SlideShare ist ein Scribd-Unternehmen logo
1 von 7
Downloaden Sie, um offline zu lesen
International Journal of Engineering Science Invention
ISSN (Online): 2319 – 6734, ISSN (Print): 2319 – 6726
www.ijesi.org ||Volume 4 Issue 11|| November 2015 || PP.01-07
www.ijesi.org 1 | Page
A Robust Technique to Encrypt and Decrypt Confidential Data
within Image
Md. Shamimul Islam1
, Mahbuba Begum2
, Kanija Muntarina3
, and Md. Golam
Moazzam1
1
Department of CSE, Jahangirnagar University, Savar, Dhaka-1342. Bangladesh.
2
Department of CSE, Mawlana Bhashani Science and Technology University, Tangail, Bangladesh
3
Department of CSE, Dhaka City College, Dhaka, Bangladesh.
ABSTRACT : The rapid development of data transfer through the Internet made it easier to send the data
accurate and faster to the destination. There are many transmission media to transfer the data to destination
like e-mails; at the same time it may be easier to modify and misuse the valuable information through hacking.
So, in order to transfer the data securely to the destination without any modifications, there are many
approaches like cryptography and steganography. This paper deals with a new technique steganography to hide
encrypted confidential data within images. Steganography is the art of hiding the fact that communication is
taking place, by hiding information in other information. Many different carrier file formats can be used, but
digital images are the most popular because of their frequency on the internet. For hiding secret information in
images, there exist a large variety of steganography techniques. Some are more complex than others and all of
them have respective strong and weak points. Different applications may require absolute invisibility of the
secret information, while others require a large secret message to be hidden. This paper intends to give a brief
idea about the new image steganographic approach that makes use of Least Significant Bit (LSB) algorithm for
embedding the data into the bit map image.
KEYWORDS - Cryptography, Embedding technique, LSB, Steganography, Stegoimage.
I. INTRODUCTION
With the rapid growth of computer networks, data security has become a major concern and
thus, data hiding technique has attracted people around the globe. Steganography techniques are used to address
digital copyrights management, protect information, and conceal secrets [1]. It is the art and science of hiding
information into picture or other media in such a way that no-one apart from the sender and intended recipient
even realizes there is a hidden information [2], [3]. This includes the concealment of digital information within
computer files. Generally, a steganographic message will appear to be something else, may be picture, video,
sound file, even the radio communication. This apparent message is the covertext. For instance, a message may
be hidden by using invisible ink between the visible lines of innocuous documents. The hidden information is
called stego message which may be open message, but may be encrypted one as well. Data hiding [4] in the
image has become an important technique for image authentication. Ownership verification and authentication
is the major task for military people, research institute and scientist. It refers to the nearly invisible embedding
of information within a host data set as message, image, and video. In steganographic [5], [6] applications, the
hidden data may be secrete message or secrete hologram or secrete video whose mere presence within the host
data set should be undetectable; The goal of steganography is to hide the message in the source image by some
key techniques and cryptography is a process to hide the message content. To hide a message inside an image
without changing its visible properties [7] the source image may be altered. The most common methods to make
these alteration involves the usage of the least-significant bit (LSB) developed by masking, filtering and
transformations on the source image [8].
This paper focuses on the technique to secure data or message with authenticity and integrity. The entire work
has been done in MATLAB. In this work, the secret message is encrypted before the actual embedding process
starts. It uses a simple encryption technique and a secret key and hence it will almost be impossible for the
intruder to unhide the actual secret message from the embedded cover file without knowing secret key. Only
receiver and sender know the secret key. N-bit LSB substitution technique is used as embedding and extraction
method.
A Robust Technique to Encrypt and Decrypt…
www.ijesi.org 2 | Page
II. LITERATURE REVIEW
Information security and image authentication has become very important to protect digital
image document from unauthorized access. Data is the backbone of today’s communication. To ensure that data
is secured and does not go to unintended destination, the concept of data hiding came up to protect a piece of
information [9]. Digital data can be delivered over computer networks with little errors and often without
interference. The Internet provides a communication method to distribute information to the masses. Therefore,
