Abstract

This paper presents a critical analysis on new and original proposed algorithm based on hiding any data has been used that overcomes the disadvantages of the existing algorithms and helps to provide less similarity between cover image and stego image and obtain accuracy upto 69.6 percentage and increases its robustness using metrics called mean square error and peak signal to noise ratio. In the wireless environment cryptography suffers from various spyware programs that shows corrupted secret information to innocent users who uses image steganography services from user. In our proposed prototype helps to authenticate the sender to make the unnoticeable image from original image. In our proposal work discovers a secure authentication communication model would able to cover multimedia data like first text to be hide, second image to be hide and third audio secret data to be hide in cover image without much noticed to any user in between network. The proposed algorithm has been tested against various existing algorithms to develop how effectively the hybrid steganography algorithm is works, and how effectively it is overcoming the drawbacks of the present image steganography algorithms. The present work is projected to serve the purpose of prevention of changing secret data in cover image after evaluating the distraction values using PSNR and RMSE quality metrics under various image data set taken from facebook shared images . In the scientific investigation, researchers found that three reasons to show that given secure communication is successfully designed with the help of hybrid steganography algorithm that could break attackers intention using TLNUS merged with AES and Key based positioning system[4] gain access the sensitive information available in remote system

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.