Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
…
5 pages
1 file
— This project proposes a reversible scheme for cipher images which are encrypted using a simple cipher involving key bunch matrix. Key bunch matrix is a simple and convenient method to encrypt an image. The secret text data should be converted into its equivalent decimal values using EBCDIC code. The decimal values are converted into binary; then the data is embedded into cipher image by using lossless steganography technique based on the key and sent to the receiver. The secret data is extracted from the received image using key. The receiver generates decryption key and decrypts the image using the same key. The scheme is able to embed secret data in encrypted image in a secure manner without any loss.
International Journal of Computer Applications, 2016
Nowadays, network has important roles for transferring data accurately and fast from source to a destination. The data is not secure enough to transfer highly confidential. The security of information has become one of the principle challenges of resource sharing with data communication over computer network. Cryptography and Steganography are two methods for protecting data from intruders while transferring over an open channel network. Cryptography is a method to encrypt data and steganography is the art and science of hiding secret message in a cover image. In this paper a Hash Least Significant Bit (H-LSB) with Affine cipher algorithm has been proposed for providing more security to data in a network environment. First we encrypt the data with the new cryptography algorithm and then embed in the image. Eight bits of the secret message are divided into 3, 3, 2 and embedding into the RGB pixels values of the cover image respectively. A hash function is used to select the particular position of insertion in LSB bits. This system allows a message sender to select keys to encrypt the secret message before embedding into the image and a receiver is used the keys to decrypt the message. Receiver can be decrypted the encrypt message with incorrect the keys but to a different form from the original message. This system has the ability to provide better security while transferring the secret message from one end to the other end in network environment.
http://www.ijesi.org/, 2015
The rapid development of data transfer through the Internet made it easier to send the data accurate and faster to the destination. There are many transmission media to transfer the data to destination like e-mails; at the same time it may be easier to modify and misuse the valuable information through hacking. So, in order to transfer the data securely to the destination without any modifications, there are many approaches like cryptography and steganography. This paper deals with a new technique steganography to hide encrypted confidential data within images. Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the internet. For hiding secret information in images, there exist a large variety of steganography techniques. Some are more complex than others and all of them have respective strong and weak points. Different applications may require absolute invisibility of the secret information, while others require a large secret message to be hidden. This paper intends to give a brief idea about the new image steganographic approach that makes use of Least Significant Bit (LSB) algorithm for embedding the data into the bit map image.
International Journal of Engineering and Advanced Technology
In today’s technology data hiding has become an essential need due to the availability of the internet all over the world. Nowadays, it has become necessary task for the people to communicate through networks and share contents with each other. In the meanwhile, transferring the data in a secured manner has become a challenge and also a paradigm. Still there exists many ways for hiding the data in an encrypted images. Hiding information at the back end of the image should not affect the original data or image pixels. It is one type of steganographical method where the data can be hidden inside the images and original data can be losslessly retrieved after extracting the embedded text.The proposed work discusses encryption using reversible data hiding and produces an outlineof various reversible data hiding techniques which includes quantization technique, histogram shifting, expansion technique, compression technique anddual image technique
International Journal of Engineering Research and Technology (IJERT), 2015
https://www.ijert.org/image-assisted-data-security-using-key-encrypted-file https://www.ijert.org/research/image-assisted-data-security-using-key-encrypted-file-IJERTV4IS050194.pdf In this paper a new technique for image based data hiding with a binary file is proposed. In traditional methods the image based data hiding referred as steganography. The basic idea of Steganography is that it distributes the message uniformly throughout the image. But it will cause degradation to the image. In this paper the image based data hiding is performed using the binary file that ensures more security and confidentiality. Here the image is divided into blocks of equal sizes and the message is then embedded into the central pixel of the block using cyclic combination of 6 th , 7th, 8 th bit. The block of the image is chosen randomly using Array shuffling algorithm similar to pseudo random number generator seeded with an array shuffling key. In proposed method the image is divided into 256 blocks and the message is uniformly distributed in the image but there will be no change in the image pixels. The user keeps a secret binary file along with the image that contains the bits corresponding to the message. The binary file that contains bit values corresponding to the message will provides more security. The binary file is then encrypted with the same key or another key and converted to base64 encoding. And it is send to the receiver. The receiver can download the image from anywhere and the information about the image is shared by sending the URL or it may be known to the receiver. The array shuffling key is shared with the receiver by using any of the symmetric key exchange technique. Then receiver can retrieves the message by analyzing the binary file by decrypting and converting to normal utf-8 encoding from base64. In this method the image quality is maintained as such as the original image, ie the pixel value of the image does not changed. The main advantage is that it does not limit the size of message that can be distributed in the image. The message can be retrieved only with the help of image, binary file, and array shuffling key. So the security is assured.