the confidentiality and data integrity are required to protect against unauthorized access and use. Steganography
and Cryptography are parallel data security techniques and the techniques can be implemented side by side, in
fact steganographic system can implement cryptographic data security. With cryptography we can protect the
message but not hide its existence [10]. Steganography pay attention to the degree of invisibility while
cryptography pays attention to the security of the message. Once the presence of hidden information is revealed
or even suspected, the purpose of steganography is partly defeated. The strength of steganography can thus be
increased by combining it with cryptography.
Steganography relies on hiding message in unsuspected multimedia data and is generally used in secret
communication between acknowledged parties [11]. The technique replaces insignificant bits of the digital
media with the secret data. The concept is to embed the hidden object into a significantly larger object so that
the change is undetectable by the human eye [12]. All digital file formats can be used for steganography, but the
formats those are with a high degree of redundancy are more suitable. The redundant bits of an object are those
bits that can be altered without the alteration being detected easily. The most popular cover objects used for
steganography are digital images. Digital images often have a large amount of redundant data, and this is what
steganography uses to hide the message [13]. Cryptography merely obscures the integrity of the information so
that it does not make sense to anyone except the creator and the recipient. Steganography could be considered as
the dark cousin of cryptography. Cryptography assures privacy whereas Steganography assures secrecy.
Steganography and cryptography are both used to ensure data confidentiality. However, steganography differs
from cryptography in the sense that the cryptography focuses on keeping the contents of a message secret,
steganography focuses on keeping the existence of a message secret [14]. Thus, with cryptography anybody can
see that both parties are communicating in secret. Steganography hides the existence of a secret message in such
a way that nobody can see that both parties are communicating in secret.
The basics of embedding data rely on three different facts i.e. capacity, security, and robustness. Capacity means
the media on which the data is to be hidden should hold the data, so that the complexity of the medium should
not be disturbed [15]. Security means the embedding algorithm is said to be secure if the embedded information
cannot be removed beyond reliable detection by targeted attacks [16]. Finally, robustness means the amount of
manipulation a cover image (original image) can handle without drawing any attention that a change has taken
place. Steganography and cryptography have to guarantee any of the requirements.
III. PROPOSED METHOD
Ensuring data security is a big challenge for all computer users. To enhance the embedding capacity of
image steganography and provide an imperceptible stegoimage for human vision, it proposes a framework for
hiding large volumes of data in images by combining cryptography and steganography while incurring minimal
perceptual degradation and to solve the problem of unauthorized data access. Steganography can also be
implemented to cryptographic data so that it increases the security of this data. The method first encrypts a
message using transposition cipher technique and then embeds the encrypted message inside an image using
LSB embedding technique. The block diagram of proposed system is as shown in Fig. 1.
A Robust Technique to Encrypt and Decrypt…
www.ijesi.org 3 | Page
The resulting stego-image can be transmitted without revealing that secret information is being exchanged.
Furthermore, even if an attacker were to defeat the steganographic technique to detect the message from the
stego-image, he/she would still require the cryptographic decoding method to decipher the encrypted message.
3.1 Encryption Procedure
This encryptiom procedure is simple and efficient and is of symmetric type where only receiver and
sender know the secret key. The secret key length is variable and is of range double precision. At the receiver
side during extraction process the decryption, that is the reverse process of encryption is carried out using the
same key to obtain the secret message from the stego-image. In transposition cipher method, the plaintext is
written row wise in a matrix of given size, but is read out column wise in a specific order depending on a key
[17]. The key tells the size of the matrix. To encrypt plaintext, the transposition cipher writes the message in a
rectangle, row by row, and reads the message off, column by column, but permutes the order of the columns
based on the key. In a regular columnar transposition cipher, any extra spaces are filled with nulls and in an
irregular columnar transposition cipher, the spaces are left blank.
3.2 Data Embedding Procedure
Least Significant Bit substitution method is a very simple approach for embedding information in a
