Bombay. Lecture - 29.

Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur

A NOVEL STRATEGY TO PROVIDE SECURE CHANNEL OVER WIRELESS TO WIRE COMMUNICATION

Keywords Decryption, Encryption,password attack, Replay attack, steganography, Visual cryptography EXISTING SYSTEM OF KERBEROS

INTERNATIONAL JOURNAL OF APPLIED ENGINEERING RESEARCH, DINDIGUL Volume 1, No 3, 2010

Video compression: Performance of available codec software

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

Steganography- A Data Hiding Technique

Parametric Comparison of H.264 with Existing Video Standards

Conceptual Framework Strategies for Image Compression: A Review

How to Send Video Images Through Internet

A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS)

Block encryption. CS-4920: Lecture 7 Secret key cryptography. Determining the plaintext ciphertext mapping. CS4920-Lecture 7 4/1/2015

Image Information Hiding: An Survey

Username: Lab date and time: CSC 101: Lab #11 Manual and Report: Cryptography Due date: 5:00pm, day after lab session

A Novel Security Scheme for Secret Data using Cryptography and Steganography

AN OVERVIEW OF IMAGE STEGANOGRAPHY

WATERMARKING FOR IMAGE AUTHENTICATION

International ejournals

A Survey on Performance Analysis of DES, AES and RSA Algorithm along with LSB Substitution Technique

Watermarking Techniques for Protecting Intellectual Properties in a Digital Environment

Cardless Cash Access Using Biometric ATM Security System Neenu Preetam. I 1, Harsh Gupta 2

International Journal of Computer Sciences and Engineering Open Access. A novel technique to hide information using Daubechies Transformation

Security Based Data Transfer and Privacy Storage through Watermark Detection

SURVEY ON INFORMATION HIDING TECHNIQUES USING QR BARCODE

FAREY FRACTION BASED VECTOR PROCESSING FOR SECURE DATA TRANSMISSION

Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi

Comparison of different image compression formats. ECE 533 Project Report Paula Aguilera

Cryptography: Motivation. Data Structures and Algorithms Cryptography. Secret Writing Methods. Many areas have sensitive information, e.g.

Information, Entropy, and Coding

Database Migration over Network

A Novel Cryptographic Key Generation Method Using Image Features

encoding compression encryption

Invisible Image Water Marking Using Hybrid DWT Compression/Decompression Technique

An Application of Visual Cryptography To Financial Documents

First Semester Examinations 2011/12 INTERNET PRINCIPLES

Study and Implementation of Video Compression Standards (H.264/AVC and Dirac)

Covert Channels. Some instances of use: Hotels that block specific ports Countries that block some access

Bit-Level Encryption and Decryption of Images Using Genetic Algorithm: A New Approach

Experimental DRM Architecture Using Watermarking and PKI

A Model-based Methodology for Developing Secure VoIP Systems


AUTHORIZED WATERMARKING AND ENCRYPTION SYSTEM BASED ON WAVELET TRANSFORM FOR TELERADIOLOGY SECURITY ISSUES

Design and Implementation of Asymmetric Cryptography Using AES Algorithm

Overview/Questions. What is Cryptography? The Caesar Shift Cipher. CS101 Lecture 21: Overview of Cryptography

Encryption Quality Analysis and Security Evaluation of CAST-128 Algorithm and its Modified Version using Digital Images

JPEG compression of monochrome 2D-barcode images using DCT coefficient distributions

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

A Novel Watermarking Method using Geographical Random Image for Cloud Computing based on DCT Reversible Color Hiding Algorithm

Study on Image Steganography Techniques

Network Security. Chapter 12. Learning Objectives. Chapter Outline. After reading this chapter, you should be able to:

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Online Voting System Using Three Factor Authentication

To Enhance The Security In Data Mining Using Integration Of Cryptograhic And Data Mining Algorithms

