International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 119 | Views: 260

Informative Article | Computer Science & Engineering | India | Volume 2 Issue 6, June 2013 | Popularity: 6.8 / 10


     

HIDING DATA IN ENCRYPTED IMAGE WITH LSB SUBSTITUTION

M.C.Padma, Yashaswini.J


Abstract: Using data hiding technique one can send the information to the accurate user without noticing to third person. Data can be hidden using different cover Medias, like video, audio, images or text. As an Internet based communications of images have increased, encryption of images has become very important way to protect images especially on the Internet. This work proposes a new scheme for hiding data in encrypted image with LSB substitution. It consists of image encryption, data embedding and data-extraction/image-recovery phases. A content owner encrypts the original image using an encryption key. A data-hider changes the least significant bits of the encrypted image using a data-hiding key to create a sparse space to accommodate some additional data. At the receiver side, the data that is embedded in the created space can be easily retrieved from the encrypted image using the data-hiding key. Since the data embedding only affects the LSB, a decryption with the encryption key can result in an image similar to the original version. When using both of the encryption and data-hiding keys, the embedded additional data can be successfully extracted and the original image can be perfectly recovered.


Keywords: Data hiding, data extraction, image encryption, reversible data hiding


Edition: Volume 2 Issue 6, June 2013


Pages: 125 - 128



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
M.C.Padma, Yashaswini.J, "HIDING DATA IN ENCRYPTED IMAGE WITH LSB SUBSTITUTION", International Journal of Science and Research (IJSR), Volume 2 Issue 6, June 2013, pp. 125-128, https://www.ijsr.net/getabstract.php?paperid=IJSRON20131100, DOI: https://www.doi.org/10.21275/IJSRON20131100



Similar Articles

Downloads: 0

Research Paper, Computer Science & Engineering, India, Volume 11 Issue 6, June 2022

Pages: 654 - 659

Image Encryption using (k, n) Secret Sharing Scheme using Lagrange Polynomial

GVSS Jayanth Anish

Share this Article

Downloads: 97

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1191 - 1194

Web Data Extraction by Using Trinity

Sayali Khodade, Nilav Mukharjee

Share this Article

Downloads: 101

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1579 - 1582

Data Hiding in H.264/AVC Video Encryption with XOR-ed User Information and Data in File Format

Neenu Shereef

Share this Article

Downloads: 104

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1130 - 1132

Survey On: Reversible Data Hiding in Encrypted JPEG Images

N. B. Pokale, Sanjivani S. Koli

Share this Article

Downloads: 105

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 1062 - 1064

Enriching Process of Image Encryption and Compression Using Hierarchical Decomposition

Devashri Anil Vyawahare, Prof. Anil Gujar

Share this Article
Top