Paper Title : Image Security Enhancement With Vigenere Knight’s Tour And Advanced Encryption Standard Technique
ISSN : 2394-2231
Year of Publication : 2021
MLA Style: S.Jagadeesan M.Sc(CS)., MCA., M.Phil(CS)., ME(CSE)., R.Indhumathi " Image Security Enhancement With Vigenere Knight’s Tour And Advanced Encryption Standard Technique " Volume 8 - Issue 2 March-April , 2021 International Journal of Computer Techniques (IJCT) ,ISSN:2394-2231 , www.ijctjournal.org
APA Style: S.Jagadeesan M.Sc(CS)., MCA., M.Phil(CS)., ME(CSE)., R.Indhumathi " Image Security Enhancement With Vigenere Knight’s Tour And Advanced Encryption Standard Technique " Volume 8 - Issue 2 March-April , 2021 International Journal of Computer Techniques (IJCT) ,ISSN:2394-2231 , www.ijctjournal.org
Building a balanced relation between image quality and the payload, the robustness of the method in facing electronic attacks and securing data, all the mentioned processes represent the main challenge in steganography. Here, a novel approach to steganography is suggested using Vigenere Cipher and Huffman Coding methods to encrypt and compress the mystery message content. This approach will raise the security and ensure the message content cannot be extracted without earlier knowledge of decrypting rules and the Huffman Dictionary Table. Later, the image is segmented into blocks, size (w*h) groups having n pixels. Subsequently, the knight tour algorithm and arbitrary function are utilized to select which blocks and groups can be used to conceal the mystery digit within a specific pixel in the group randomly. This is to address the weakness of the Exploiting Modification Direction (EMD) technique that uses a serial selection to reinforce the robustness of the suggested scheme. The EMD technique is then utilized to insert the mystery digits inside a specific pixel. Later, the chi-square method is employed to apply statistical attacks on the stegoimage to estimate the suggested scheme robustness. The empirical outcomes show that the suggested scheme is more efficient compared to the old Steganography schemes with respect to Imperceptibility by PSNR of 55.71 dB, the Payload of 52,400 bytes and the robustness
 Afrakhteh, M., Ibrahim, S., 2010. Enhanced least significant bit scheme robust  Bharti, D., Kumar, A., arti and Kumar 2014. Enhanced steganography algorithm to improve security by using vigenere encryptio and first component alteration technique. Int. J. Eng. Trends Technol. 13 (5).  Chan, C., Cheng, L., 2004. Hiding data in images by simple LSB substitution. Pattern  Recogn. 37, 469–474. https://doi.org/10.1016/j.patcog.2003.08.0 07.  Dennie, V., 2007. Cryptographic techniques for computers: substitution methods. Inf. Storage Retrieval 6, 241–249.  Ganzfried, S., 2004. A new algorithm for knight’s tours. REU Program in Mathematics at Oregon State University.  Habibi, M., Karimi, R., Nosrati, M., 2013. Using SFLA and LSB for text message  Jayaraman, S., Esakkirajan, S., Veerakumar, T., 2009. Digital Image Processing. Tata McGraw Hill Education Private Limited, India.  Kumar, V., Kumar, D., 2017. Performance evaluation of modified color image steganography using discrete wavelet transform. J. Intell. Syst. https://doi.org/ 10.1515/jisys-2017-0134.  Lee, C., Chang, C., Pai, P., Liu, C., 2015. Adjustment hiding method based on exploiting modification direction. Int. J. Netw. Security 17 (5), 607–618.  Lin, K., Hong, W., Chen, J., Chen, T., Chiang, W., n et al. 2010. Data hiding by exploiting modification direction technique using optimal pixel grouping. In: IEEE 2010 2nd international Conference on Education Technology and Computer(ICETC). https://doi.org/10.1109/ICETC.2010.5529 581.  Maniriho, P., Ahmad, T., 2018. Information hiding scheme for digital images using difference expansion and modulus function. J. King Saud Univ.-Comput. Inf. Sci. 1–13. https://doi.org/10.1016/j.jksuci.2018.01.0 11.  Morkel, T., Eloff, J., Olivier, M., 2005. An overview of image steganography. Proceedings of the Fifth Annual Information Security South Africa Conference (ISSA2005). Sandston, South Africa.  Nag, A., Biswas, A., Sarkar, D., Sarkar, P., 2009. A Novel technique for image steganography based on DWT and huffman encoding. Int. J. Comput. Sci. Security 4 (6), 561–570.  Nissar, A., Mir, A., 2010. Classification of steganalysis techniques: a study. Digital Signal Process. 20, 1758–1770. https://doi.org/10.1016/j.dsp.2010.02.003.  Ranjani, J., 2017. Data hiding using pseudo magic squares for embedding high payload in digital images.  Younus, Z.S., Younus, G.T., 2019. Video steganography using knight tour algorithm and LSB method for encrypted data. J. Intell. Syst. https://doi.org/10.1515/jisys2018-0225.  Zanganeh, O., Ibrahim, S., 2011. Adaptive image steganography based on optimal embedding and robust against chi-square attack. Inf. Technol. J. 10 (7), 1285– 1294. https://doi.org/10.3923/itj.2011.1285.1294 .  Shen, Y., Huang, L., Yu, S., 2017. A novel adaptive data hiding based on improved EMD and interpolation. Multimedia Tools Appl. 77 (1), 1–17. https://doi.org/ 10.1007/s11042-017-4905-5.  Taha, A., Hammad, A., Selim, M., 2018. A high capacity algorithm for information hiding in Arabic text. J. King Saud Univ., 1–8 https://doi.org/10.1016/j. jksuci.2018.07.007.
—— Cryptography, Stegnography, Exploiting modification direction, Knight tour,Vigenere cipher, Huffman coding