Data Hiding: Current Status and Key Issues

GiLBCSteg: VoIP Steganography Utilizing the Internet Low Bit-Rate Codec

The Danger of Data Exfiltration over Social Media Sites

Application-Specific Biometric Templates

Steganography Based Seaport Security Communication System

How To Encrypt With A 64 Bit Block Cipher

Introduction to image coding

(C) Global Journal of Engineering Science and Research Management

A Review of Anomaly Detection Techniques in Network Intrusion Detection System

SOFTWARE AND HARDWARE-IN-THE-LOOP MODELING OF AN AUDIO WATERMARKING ALGORITHM. Ismael Zárate Orozco, B.E. Thesis Prepared for the Degree of

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Karagpur

AStudyofEncryptionAlgorithmsAESDESandRSAforSecurity

FCE: A Fast Content Expression for Server-based Computing

Network Security: Cryptography CS/SS G513 S.K. Sahay

An Efficient Compression of Strongly Encrypted Images using Error Prediction, AES and Run Length Coding

Transcription:

IMAGE STEGANOGRAPHY FOR SECURE DATA TRANSMISSION USING BLOWFISH ALGORITHM BARJINDER SINGH 1, BALPREET KAUR 2, RANJOT KAUR 3 1 Research Scholar at BBSBEC, Fatehgarh sahib 2 Lecturer at BBSBEC Fatehgarh sahib 3 System engineer, Infosys Mysore ABSTRACT: Steganography is the branch of the cryptography in which the data has to be transmitted securely to the receiver end. In the process of steganography different types of steganography approaches has been used so that these can transmit data securely. In this paper image steganography has been performed using multiple least significant bits of the cover image with blow fish encryption algorithm. Blowfish algorithm provides much security to the secret data by converting secret information into cipher text. In this paper image steganography has been used with encryption approach that provides much better results as compare to other approaches. Keywords: LSB, ISB, Blowfish, PSNR and MSE I INTRODUCTION The word steganography is derived from the Greek words stegos meaning cover and grafia meaning writing defining it as covered writing. Steganography is one such pro-security advancement in which mystery information is inserted in a spread [2][4]. There are many different protocols and embedding techniques that enable us to hide data in a given object. However, all of the protocols and techniques must satisfy a number of requirements so that steganography can be applied correctly the following is a list of main requirements that steganography techniques must satisfy: a) The integrity of the hidden information after it has been embedded inside the stego object must be correct. b) The stego object must remain unchanged or almost unchanged to the naked eye. c) In watermarking, changes in the stego object must have no effect on the watermark. d) Finally, we always assume that the attacker knows that there is hidden information inside the stego object. Figure 1.1: Stegnography TYPES OF STEGANOGRAPHY Text Steganography: Text steganography can be accomplished by changing the content arranging, or by modifying certain qualities of textual elements (e.g., characters). The objective in the configuration of coding techniques is to create modifications that are dependably decodable (even in the vicinity of clamor) yet generally confused to the perused. These criteria, dependable unraveling and minimum visible change, are to some degree clashing; thus lies the test in planning report stamping methods. Image Steganography: Concealing data inside pictures is a prominent procedure these days. A picture with a mystery message inside can undoubtedly be spread over the World Wide Web or in newsgroups [3][5]. Least Significant Bits: A basic methodology for installing data in spread picture is utilizing Least Significant Bits (LSB). The least complex steganography systems embed the bits of the message specifically into least significant bit plane of ISSN 2394-0573 All Rights Reserved 2014 IJEETE Page 87