cover image. The basic idea is to insert the secret message in the least significant bits of the images. The
algorithm has to take the first N cover pixels, where N is the total length of the secret message that is to be
embedded in bits. After that every pixel's last bit will be replaced by one of the message bits. To explain how
the data embedding procedure works, let us consider the following cover image.
Byte 1 Byte 2 Byte 3 Byte 4 Byte 5 Byte 6 Byte 7 Byte 8
10101101 01011100 10011100 00101101 11000100 01101100 11010010 10110111
Suppose a secret number 183 is to embed. The binary equivalent of the number is 10110111. At least 8 bytes in
cover image are needed to embed the secret number 183. Now modify the LSB of each byte of the cover image
by each of the bit of the secret number 10110111. Table-1 shows the data embedding procedure for this secret
number 183.
Table 1: Data Embedding Procedure using LSB Method
Before Embedding After Embedding Bit Inserted Consequences
10101101 10101101 1 No change in bit pattern
01011100 01011100 0 No change in bit pattern
10011100 10011101 1 Change in bit Pattern
00101101 00101101 1 No change in bit pattern
11000100 11000100 0 No change in bit pattern
01101100 01101101 1 Change in bit Pattern
11010010 11010011 1 Change in bit Pattern
10110111 10110111 1 No change in bit pattern
3.3 Data Extraction Procedure
The data extraction procedure is the inverse of the data embedding procedure. In this procedure the
secret message is extracted from the stego-image. The receiver inputs the stego-image to the data extraction
algorithm. The LSBs of each pixel of stego-image is extracted and placed in an array. Each 8 bit from the array
is then converted into characters. This output is actually encrypted form of the original message. Then the
message is decrypted using the same transposition method that is used in encrypting. In decrypting, the
ciphertext is written row wise in a matrix of same size as in encrypting method. To get the plaintext, the matrix
will be read out column wise in a specific order depending on the key.
IV. IMPLEMENTATION AND EXPERIMENTAL RESULTS
Fig. 2 shows the steganography process of the cover image being passed into the embedding
function with the message to encode resulting in a stego-image containing the hidden message. A key is used to
protect the hidden message. The key is usually a password also used to encrypt and decrypt the message before
and after embedding. Secret message can be hidden inside all sorts of cover information: text, images, audio,
video and more. However, there are tools available to store secrets inside almost any type of cover source. The
most important property of a cover source is the amount of data that can be stored inside it, without changing the
noticeable properties of the cover image.
A Robust Technique to Encrypt and Decrypt…
www.ijesi.org 4 | Page
It has basically two modules: i) Encryption and Embedding Module, and ii) Extraction and Decryption Module.
First module is used to hide encrypted information into the image; no one can see that information. This module
requires any type of image and message and gives the only one image file in the destination.
Second module is used to get the hidden information in an image file. It takes the image file as an output, and
gives two files at the destination folder, one is the same image file and another is the original message file.
The graphical representation of the system is as follows:
1. Encryption and Embedding Module. Select two files: Image file and Message file as input.
(a) Start application (b) Selection of the image file
(c) Preview of the image file (d) Selection of the message file
Secret Message
Encryption and
Embedding
Key
Stego Image
Cover Image
Extraction and
Decryption
Key
Extracted
Secret Message
Fig. 2: Steganography Procedure
A Robust Technique to Encrypt and Decrypt…
www.ijesi.org 5 | Page
I. CONCLUSION (11 BOLD)
(e) Stego-image
Fig. 3: Encryption and Embedding Module
2. Extraction and Decryption Module. Select Stego-image file as input.
(a) Start application (b) Selection of the stego-image file
(c) Preview of the stego-image (d) After extraction generated message file
Fig. 4: Extraction and Decryption Module
A Robust Technique to Encrypt and Decrypt…
www.ijesi.org 6 | Page
V. CONCLUSION
Data security is the most important issue in any communication. Lots of data security and data hiding
algorithms have been developed in the last decade. Steganography has its place in security. It is the art of hiding
information and an effort to conceal the existence of the embedded information. This work is a combination of
steganography and cryptography, which provides a strong backbone for its security. Original message is being
hidden within a carrier such that the changes so occurred in the carrier are not observable. In this paper we have
discussed how digital images can be used as a carrier to hide messages. Steganography is a useful tool that
allows covert transmission of information over communication channel. Combining secret image with the
