Downloads: 114 | Views: 244
M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 4 Issue 5, May 2015 | Popularity: 6.8 / 10
Secure Text/Image Data Hiding in Images with Efficient Key Management
Anjaly Mohanachandran, Mary Linda P.A.
Abstract: The security plays an important role in transmission of confidential data over internet. So, as a part of improving security in data transmission, we will hide the data inside an encrypted image. Thereby, confidentiality of the image as well as the embedded data is maintained. The embedded data can be extracted without any error, and also the cover image restoration is also free from error. So, here we are implementing a system in which text data can be embedded inside an encrypted image for security and also cover image can be send separately to the destination by hiding it inside another image. It maintains the excellent property that the original image can be losslessly recovered after embedded data is extracted. The major application of this method is medical imagery, military where both data and cover image is confidential. The most improved technique of data hiding is that we can make use of separate keys in case of encryption and data hiding in sender side and receiver side. Thus the concept of efficient key management improves the security.
Keywords: Data Hiding, Image encryption, image Decryption, Data Embedding, Data Extraction, LSB method
Edition: Volume 4 Issue 5, May 2015
Pages: 2325 - 2330
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 0
Research Paper, Computer Science & Engineering, India, Volume 11 Issue 6, June 2022
Pages: 654 - 659Image Encryption using (k, n) Secret Sharing Scheme using Lagrange Polynomial
GVSS Jayanth Anish
Downloads: 97
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 1191 - 1194Web Data Extraction by Using Trinity
Sayali Khodade, Nilav Mukharjee
Downloads: 101
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1579 - 1582Data Hiding in H.264/AVC Video Encryption with XOR-ed User Information and Data in File Format
Neenu Shereef
Downloads: 105
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015
Pages: 1062 - 1064Enriching Process of Image Encryption and Compression Using Hierarchical Decomposition
Devashri Anil Vyawahare, Prof. Anil Gujar
Downloads: 107
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015
Pages: 1434 - 1436Method for Repossession of Content Based Video using Speech and Text Information
Manasi A. Kabade, U.A. Jogalekar