the spread picture in a deterministic arrangement. Modulating the least significant bit does not bring about humannoticeable distinction on the grounds that the abundance of the change is little[1]. Image Compression: At the point when working with bigger pictures of more noteworthy bit depth, the pictures have a tendency to end up excessively extensive to transmit more than a standard Internet association. To show a picture in a sensible measure of time, methods must be consolidated to decrease the picture's record size. These strategies make utilization of numerical recipes to examine what's more consolidate picture information, bringing about littler document sizes. This methodology is called pressure. In pictures there are two sorts of pressure: lossy and Video Steganography lossless. Both routines spare storage room, however the methodology that they execute vary. Lossy pressure makes littler records via tossing overabundance picture information from the first picture. Audio Steganography: In audio steganography, mystery message is embedded into digitized sound signal which result slight adjusting of double arrangement of the relating audio record. There are a few routines are accessible for sound steganography. We are going to have a short presentation on some of them. LSB Coding: Examining procedure took after by Quantization changes over simple sound sign to computerized parallel succession. In this strategy LSB of paired arrangement of every example of digitized sound record is replaced with binary likeness mystery message.[1] Phase Coding: Human Auditory System (HAS) can't perceive the stage change in sound flag as simple it can perceive clamor in the sign. The stage coding technique abuses this. This method encodes the mystery message bits as stage moves in the stage range of a computerized sign, attaining to an indistinct encoding as far as sign tocommotion proportion. Spread Spectrum: There are two methodologies are utilized as a part of this strategy: the direct sequence spread spectrum (DSSS) and frequency hopping spread spectrum (FHSS). Direct-sequence spread spectrum (DSSS) is a balance system utilized as a part of telecom. Similarly as with other spread range advancements, the transmitted sign takes up more transfer speed than the data signal that is being balanced. Direct-grouping spread-range transmissions duplicate the information being transmitted by a "noise" signal. This noise signal is a pseudo random arrangement of 1 and 1 values, at a recurrence much higher than that of the first signal, along these lines spreading the vitality of the first signal into a much more extensive band. : Despite the fact that BMP records are ideal for steganography utilization, they find themselves able to convey just little documents. So there is an issue, how to get sufficiently many documents to conceal our message, and what to do to peruse them in a right request? Great way out is to shroud data in a feature document, on the grounds that as we know, AVI records are made out of bitmaps, consolidated into one piece, which are played in right request and with fitting time crevice. Remembering that we should simply to get out is record single edges and spares them as BMP records. In the event that we'll utilize calculation for concealing information as a part of computerized pictures, we can conceal our message in bitmap got along these lines, and afterward spare it into new AVI record. We'll break down just uncompressed AVI record, on the grounds that if any pressure is executed documents lose its information. AVI documents are made out of few streams. Fundamental document stream is a feature stream and sound stream, which can be record of any augmentation, for instance WAVE. In view of presence of those streams, it is conceivable to conceal information in record's casings as well as in said sound stream. Because of this we can consolidate chances of concealing information in advanced pictures and in sound records. ISSN 2394-0573 All Rights Reserved 2014 IJEETE Page 88