carrier image gives the hidden image. The hidden image is difficult to detect without retrieval. The entire work
has done in MATLAB. The hidden message is encrypted using a simple encryption algorithm using secret key
and hence it will be almost impossible for the intruder to unhide the actual secret message from the embedded
cover file without knowing secret key.
Steganography has numerous useful applications. However, it can be misused like other technologies. For
instance terrorists may use this technique for their secret secure communication.
REFERENCES
[1] Khare, P., Singh, J. and Tiwari, M., “Digital Image Steganography”, Journal of Engineering Research
and Studies, Vol. II, Issue III, pp. 101-104, 2011, ISSN: 0976-7916.
[2] Ghoshal N., Mandal, J. K., “Masking based Data Hiding and Image Authentication Technique
(MDHIAT)”, Proceedings of 16th International Conference of IEEE on Advanced Computing and
Communications ADCOM-2008, ISBN: 978-1-4244-2962-2, December 14-17th, Anna University.
[3] S. Pavan, S. Gangadharpalli and V. Sridhar, “Multivariate entropy detector based hybrid image
registration algorithm”, IEEE Int. Conf. on Acoustics, Speech and Signal Processing, Philadelphia,
Pennsylvania, USA, pp. 18-23, March 2005.
[4] P. Moulin and J. A. O’Sullivan, “Information-theoretic analysis of information Hiding”, IEEE Trans. On
Info. Theory, Vol. 49, No. 3, pp. 563-593, March 2003.
[5] C. Rechberger, V. Rijman and N. Sklavos, “The NIST cryptographic Workshop on Hash Functions”,
IEEE Security & Privacy, Vol. 4, pp. 54-56, Austria, Jan-Feb 2006.
[6] C.Y. Lin and S. F. Chang, “A robust image authentication method surviving JPEG lossy compression”,
Proc. SPIE, Vol. 3312, San Jose, pp. 296-307, Jan. 1998.
[7] S. Dumitrescu, W. Xiaolin and Z. Wang, “Detection of LSB steganography via sample pair analysis”,
IEEE Trans. on Signal processing, Vol. 51, No. 7, pp. 1995-2007, 2003
[8] R., Chandramouli, and Nasir Memon., "Analysis of LSB based image steganography techniques."
International Conference on Image Processing, 2001, IEEE, Vol. 3, pp. 1019-1022.
[9] Petitcolas, F.A.P., Anderson, R. J. and Kuhn, M.G. “Information Hiding -A Survey”, Proceedings of the
IEEE, Special issue on Protection of Multimedia Content, Vol. 87, No. 7, 1999, pp.1062-1078.
[10] Younes, M.A.B. and Jantan, A., "Image Encryption Using Block-Based Transformation Algorithm,"
International Journal of Computer Science, Vol. 35, Issue.1, 2008, pp.15-23.
[11] Rabah, K., “Steganography – The Art of Hiding Data”, Information Technology Journal, Vol.3, no.3,
2004, pp. 245-269.
[12] Chan, Chi-Kwong, and L. M. Cheng., "Hiding data in images by simple LSB substitution." Pattern
Recognition Vol. 37, No. 3, 2004, pp. 469-474.
[13] Curran, K. and Bailey, K., “An Evaluation of Image Based Steganography Methods”, International
Journal of Digital Evidence Fall 2003, Volume 2, Issue 2, www.ijde.org.
[14] Raphael, A. J. and Sundaram, V. “Cryptography and Steganography – A Survey”, Int. J. Comp. Tech.
Appl., Vol 2 (3), pp. 626-630, ISSN: 2229-6093.
[15] Laskar, S.A. and Hemachandran, K., “An Analysis of Steganography and Steganalysis Techniques”,
Assam University Journal of Sscience and Technology, Vol.9, No.II, 2012, pp.83-103, ISSN: 0975-2773.
[16] Soumyendu Das, Subhendu Das, Bijoy Bandyopadhyay, Sugata Sanyal, “Steganography and
Steganalysis: Different Approaches”, International Journal of Computers, Information Technology and
Engineering (IJCITAE), Vol. 2, No 1, June, 2008, Serial Publications, pp. 1-11.
[17] Kahate, A., “Cryptography and Network Security”, 2nd Edition, Tata McGraw-Hill, 2008.
A Robust Technique to Encrypt and Decrypt…
www.ijesi.org 7 | Page
AUTHOR’S PROFILE
Md. Shamimul Islam completed his B.Sc (Hons) and M.S. in Computer Science and Engineering
from Jahangirnagar University in 2011 and 2012 respectively. His research interests include Image Processing,
Mobile Applications Development, Software Engineering and so on.
Mahbuba Begum received her B.Sc. and M.S. degree in Computer Science and Engineering from
Jahangirnagar University, Bangladesh, in the year 2007 and 2009, respectively. Currently, She is serving in the
Department of Computer Science and Engineering, Mawlana Bhashani Science and Technology University,
Tangail, Bangladesh as a Lecturer. Her research interest is image processing, pattern recognition, face
recognition & trademarks recognition
Kanija Muntarina completed her B.Sc (Hons) in Computer Science and Engineering from
Jahangirnagar University in 2003 and M.S. in Computer Science and Engineering from the same University in
2005 respectively. Currently, She is an Assistant Professor in the Dept. of Computer Science and Engineering,
Dhaka City College, Dhaka, Bangladesh. Her research interests include Artificial Intelligence, Neural Networks,
Computer Vision, Image Processing and so on.
Md. Golam Moazzam completed his B.Sc (Hons) in Electronics and Computer Science and M.S. in
Computer Science and Engineering from Jahangirnagar University in 1997 and 2001 respectively. His research
interests include Digital Image Processing, Artificial Intelligence, Computer Graphics, Neural Networks,
Computer Vision and so on.

