International Journal of Innovative Research in Computer and Communication Engineering

ISSN Approved Journal | Impact factor: 8.771 | ESTD: 2013 | Follows UGC CARE Journal Norms and Guidelines

| Monthly, Peer-Reviewed, Refereed, Scholarly, Multidisciplinary and Open Access Journal | High Impact Factor 8.771 (Calculated by Google Scholar and Semantic Scholar | AI-Powered Research Tool | Indexing in all Major Database & Metadata, Citation Generator | Digital Object Identifier (DOI) |


TITLE Secure Data Transfer across Internet Using Image Steganography
ABSTRACT The exponential growth of internet communication has intensified the need for robust methods of secure data transmission. This project presents an image steganography-based system for concealing sensitive information within digital images, enabling covert data transfer across the internet without arousing suspicion. The proposed system employs the Least Significant Bit (LSB) technique to embed textual or binary data into carrier images, ensuring minimal perceptual distortion while preserving payload integrity. An optional layer of AES encryption is applied to the secret data before embedding, providing a dual-layered security mechanism against unauthorized access and interception. The system is implemented as a web-based application that allows users to encode and decode hidden messages through an intuitive interface. Experimental evaluations demonstrate that the system achieves high embedding capacity, imperceptibility, and robustness, with PSNR values consistently exceeding acceptable thresholds. The results confirm the effectiveness of combining cryptography and steganography for secure internet-based data communication.
AUTHOR PRINCE WESLEY C, MOHAMED ASHIK JAMAL N, JAYAESH GAUTAM SK., M. SHARON NISHA Department of Computer Science and Engineering, Francis Xavier Engineering College, Tirunelveli, Tamil Nadu, India
VOLUME 183
DOI DOI: 10.15680/IJIRCCE.2026.1404049
PDF pdf/49_Secure Data Transfer across Internet Using Image Steganography.pdf
KEYWORDS
References 1. Raja, K., Chowdary, C.R., Venugopal, K.R., Patnaik, L.M. (2005), "A Secure Image Steganography using LSB, DCT and Compression Techniques on Raw Images", IEEE Proceedings of the 3rd International Symposium on Intelligent Systems and Information Networks, pp.170-176.
2. Provos, N., Honeyman, P. (2003), "Hide and Seek: An Introduction to Steganography", IEEE Security and Privacy, Volume 1, Issue 3, pp.32-44.
3. Morkel, T., Eloff, J.H.P., Olivier, M.S. (2005), "An Overview of Image Steganography", Proceedings of the ISSA 2005 New Knowledge Today Conference, pp.1-11.
4. Cheddad, A., Condell, J., Curran, K., McKevitt, P. (2010), "Digital Image Steganography: Survey and Analysis of Current Methods", Signal Processing, Volume 90, Issue 3, pp.727-752.
5. Ker, A.D. (2007), "Steganalysis of LSB Matching in Grayscale Images", IEEE Signal Processing Letters, Volume 14, Issue 3, pp.141-144.
6. Zhang, X., Wang, S. (2006), "Efficient Steganographic Embedding by Exploiting Modification Direction", IEEE Communications Letters, Volume 10, Issue 11, pp.781-783.
7. Elham Ghasemi, Jamshid Shanbehzadeh, Nima Fassihi (2011), "High Capacity Image Steganography using Wavelet Transform and Skin Tone Detection", International Conference on Multimedia Computing and Information Technology, pp.1-4, IEEE.
8. Juneja, M., Sandhu, P.S. (2009), "Designing of Robust Image Steganography Technique Based on LSB Insertion and Encryption", International Conference on Advances in Recent Technologies in Communication and Computing, pp.302-305, IEEE.
9. Swain, G. (2014), "Digital Image Steganography Using Nine-Pixel Differencing and Modified LSB Substitution", Indian Journal of Science and Technology, Volume 7, Issue 9, pp.1444-1450.
10. Hussain, M., Wahab, A.W.A., Idris, Y.I.B., Ho, A.T.S., Jung, K.H. (2018), "Image Steganography in Spatial Domain: A Survey", Signal Processing: Image Communication, Volume 65, pp.46-66, Elsevier.
image
Copyright © IJIRCCE 2020.All right reserved