Secure Data Transform in Encrypted Image Using Steganography Technique

Authors

  • Malatesh M Department of CS&E, UBDTCE, VTU, India
  • Anitha G
  • Venkatesh U

Keywords:

Cryptography, LSB, AES, Steganography

Abstract

The mean of the paper is to apply computer vision technique to transmit secret messages from sender to receiver. Cryptography and steganography are the two techniques to transform secret messages. In this paper steganography technique is used. Steganography is the hiding and transmitting secret data to the authorised user. One of the hiding techniques utilised here is LSB manipulation. System generate 3 keys using AES 128 bit algorithm based on these keys ,sender and receiver can encrypt and decrypt secret messages respectively. MySQL server, net beans IDE tool is used to obtain results.

References

X. Zhang, “Separable Reversible Data Hiding in Encrypted Image” IEEE Trans. Inform. Forensics Security, vol. 7, no. 2, pp. 826-832, April 2012.

Akash Kumar Mandal, Chandra Parakash, Mrs.Archana Tiwari “Performance Evaluation of Cryptographic Algorithms: DES and AES”, IEEE Trans. on Electrical, Electronics and Computer Science, 2012.

X. Zhang, “Lossy compression and iterative reconstruction for encrypted image,” IEEE Trans. Inform. Forensics Security, vol. 6, no. 1, pp. 53–58, Feb. 2011.

MazharTayel, HamedShawky, Alaa El-Din Sayed Hafez, ”A New Chaos Steganography Algorithm for Hiding Multimedia Data” Feb. 19~22, 2012 ICACT2012.

T. Bianchi, A. Piva, and M. Barni, “On the implementation of the discrete Fourier transform in the encrypted domain,” IEEE Trans. Inform. Forensics Security, vol. 4, no. 1, pp. 86–97, Feb. 2009.

Downloads

Published

2015-01-31

How to Cite

[1]
M. Malatesh, G. Anitha, and U. Venkatesh, “Secure Data Transform in Encrypted Image Using Steganography Technique”, Int. J. Comp. Sci. Eng., vol. 3, no. 1, pp. 85–89, Jan. 2015.

Issue

Section

Research Article