SECURING BANGLA TEXT COMMUNICATION USING IMAGE STEGANOGRAPHY WITH DYNAMIC SUBSTITUTION IN IOT ENVIRONMENT
DOI:
https://doi.org/10.53808/KUS.2017.14.1and2.1630-EKeywords:
Security, IoT, steganography, Bangla, dynamic substitutionAbstract
Privacy and security of information are the prime concerns of today’s internet users. They want to get better and reliable services without sacrificing privacy from the current paradigm like the Internet of Things (IoT). In order to ensure IoT as a truthful service platform for the vast users, we need to protect the information that evolves throughout the internet and in the storage. In this paper, we propose a steganographic method for Bangla text communication over the unsecured internet based on RGB color image with the help of secret key for better protection of information. The proposed system consists of four main components namely preprocessing, embedding, extraction, and post-processing. We use dynamic positioning in case of substitution of (Bangla) text into the image. The secret key is transmitting throughput the image so that there is no extra hassle for communicating the secret key. We justify our proposed approach by using simulation with respect to imperceptibility, capacity, and robustness. We compare the result of the proposed method with other existing methods and get a better result over several existing efficient methods.
Downloads
References
Inc, G. 2014.Gartner says 4.9 billion connected things will be in use in 2015. Press
Release, Available on URL: http://www. gartner.com/newsroom/id
/2905717
Inc, C. 2013.Cisco Visual Networking Index: Forecast and Methodology, 2013-2018,
CISCO White Paper, Available on URL: http://www.cisco.com/c/en/us/
solutions/collateral/ service-provider/global-cloud-index
gci/CloudIndex.WhitePaper.html
Shirali-Shahreza, M. 2006.Stealth Steganography in SMS, in Proc. of IFIP International Conference
On Wireless and Optical Communication Net- work. Bangalore, India
Jamil, T. 1999.Steganography: The art of hiding information in plain sight. IEEE Potentials, 18(1):
-12
Younes, A. and Jantan, A. 2008.New Steganography Approach for Image Encryption Exchange by
using Least Signicant Bit Insertion. International Journal of Computer Science
and Network Security, 8(6): 247-254
Karim, M. Rahman, S. and Hossain, I. 2011.A New Approach for LSB based Image Steganography
using Secret Key. Proceedings of 14th Inter- national Conference on
Computer and Information Technology (ICCIT 2011), Dhaka,
Bangladesh
Bairagi, A. Mondal, S and Debnath, R. 2014.A Robust RGB Channel Based Image Steganography
Technique using a Secret Key. 16th International Conference on Computer and
Information Technology (ICCIT 2013), Khulna, Bangladesh
Juneja, M. and Sandhu, P. 2014.Improved LSB based Steganography Tech- niques for Color Images
in Spatial Domain. International Journal of Network Security, 16(6):452-
Sun, S. 2015.A New Information Hiding Method Based on Improved BPCS Steganography. Advances
in Multimedia
Alameti, S. Pothalalah, S. and Babu, A.2010. A New Approach to Telegu Text Steganography by
Shifting Inherent Vowel Signs. International Journal of Engineering Science
and Technology, 2(12): 7203-7214
Shirali-Shahreza, H. and Shirali-Shahreza, M. 2010.Arabic/Persian Text Steganography Utilizing
Similar Letters with Different Codes. The Ara- bian Journal for Science and
Engineering, 35(1B)
Jarin, S.Hossain, S.M. and Islam,R. 2015.Introducing Image Steganography in Bangla Languaguage
Communication. International Journal of Computer Applications, 110(8)
Weber, G. 1993.The USC-SIPI image database: version 4,1993. Available on: URL
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2022 Khulna University Studies

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.