Weitere ähnliche Inhalte

Was ist angesagt?

Secure Data Hiding System by using AES Algorithm and Indicator Based LSB Method
Secure Data Hiding System by using AES Algorithm and Indicator Based LSB MethodSecure Data Hiding System by using AES Algorithm and Indicator Based LSB Method
Secure Data Hiding System by using AES Algorithm and Indicator Based LSB Methodijtsrd
 
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...IOSR Journals
 
Review paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and SteganographyReview paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and Steganographyvivatechijri
 
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMA SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMijcisjournal
 
A Review on Stegnography Data Hiding using Color Images
A Review on Stegnography Data Hiding using Color ImagesA Review on Stegnography Data Hiding using Color Images
A Review on Stegnography Data Hiding using Color Imagesijtsrd
 
Data security using stegnography and quantum cryptography
Data security using stegnography and quantum cryptographyData security using stegnography and quantum cryptography
Data security using stegnography and quantum cryptographyAlexander Decker
 
Analysis of Different Steganography Algorithms and Security Issues
Analysis of Different Steganography Algorithms and Security IssuesAnalysis of Different Steganography Algorithms and Security Issues
Analysis of Different Steganography Algorithms and Security IssuesIRJAES Editor
 
LSB Based Image Steganography for Information Security System
LSB Based Image Steganography for Information Security SystemLSB Based Image Steganography for Information Security System
LSB Based Image Steganography for Information Security Systemijtsrd
 
Image Steganography V2 i11 0143
Image Steganography V2 i11 0143Image Steganography V2 i11 0143
Image Steganography V2 i11 0143Praneeta Dehare
 
A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHY
A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHYA NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHY
A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHYcscpconf
 
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...A Survey on Enhancement of Text Security Using Steganography and Cryptographi...
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...ijtsrd
 
Secure Message Transmission using Image Steganography on Desktop Based
Secure Message Transmission using Image Steganography on Desktop BasedSecure Message Transmission using Image Steganography on Desktop Based
Secure Message Transmission using Image Steganography on Desktop Basedijtsrd
 
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHYA SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHYcsandit
 
Hiding Text within Image Using LSB Replacement
Hiding Text within Image Using LSB ReplacementHiding Text within Image Using LSB Replacement
Hiding Text within Image Using LSB ReplacementIOSR Journals
 
TWO PHASE CLANDESTAIN IMAGE ENCRYPTION
TWO PHASE CLANDESTAIN IMAGE ENCRYPTION TWO PHASE CLANDESTAIN IMAGE ENCRYPTION
TWO PHASE CLANDESTAIN IMAGE ENCRYPTION acijjournal
 
