Open Access   Article Go Back

Enhanced Image Transferring Scheme using Security Techniques

Madhura.M 1 , Mohana Kumar.S2

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-7 , Page no. 446-451, Jul-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i7.446451

Online published on Jul 31, 2018

Copyright © Madhura.M, Mohana Kumar.S . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Madhura.M, Mohana Kumar.S, “Enhanced Image Transferring Scheme using Security Techniques,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.446-451, 2018.

MLA Style Citation: Madhura.M, Mohana Kumar.S "Enhanced Image Transferring Scheme using Security Techniques." International Journal of Computer Sciences and Engineering 6.7 (2018): 446-451.

APA Style Citation: Madhura.M, Mohana Kumar.S, (2018). Enhanced Image Transferring Scheme using Security Techniques. International Journal of Computer Sciences and Engineering, 6(7), 446-451.

BibTex Style Citation:
@article{Kumar.S_2018,
author = {Madhura.M, Mohana Kumar.S},
title = {Enhanced Image Transferring Scheme using Security Techniques},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {7 2018},
volume = {6},
Issue = {7},
month = {7},
year = {2018},
issn = {2347-2693},
pages = {446-451},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2455},
doi = {https://doi.org/10.26438/ijcse/v6i7.446451}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i7.446451}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2455
TI - Enhanced Image Transferring Scheme using Security Techniques
T2 - International Journal of Computer Sciences and Engineering
AU - Madhura.M, Mohana Kumar.S
PY - 2018
DA - 2018/07/31
PB - IJCSE, Indore, INDIA
SP - 446-451
IS - 7
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
320 179 downloads 182 downloads
  
  
           

Abstract

Rapid growth in technology has enabled cyber attackers hack the data and misuse the content transferring using the authentication method. Due to this information transferring requires more security. Attackers can thoroughly figure out sensitive data from the traditional methods, using the hash value. Traditional methods of visual cryptography approach were used to transfer the sensitive data. Enhanced image scheme is proposed to hide the sensitive data. Transferring sensitive data in the form of image with the printed text requires more security without allowing the attackers to change the sensitive data. In this project OCR engine, tesseract approaches help in recognizing and conversions of the printed text to the machine typed characters. AES algorithm is then applied to encrypt these machine typed characters. Steganography technique is used for binding the secure data with the cover image without changing the input data format. Digital signature approach is used for verifying the extracted and decrypted character from the output image with the input data. Using multiples algorithms in the proposed approach enables more security for transferring of sensitive data. PNG image format is used for the implementation of the proposed system for better accuracy.

Key-Words / Index Term

OCR engine, Tesseract, Cryptography, Steganography and Digital Signature

References

[1] Dana Yang, Inshil Doh, and Kijoon Chae “Enhanced Password Processing Scheme Based on Visual Cryptography and OCR” Dept. Computer Science and Engineering Ewha Womans University, 2017,IEEE.
[2] Akhil, “Overview of Tesseract OCR engine” Department of Computer Science and Engineering National Institute of Technology, Calicut Monsoon-2016 Seminar Report.
[3] Pijush Chakraborty and Arnab Mallik “An Open Source Tesseract based Tool for Extracting Text from Images with Application in Braille Translation for the Visually Impaired” International Journal of Computer Applications (0975 –8887) Volume 68 – No.16, April 2013.
[4] Arnab Mallik, Asst. Professor, CSE Dept, Calcutta Institute of Engineering and Management “An Open Source Tesseract based Tool for Extracting Text from Images with Application in Braille Translation for the Visually Impaired”, International Journal of Computer Applications (09758887) Volume 68–No.16, April 2013.
[5] Chirag Patel, Atul Patel, Dharmendra Patel, Charotar University of Science and Technology “Optical Character Recognition by Open Source OCR Tool Tesseract: A Case Study” international Journal of Computer Applications (0975 –8887) Volume 55–No.10, October 2012.
[6] Md. Alam Hossain, Md. Biddut Hossain, Md. Shafin Uddin, Shariar Md. Imtiaz “Performance Analysis of Different Cryptography Algorithms” Computer Science and Engineering Department, Jessore University of Science & Technology, Bangladesh.
[7] Kundankumar Rameshwar Saraf, “Text and Image Encryption Decryption Using Advanced Encryption Standard” International Journal of Emerging Trends & Technology in Computer Science (IJETTCS).
[8] José Manuel Ortega, “Python Cryptography & Security” europython 2016, bilbao, 20-26 July.
[9] Pri a Bharti, Roopali Soni, “A New Approach of Data Hiding in Images using Cryptography and Steganography”, International Journal of Computer Applications (0975 – 8887) Volume 58–No.18, November 2012.
[10] Chirag Patel, Atul Patel, Dharmendra Patel “Optical Character Recognition by Open Source OCR Tool Tesseract: A Case Study” International Journal of Computer Applications (0975 – 8887) Volume 55–No.10, October 2012.
[11] Li, X., Wang, J.: A Steganographic Method based Upon JPEG and Particle Swarm Optimization Algorithm. Information Sciences 177(15), 3099–3109 (2007).
[12] Abdel-Karim Al Tamimi, “Performance Analysis of Data Encryption Algorithms” International Journal of Advanced Research in Computer Science and Software Engineering, Volume 6, Issue 3, March 2016.
[13] Avinash Kak, “AES: The Advanced Encryption Standard Lecture Notes on “Computer and Network Security”, Purdue University, February 2018.
[14] S.R. Subramanya and Byung K. Yi, “Digital signatures” March/April 2006 IEEE Potentials.
[15] Laurent Luce`s Blog “Python and cryptography with pycrypto” March 2018.
[16] Mohana kumar S and Jagadeesh S N “Study of privacy preserving and detection of sensitive data explore using message digest” International journal of Advance research in computer and communication, volume 5, issues 6, pages 118-122.
[17] N.S.Lele,”Image Classification Using Convolutional Neural Network”, International Journal of Scientific Research in Computer Science and Engineering, Vol.6, Issue.3, pp.22-26 , 2018.