Protocol steganography:: The term protocol steganography is to embedding information within network protocols such as TCP/IP. We hide information in the header of a TCP/IP packet in some fields that can be either optional or are never used. 1.3 Steganography Techniques Substitution Technique: In the substitution technique, the repetitive parts are secured with a mystery message. This procedure incorporates the Least Significant Bit Substitution system, where we pick a subset of spread components and substitute the slightest huge bits of every component by the message bits.message may be scrambled or packed before stowing away. A pseudo random number generator may be utilized to spread the mystery message over the spread in an irregular way. This is a simple strategy yet is defenseless against debasement because of little changes in bearer. Spread Spectrum Technique: This strategy utilizes the idea of spread range. The message is spread over a wide recurrence transfer speed. The sign to commotion proportion in every recurrence band is small to the point that it is hard to catch. Regardless of the fact that parts of message are expelled from a few groups, enough data is show in different groups to recuperate the data. In this way it is hard to evacuate the message totally without altogether devastating the spread. It is an exceptionally strong method that discovers application in military correspondence. Transform Domain Technique: In the transfer domain technique; the secret message is embedded in the transform space (e.g. frequency domain) of the cover. An example of this method includes the Discrete Cosine Transform (DCT) domain. The cover image is split into 8*8 blocks and each block is used to encode one message bit. The blocks are chosen in a pseudorandom manner. The relative size of two predefined DCT coefficients is modulated using the message bit. The two coefficients are chosen from middle frequencies. Distortion Techniques: The data is put away by distorting the sign. The encoder applies a succession of changes to the spread. This grouping compares to the mystery message. The decoder measures the contrasts between the first cover and the contorted spread to identify the grouping of alterations and therefore recuperate the mystery message. This strategy is not utilized as a part of numerous applications on the grounds that the decoder must have entry to the first cover. Statistical Techniques: In the statistical techniques, the information is encoded by changing several properties of the cover. The cover is split into blocks and each block is used to hide one message bit.if the message bit is one, then the cover block is modified otherwise the cover block is not modified. This technique is difficult to apply because a good test must be found that allows for proper distinction between modified and unmodified cover blocks. Protection of Data Alteration: We exploit the delicacy of the inserted information in this application zone Getup. On the off chance that it is actualized, individuals can send their "computerized endorsement information" to wherever on the planet through Internet. Nobody can fashion, change, nor alter such authentication information. In the event that manufactured, modified, or altered, it is effectively located by the extraction program Protection of Data Alteration. II RELATED WORK Tiwari et al. [1] Color Guided Color Image Steganography Author want to propose that most of the data hiding methods in image Steganography used a technique utilizing the Least Significant Bits (LSB) of the pixels, i.e. the LSB of each pixel is replaced to hide bits of the secret message. This, normally, produce changes in the cover media but with no significant effect. All the LSBs of pixels of cover image can be used for hiding the secret bits. The hidden information can easily be uncovered using many known statistical steganalysis techniques, such as the Χ2 that can detect the concealed data inside the image with its original size. ISSN 2394-0573 All Rights Reserved 2014 IJEETE Page 89

Marwaha et al. [2] Pixel Indicator High Capacity Technique for RGB Image Based Steganography in this paper author want to say that the multimedia steganocryptic system, the message will first be encrypted using public key encryption algorithm, and then this encrypted data will be hidden into an image file thus accomplishing both data encoding and hiding. The multimedia data will be used to provide the cover for the information. Each color in the multimedia data when considered as an element in an arrangement of 3D matrix with R, G and B as axis can be used to write a cipher (encoded message) on a 3D space. The method which we will use to map the data is a block or a grid cipher. This cipher will contain the data which will be mapped in a 3-D matrix form where the x-axis can be for R (red), y-axis can be for G green) and z-axis can be for B (blue). Embedding data into an image often changes the colour. Getup et al. [3] Pixel Indicator Technique for RGB Image Steganography in sequence, if the first indicator selection is the Red channel in the pixel, the Green is channel 1 and the Blue is the channel 2 i.e. the sequence is RGB. In the second pixel if we select, Green as the indicator, then Red is channel 1 and Blue is channel 2 i.e. the sequence is GRB. If in third pixel Blue is the indicator, then Red is channel 1 and Green is channel 2. The sequence of the algorithm is given below. The first 8 bytes at the beginning of the image are used to store the size of the hidden message, which is also used to define the beginning of the indicator channel sequence. These 8 bytes consumes all LSBs of the RGB channels, assuming it is enough to store the size of the hidden bits. To choose the first indicator channel, the size stored in the first 8 bytes is used. Bailey and Curran [4] Visual cryptographic Steganography in images Author described an image based multi-bit Steganography technique to increase capacity hiding secrets in number of bits, i.e. Stego-1bit, Stego-2bits, Stego-3bits and Stego-4bits. Stego-1bit is the simplest of this, where it inserts the secret message data into one LSB (lower order bit) of the image pixels, which is undetectable. Hide and Seek is an example of this technique. Note that if this bit insertion is performed into the higher order bit (most significant bit), the value of the pixel will show a great detectable change spoiling its security. It is known that insertion of hidden bits into lowest order. Amirtharajan et al. [5] An evaluation of image based Steganography methods Author use one component case: here we have 3 ways to determine the bits * 3 ways to decide the component R, G or B. this results in 9 cases. Using two component case: here we have 3 ways to determine the bits * 3 ways to decide the component RG, RG or GB. This results in 9 cases. Using three component case: here we have 3 ways to determine the bits * one way to decide the component which is RGB. This results in 3 cases. The average capacity ratio is around 1/7 or 14% of the original cover media size. The secret data is scattered throughout the whole image. Also, extracting the secret data without the knowledge of seeds is almost impossible. III PROBLEM FORMULATION Steganography is a technique for the secure transmission of data over the network. In this process, the secret information is transmitted by hiding this behind a signal or image or video. Image stenography is another approach which utilizes an image for the secure transmission of data by hiding it behind a cover image. In this process image is divided into different regions for the detection of least significant bits available in different images. The no. of bits that can be utilized for image enhancement depend upon the pixel intensity the low intensity pixel utilizes less no. of bits and pixel having a high intensity utilized maximum bits in the process of hiding the image. The issue in this is security for prevention image from stegnalysis attack and the secret data is available in such a manner as it transmitted. The issue of security has been resolved by using encryption for the security issue occurred in stagnlysis attack. These embedding of the image done by using MLSB for data embedding according to pixel intensity value. ISSN 2394-0573 All Rights Reserved 2014 IJEETE Page 90