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITION
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITIONDUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITION
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITIONIJNSA Journal
 

Was ist angesagt? (18)

Secure Data Hiding System by using AES Algorithm and Indicator Based LSB Method
Secure Data Hiding System by using AES Algorithm and Indicator Based LSB MethodSecure Data Hiding System by using AES Algorithm and Indicator Based LSB Method
Secure Data Hiding System by using AES Algorithm and Indicator Based LSB Method
 
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
 
Review of Role of Digital Video in Information Security
Review of Role of Digital Video in Information SecurityReview of Role of Digital Video in Information Security
Review of Role of Digital Video in Information Security
 
319 325
319 325319 325
319 325
 
Review paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and SteganographyReview paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and Steganography
 
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMA SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
 
A Review on Stegnography Data Hiding using Color Images
A Review on Stegnography Data Hiding using Color ImagesA Review on Stegnography Data Hiding using Color Images
A Review on Stegnography Data Hiding using Color Images
 
Data security using stegnography and quantum cryptography
Data security using stegnography and quantum cryptographyData security using stegnography and quantum cryptography
Data security using stegnography and quantum cryptography
 
Analysis of Different Steganography Algorithms and Security Issues
Analysis of Different Steganography Algorithms and Security IssuesAnalysis of Different Steganography Algorithms and Security Issues
Analysis of Different Steganography Algorithms and Security Issues
 
LSB Based Image Steganography for Information Security System
LSB Based Image Steganography for Information Security SystemLSB Based Image Steganography for Information Security System
LSB Based Image Steganography for Information Security System
 
Image Steganography V2 i11 0143
Image Steganography V2 i11 0143Image Steganography V2 i11 0143
Image Steganography V2 i11 0143
 
A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHY
A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHYA NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHY
A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHY
 
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...A Survey on Enhancement of Text Security Using Steganography and Cryptographi...
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...
 
Secure Message Transmission using Image Steganography on Desktop Based
Secure Message Transmission using Image Steganography on Desktop BasedSecure Message Transmission using Image Steganography on Desktop Based
Secure Message Transmission using Image Steganography on Desktop Based
 
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHYA SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
 
Hiding Text within Image Using LSB Replacement
Hiding Text within Image Using LSB ReplacementHiding Text within Image Using LSB Replacement
Hiding Text within Image Using LSB Replacement
 
TWO PHASE CLANDESTAIN IMAGE ENCRYPTION
TWO PHASE CLANDESTAIN IMAGE ENCRYPTION TWO PHASE CLANDESTAIN IMAGE ENCRYPTION
TWO PHASE CLANDESTAIN IMAGE ENCRYPTION
 
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITION
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITIONDUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITION
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITION
 

Andere mochten auch

Владислав Володин: «Как получить максимальную эффективность от размещения в к...
Владислав Володин: «Как получить максимальную эффективность от размещения в к...Владислав Володин: «Как получить максимальную эффективность от размещения в к...
Владислав Володин: «Как получить максимальную эффективность от размещения в к...Prom
 
Create personal brand to beat your competitor
Create personal brand to beat your competitorCreate personal brand to beat your competitor
Create personal brand to beat your competitorAtticus Wood
 
Skenario
SkenarioSkenario
Skenarioizzynet
 
ИТ – эффективный инструмент: цифры и факты
ИТ – эффективный инструмент: цифры и фактыИТ – эффективный инструмент: цифры и факты
ИТ – эффективный инструмент: цифры и фактыКРОК
 
C03 galia duvidzon_archive_best_practice
C03 galia duvidzon_archive_best_practiceC03 galia duvidzon_archive_best_practice
C03 galia duvidzon_archive_best_practiceevaminerva
 
The Aviso eCar will Wean the Philippines from Carcinogenic Gasoline & Poverty...
The Aviso eCar will Wean the Philippines from Carcinogenic Gasoline & Poverty...The Aviso eCar will Wean the Philippines from Carcinogenic Gasoline & Poverty...
The Aviso eCar will Wean the Philippines from Carcinogenic Gasoline & Poverty...Arnulfo Laniba
 
