International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 114 | Views: 244

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 4 Issue 5, May 2015 | Popularity: 6.8 / 10


     

Secure Text/Image Data Hiding in Images with Efficient Key Management

Anjaly Mohanachandran, Mary Linda P.A.


Abstract: The security plays an important role in transmission of confidential data over internet. So, as a part of improving security in data transmission, we will hide the data inside an encrypted image. Thereby, confidentiality of the image as well as the embedded data is maintained. The embedded data can be extracted without any error, and also the cover image restoration is also free from error. So, here we are implementing a system in which text data can be embedded inside an encrypted image for security and also cover image can be send separately to the destination by hiding it inside another image. It maintains the excellent property that the original image can be losslessly recovered after embedded data is extracted. The major application of this method is medical imagery, military where both data and cover image is confidential. The most improved technique of data hiding is that we can make use of separate keys in case of encryption and data hiding in sender side and receiver side. Thus the concept of efficient key management improves the security.


Keywords: Data Hiding, Image encryption, image Decryption, Data Embedding, Data Extraction, LSB method


Edition: Volume 4 Issue 5, May 2015


Pages: 2325 - 2330



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Anjaly Mohanachandran, Mary Linda P.A., "Secure Text/Image Data Hiding in Images with Efficient Key Management", International Journal of Science and Research (IJSR), Volume 4 Issue 5, May 2015, pp. 2325-2330, https://www.ijsr.net/getabstract.php?paperid=SUB154717, DOI: https://www.doi.org/10.21275/SUB154717



Similar Articles

Downloads: 0

Research Paper, Computer Science & Engineering, India, Volume 11 Issue 6, June 2022

Pages: 654 - 659

Image Encryption using (k, n) Secret Sharing Scheme using Lagrange Polynomial

GVSS Jayanth Anish

Share this Article

Downloads: 97

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1191 - 1194

Web Data Extraction by Using Trinity

Sayali Khodade, Nilav Mukharjee

Share this Article

Downloads: 101

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1579 - 1582

Data Hiding in H.264/AVC Video Encryption with XOR-ed User Information and Data in File Format

Neenu Shereef

Share this Article

Downloads: 105

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 1062 - 1064

Enriching Process of Image Encryption and Compression Using Hierarchical Decomposition

Devashri Anil Vyawahare, Prof. Anil Gujar

Share this Article

Downloads: 107

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 1434 - 1436

Method for Repossession of Content Based Video using Speech and Text Information

Manasi A. Kabade, U.A. Jogalekar

Share this Article



Top