IV METHODOLOGY In the concept of steganography different secret information has to be embedded behind a cover object. In the process of steagnography the secret data has to be embedded behind least significant bits of the image. In the purposed work different bits has been used for embedding of secret information. In the purposed work blowfish algorithm is used for the purpose of encryption to provide security to the information to get affected from any attack. Blow fish algorithm utilizes the different 16 bit key for encryption of data. This algorithm use S-box for the key division into 16 different keys. On the basis of these 16 different keys plaintext has to be converted into cipher text. This cipher text generated by blow fish algorithm use permutation, inverse permutation, key and plain text. After encryption of the secret information different least significant bits of different colors available in the image has been extracted and in these least significant bits the encrypted cipher text data has to be embedded using XOR operation. XOR operation use different binary numbers to perform XOR operation. the image that has been embedded behind the cover image. V RESULTS In the process of image steganography different images have been embedded behind a cover image in encryption format. In this image is embedded behind the cover image by using multiple least significant bits. This figure represents the secret image that has been selected for embedding behind the cover image. Cover image that has to be selected for embedding must be big in size than that of secret image so that the image can be embedded easily. This image has to be encrypted by using blowfish algorithm. Blowfish algorithm covert the image pixel value into the cipher text so that proper contents of the image cannot be easily identified. 1. First Bit 2. Second Bit 3. Result 4. 0 5. 0 6. 0 7. 0 8. 1 9. 1 10. 1 11. 0 12. 1 13. 1 14. 1 15. 0 16. Table 4.1 XOR operation After embedding using XOR operation image is reconstructed and transmit over the network. After the process of steagnography secret image has to be extracted from the stego image. In this process stego image is taken and least significant bits from Red, Green and Blue color has been extracted and by performing the XOR operation embedding information has been extracted. This extracted information is in the form of cipher text. This cipher text has to be converted into plain text by decryption process by providing key as an input. Plain text is reshaped in the form of image to reconstruct Figure 5.2 Cover image This figure represents the cover image that has been selected for extraction of least significant bits from different color regions of the image. This cover image has to be divided into different red green and blue regions so that the least significant bits from each region of the image can be extracted. These bits that have been extracted from cover image have to be utilized with the bits of the cipher text so that these can be easily embedded. After embedding the mage into the cover image the image has to be transmitted over the network so that the image can be extracted at the receiver end. In this purposed work to validate the performance of the encryption approach salt and pepper attack has been performed on the ISSN 2394-0573 All Rights Reserved 2014 IJEETE Page 91