2015 International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO), 2015
Encryption is the method by which we can encode the intended piece of information in such a way that only the people whom we want to pass that information can understand its actual meaning. Digital Image Steganography the message is hidden in an image in such a way that the onlookers cannot even guess that it is not a normal image. Nowadays security is a vital issue while transmitting a message. So in this paper we have proposed a unique way of transmitting the message securely. First we have encrypted the message to an image which needs a secret key to be decrypted. Then we have hidden that image inside another image by steganographic approach. By thistwo level hiding we can ensure stronger security.
International journal of innovative technology and exploring engineering, 2019
Today, digital communication has become an integral part of everyday life. Many applications are based on the Internet and communications must be made in secret. This is especially important when confidential information needs to be exchanged. As a result, the security of information transmitted over public channels is a fundamental problem, and as a result, the confidentiality and integrity of the data is essential to protect against unauthorized access and use. This caused the information concealment area to become unstable. Encryption and steganography are two of the most common methods you can use to ensure safety. With encryption, the data is converted to another form of gibberish and the encrypted data is transmitted. In Steganography, the image is transferred to the image, which is embedded in the image without affecting the quality of the image.This article suggests a new way to embed data into images and edit data using common virtual built-in technologies.
International Journal of Engineering Research and, 2015
In this paper a new technique for image based data hiding with a binary file is proposed. In traditional methods the image based data hiding referred as steganography. The basic idea of Steganography is that it distributes the message uniformly throughout the image. But it will cause degradation to the image. In this paper the image based data hiding is performed using the binary file that ensures more security and confidentiality. Here the image is divided into blocks of equal sizes and the message is then embedded into the central pixel of the block using cyclic combination of 6 th , 7th, 8 th bit. The block of the image is chosen randomly using Array shuffling algorithm similar to pseudo random number generator seeded with an array shuffling key. In proposed method the image is divided into 256 blocks and the message is uniformly distributed in the image but there will be no change in the image pixels. The user keeps a secret binary file along with the image that contains the bits corresponding to the message. The binary file that contains bit values corresponding to the message will provides more security. The binary file is then encrypted with the same key or another key and converted to base64 encoding. And it is send to the receiver. The receiver can download the image from anywhere and the information about the image is shared by sending the URL or it may be known to the receiver. The array shuffling key is shared with the receiver by using any of the symmetric key exchange technique. Then receiver can retrieves the message by analyzing the binary file by decrypting and converting to normal utf-8 encoding from base64. In this method the image quality is maintained as such as the original image, ie the pixel value of the image does not changed. The main advantage is that it does not limit the size of message that can be distributed in the image. The message can be retrieved only with the help of image, binary file, and array shuffling key. So the security is assured.
International Journal of Computer Applications, 2013
The paper presents a new approach in Image steganography. Information security is the important research field. Steganography process hides message into cover file and forms a stego file. In image steganography there is a need of method which will increase the security, reduce the distortion in the stego file and recovers the data without any loss. In the era of multimedia and internet there is need of reducing time for transmission. The proposed approach is combination of compression, data hiding technique and encryption. To make the transmission and storage of digital data faster, lossy compression is used. On the compressed image data hiding is done. The stego image is encrypted using AES to ensure user authentication. If the receiver has encryption key and data hiding key then only he can obtain the secret message. Nodes are selected randomly in data hiding stage. On the randomly selected nodes lossless LSB steganography is used.
IRJET, 2021
Security of tip has always been a serious issue from the hobbies to this time. It has always been the interested topic for researchers to develop secure techniques to send data without revealing it to anyone apart from the receiver. Therefor from time to time researchers have developed many techniques to satisfy secure transfer of knowledge and cryptography with steganography is one among them. The system proposed during this study uses a canopy object, image specifically to cover the message to be sent. Before a message is embedded within the image, the message is first encrypted using RSA encryption algorithm. After the message has been encrypted, the method of embedding or hiding the message within the image is carried on. Least Significant Bit (LSB) technique is used to embed the message into the image. If in any case the cipher text got revealed from the duvet image, the intermediate person apart from receiver can't access the message because it's in encrypted form. The results show that high security and robustness is achieved when cryptography is combined with steganography
With the progress in data exchange by electronic system, the need of information security has become a necessity. Due to growth of multimedia applications, security becomes an important issue of communication and storage of images Encryption and Decryption is used to securely transmit data in open networks. Each type of data has its own features; therefore different techniques should be used to protect confidential image data from unauthorized access.The principle goal of designing any encryption and decryption algorithm is to hide the original message and send the non readable text message to the receiver so that secret message communication can take place over the web. The strength of an algorithm depends on the difficulty of cracking the original message. In kind of algorithm .a combination of four S -boxes lookups, multiplications as well as fixed and data dependant rotations will be used. In this paper we would be obtaining our results by simulating the image processing by Encryption and Decryption part in MATLAB.