A RSA- DWT Based Visual Cryptographic Steganogrphy Technique

Mohit Kumar Goel, Dr. Neelu Jain


With the development of science, digital media can be transmitted conveniently over the internet. The security of the data is essential issue for the internet. The security of information can be achieved by cryptography and steganography. Cryptography scrambles the data to hides the contents of message. Steganography hides the existence of message by embedding data in some other digital media like image or audio files. The paper proposes a security method which uses both encryption and data hiding. In proposed system data is firstly encrypted using RSA encryption algorithm and then embedded in an image using Haar-DWT based steganographic method. The experimental result shows that proposed system has better PSNR value and high capacity in comparison to other techniques like LSB and LSB-DCT steganography.


;data hiding, discrete wavelet transform;RSA encryption; steganography.


DES Encryption Standard (DES), National Bureau of Standard (U.S.). Federal Information Processing Standards Publication 46, National Technical Information Service, Springfield, VA, 1997.

Daemen J., and Rijmen, V. “Rijndael: The Advanced Encryption Standard”, Dr. Dobb’s Journal, March 2001.

R. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems”. Communication of the ACM, pp. 120-126, 1978.

Chan, C.K. and Cheng. L.M. “Hiding data in image by simple LSB substitution. Pattern Recognition”, 37, pp. 469 – 474, 2004.

N. Nikolaidis, and I. Pitas, “Robust Image Watermarking in the Spatial Domain”, Signal Processing, 66(3), pp. 385-403, 1998

J. Fridrich, M. Goljan, “ Steganalysis of JPEG Images: Breaking the F5 Algorithm”, Publisher: Springer Berlin, Heidelberg, Lecture Notes in Computer Science, vol. 2578, pp 310-323, 2003.

M. A. Bani Younes, A. Jantan, “A New Steganography Approach for Image Encryption Exchange by Using the Least Significant Bit Insertion”, IJCSNS, International Journal of Computer Science and Network Security, vol. 8 No. 6, June 2008.

Sayuthi Jaafar, Azizah A Manaf, Akram M Zeki, “Steganography Technique using Modulus Arithmetic”, 9th International Symposium on Signal Processing and Its Applications, pp. 1 – 4, April 2007.

Iwata M., Miyake K., and Shiozaki, “Digital Steganography Utilizing Features of JPEG Images”, IEICE Transfusion Fundamentals, E87-A, 4, pp. 929 – 936, 2004.

M. Kharrazi, H. Sencar, and N. Memon, “Performance study of common image steganography and steganalysis techniques,” Communications of the SPIE and IS&T, 15, No.4, pp. 1017-9909, Oct-Dec., 2006.

Nedal M.S. Kafari, Hani Y. Suleiman, “Bit-4 of Frequency Domain DCT Steganography Technique”, First National Conference on Network Digital Technologies, PP. 286-291, 2009.

Amitava Nag, Sushanta Biswas and Debasree Sarkar, “A Novel Technique for Image Steganography Based on DWT and Huffman Encoding”, International Journal of Computer Science and Security, (IJCSS), vol. 4, pp. 561-570, 2011

Wai Wai Zin, Than Naing Soe, “Implementation and Analysis of Three Steganographic Approaches”, Proceedings of 3rd International conference on Computer Research and Development (ICCRD), 2011, vol. 2, p.p. 456-460.

Piyush Marwaha, Paresh Marwaha, “Visual cryptographic steganography in images”, Proceedings of international conference on Computing Communication and Networking Technologies, 2010, p.p. 1-6.

L. Davidson, and P. Goutam, “Locating secret message in images”, In ACM SIGKDD international conference on Knowledge discovery and data mining, (Seattle, Washington, Aug.22-25. ACM 1-58113-888-1, 2004.

Gonzalez, R.C. and Woods, R.E., Digital Image Processing using MATLAB, Pearson Education, India,2006.

Full Text: PDF


  • There are currently no refbacks.


All Rights Reserved © 2012 IJARCSEE

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 Unported License.