Open Access   Article Go Back

Secure Data Transform in Encrypted Image Using Steganography Technique

alatesh M1 , Smt. Anitha G2 , Ujjini Venkatesh3

Section:Research Paper, Product Type: Journal Paper
Volume-3 , Issue-1 , Page no. 85-89, Jan-2015

Online published on Jan 31, 2015

Copyright © Malatesh M, Smt. Anitha G , Ujjini Venkatesh . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Malatesh M, Smt. Anitha G , Ujjini Venkatesh, “Secure Data Transform in Encrypted Image Using Steganography Technique,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.1, pp.85-89, 2015.

MLA Style Citation: Malatesh M, Smt. Anitha G , Ujjini Venkatesh "Secure Data Transform in Encrypted Image Using Steganography Technique." International Journal of Computer Sciences and Engineering 3.1 (2015): 85-89.

APA Style Citation: Malatesh M, Smt. Anitha G , Ujjini Venkatesh, (2015). Secure Data Transform in Encrypted Image Using Steganography Technique. International Journal of Computer Sciences and Engineering, 3(1), 85-89.

BibTex Style Citation:
@article{M_2015,
author = {Malatesh M, Smt. Anitha G , Ujjini Venkatesh},
title = {Secure Data Transform in Encrypted Image Using Steganography Technique},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {1 2015},
volume = {3},
Issue = {1},
month = {1},
year = {2015},
issn = {2347-2693},
pages = {85-89},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=368},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=368
TI - Secure Data Transform in Encrypted Image Using Steganography Technique
T2 - International Journal of Computer Sciences and Engineering
AU - Malatesh M, Smt. Anitha G , Ujjini Venkatesh
PY - 2015
DA - 2015/01/31
PB - IJCSE, Indore, INDIA
SP - 85-89
IS - 1
VL - 3
SN - 2347-2693
ER -

VIEWS PDF XML
2475 2416 downloads 2526 downloads
  
  
           

Abstract

the mean of the paper is to apply computer vision technique to transmit secret messages from sender to receiver. Cryptography and steganography are the two techniques to transform secret messages. In this paper steganography technique is used. Steganography is the hiding and transmitting secret data to the authorised user. One of the hiding techniques utilised here is LSB manipulation. System generate 3 keys using AES 128 bit algorithm based on these keys ,sender and receiver can encrypt and decrypt secret messages respectively. MySQL server, net beans IDE tool is used to obtain results.

Key-Words / Index Term

Cryptography, LSB, AES, Steganography

References

[1] X. Zhang, “Separable Reversible Data Hiding in Encrypted Image” IEEE Trans. Inform. Forensics Security, vol. 7, no. 2, pp. 826-832, April 2012.
[2] Akash Kumar Mandal, Chandra Parakash, Mrs.Archana Tiwari “Performance Evaluation of Cryptographic Algorithms: DES and AES”, IEEE Trans. on Electrical, Electronics and Computer Science, 2012.
[3] X. Zhang, “Lossy compression and iterative reconstruction for encrypted image,” IEEE Trans. Inform. Forensics Security, vol. 6, no. 1, pp. 53–58, Feb. 2011.
[4] MazharTayel, HamedShawky, Alaa El-Din Sayed Hafez, ”A New Chaos Steganography Algorithm for Hiding Multimedia Data” Feb. 19~22, 2012 ICACT2012.
[5] T. Bianchi, A. Piva, and M. Barni, “On the implementation of the discrete Fourier transform in the encrypted domain,” IEEE Trans. Inform. Forensics Security, vol. 4, no. 1, pp. 86–97, Feb. 2009.