image so that this image can be extracted to be These parameters has been computed for verified. different images. Image name PSNR MSE Bird.jpg 74.28 0.100 0.997 Lena.jpg 70.13 0.159 0.998 Correlation Table 5.1 Parameter for purposed work Figure 5.3 Salt and Pepper attacked image This figure represents the image that has been extracted after the attack of variation intensity has been performed on the image. After the attack that has been performed on the image the least significant bits of the image has to be extracted s that these can be used for extraction encrypted bits embedded behind the image. Figure 5.4 Extracted encrypted image This figure represents the image that has been in the encrypted form that cannot be properly visualizing the contents of the image. Figure 5.4 Extracted image This figure represents the image that has been extracted from stego image after performing the decryption. Decryption converts the cipher text into the plaintext and retrieves the image. The performance of the purposed approach has been evaluated by using three different parameters. These parameters are peak signal noise ratio, mean square error and correlation. This table represents the different parameters for different image that has been embedded behind the cover image. VI CONCLUSION Image steganography deals with secure transmission of secret data by hiding the secret information behind the cover object. In this process the secret information has to be embedded with least significant bits of the cover image so that the cover image does not get distorted. By using multiple least significant bits and blow fish encryption approach the image that has been embedded behind the cover image provide sharper results than that of the other approaches. The different noise attacks have been performed on the stego image but the qualities of the secret image always remain same. By analyzing various parameters of the secret image one can conclude that purposed work provide much better results in terms of quality and security. REFRENCES [1] Getup, A. Pixel Indicator Technique for RGB Image Steganography, Journal of Emerging Technologies in Web Intelligence, Vol. 2, No.1,IEEE,2010, pp. 193-198. [2] Marwaha, P. Visual cryptographic Steganography in images, Second International conference on Computing, Communication and Networking Technologies, IEEE, 2010, pp. 34-39. [3] Bailey, K. An evaluation of image based Steganography methods, Journal of Multimedia Tools and Applications, Vol. 30, No. 1, IEEE, 2006, pp. 55-88. [4] Mahata, S.K. A Novel Approach of ISSN 2394-0573 All Rights Reserved 2014 IJEETE Page 92

[5] Steganography using Hill Cipher, International Conference on Computing, Communication and Sensor Network (CCSN), IEEE, 2012, pp. 0975-888. [6] Chapman, M. Davida G, and Rennhard M. A Practical and Effective Approach to Large Scale Automated Linguistic Steganography found online at Steganography http://www.nicetext.com/doc/isc01.pdf. [7] Mehboob, B. A Steganography implementation, Biometrics and Security Technologies, 2008. ISBAST 2008. International Symposium, ISSN 978-1- 4244-2427-6, IEEE, 2008, pp.1 5. [8] Saravanan, V. Security issues in computer networks and Steganography, Intelligent Systems and Control (ISCO), 2013 7th International Conference, ISSN 978-1- 4673-4359-6, IEEE, 2013, pp. 363 366. [9] Moon, S.K. Data Security Using Data Hiding Conference on Computational Intelligence and Multimedia Applications, 2007. International Conference, ISSN 0 7695-3050-8, IEEE, 2007, pp. 247 251. [10] Behera, S.K. Color Guided Color Image Steganography, Universal Journal of Computer Science and Engineering Technology, Vol. 1, No. 1, IEEE, 2010, pp. 16-23. [11] Yongzhen Zheng A Method Based on Feature Matching to Identify Software Fourth International Conference on Multimedia Information Networking and Security (MINES), IEEE, 2012, pp. 989 994. AUTHOR S BIBLOGRAPHY Barjinder singh is pursuing M.tech in E-security from Baba Banda Singh Bahadur Engineering college Fathegarh sahib. Have completed B.tech in Information technology from Baba Banda Singh Bahadur Engineering college in year 2013. ISSN 2394-0573 All Rights Reserved 2014 IJEETE Page 93