Loading

Adaptive Steganography technique using DIDC Model
Jyoti Neginal1, Ruksar Fatima2

1Jyoti Neginal,  Assistant Professor, Department of Computer Science, Godutai Engineering College for Women, VTU, Kalaburgi, India.
2Dr. Ruksar Fatima, Vice principal, Department of Computer Science, KBN College of Engineering, VTU, Kalaburgi, India.
Manuscript received on May 08, 2020. | Revised Manuscript received on May 20, 2020. | Manuscript published on June 10, 2020. | PP: 47-55 | Volume-9 Issue-8, June 2020. | Retrieval Number: 100.1/ijitee.H6138069820 | DOI: 10.35940/ijitee.H6138.069820
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Digital media emergence has taken the world by storm, further with the growth of digital media also causes the high risk of security and it needs to be addressed. Data security is protecting the data, normally data protecting is parted into two category i.e. cryptography and stenography. Steganography provides the high-level security by hiding one data under the other; the data can be image, text or any other formats, image steganography is one of the highly research area and several researcher have proposed different technique. The main challenge in image steganography is to innocuous image without any suspicion, furthermore the existing steganography focuses only on minimizing the distortion function. In this paper, we aim to develop an adaptive steganography technique named DIDC, which is basically based on the DPEs that approaching the rate transformation bound under the Steganography algorithm. Furthermore, the DIDC is evaluated by considering the two feature set SRM and max SRMd2 and error detection rate as the parameter, the comparison analysis shows that DIDC model outperforms not only state-of-art but also existing NFM model. Further, we also plot the AUC and the observation suggest the remarkable result. 
Keywords: Data hiding, Digital Steganography, Rate transformation bound, DIDC, DPEs.
Scope of the Article: Aggregation, Integration, and Transformation