Evaluation Question 5
Evaluation Question 5Evaluation Question 5
Evaluation Question 5JessicaDawson
 
Narrative music vids 15
Narrative music vids 15Narrative music vids 15
Narrative music vids 15cazfernandez
 
The Impact of the quest for land to people with HIV and AIDS in Zimbabwe
The Impact of the quest for land to people with HIV and AIDS in ZimbabweThe Impact of the quest for land to people with HIV and AIDS in Zimbabwe
The Impact of the quest for land to people with HIV and AIDS in Zimbabweinventionjournals
 

Andere mochten auch (17)

Förkläde
Förkläde Förkläde
Förkläde
 
Владислав Володин: «Как получить максимальную эффективность от размещения в к...
Владислав Володин: «Как получить максимальную эффективность от размещения в к...Владислав Володин: «Как получить максимальную эффективность от размещения в к...
Владислав Володин: «Как получить максимальную эффективность от размещения в к...
 
PE INTAN KASAR
PE INTAN KASARPE INTAN KASAR
PE INTAN KASAR
 
Create personal brand to beat your competitor
Create personal brand to beat your competitorCreate personal brand to beat your competitor
Create personal brand to beat your competitor
 
Storyboard - UPDATE
Storyboard - UPDATEStoryboard - UPDATE
Storyboard - UPDATE
 
Skenario
SkenarioSkenario
Skenario
 
3 Мотивация
3 Мотивация3 Мотивация
3 Мотивация
 
ИТ – эффективный инструмент: цифры и факты
ИТ – эффективный инструмент: цифры и фактыИТ – эффективный инструмент: цифры и факты
ИТ – эффективный инструмент: цифры и факты
 
DOKUMEN PERUSAHAAN DI BIDANG PERTAMBANGAN
DOKUMEN PERUSAHAAN DI BIDANG PERTAMBANGANDOKUMEN PERUSAHAAN DI BIDANG PERTAMBANGAN
DOKUMEN PERUSAHAAN DI BIDANG PERTAMBANGAN
 
C03 galia duvidzon_archive_best_practice
C03 galia duvidzon_archive_best_practiceC03 galia duvidzon_archive_best_practice
C03 galia duvidzon_archive_best_practice
 
The Aviso eCar will Wean the Philippines from Carcinogenic Gasoline & Poverty...
The Aviso eCar will Wean the Philippines from Carcinogenic Gasoline & Poverty...The Aviso eCar will Wean the Philippines from Carcinogenic Gasoline & Poverty...
The Aviso eCar will Wean the Philippines from Carcinogenic Gasoline & Poverty...
 
Evaluation Question 5
Evaluation Question 5Evaluation Question 5
Evaluation Question 5
 
DCC_Portfolio
DCC_PortfolioDCC_Portfolio
DCC_Portfolio
 
Narrative music vids 15
Narrative music vids 15Narrative music vids 15
Narrative music vids 15
 
Ijcatr04041017
Ijcatr04041017Ijcatr04041017
Ijcatr04041017
 
Mm ayto br_t2_rev3
Mm ayto br_t2_rev3Mm ayto br_t2_rev3
Mm ayto br_t2_rev3
 
The Impact of the quest for land to people with HIV and AIDS in Zimbabwe
The Impact of the quest for land to people with HIV and AIDS in ZimbabweThe Impact of the quest for land to people with HIV and AIDS in Zimbabwe
The Impact of the quest for land to people with HIV and AIDS in Zimbabwe
 

Ähnlich wie A Robust Technique to Encrypt and Decrypt Confidential Data within Image

An Overview of Steganography
An Overview of SteganographyAn Overview of Steganography
An Overview of SteganographyIOSR Journals
 
Feature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised ClusteringFeature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised ClusteringEditor IJCATR
 
Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...Editor IJCATR
 
Text Embedded System using LSB Method
Text Embedded System using LSB MethodText Embedded System using LSB Method
Text Embedded System using LSB Methodijtsrd
 
ASSOCIATION OF CRYPTOGRAPHY AND STEGANOGRAPHY
ASSOCIATION OF CRYPTOGRAPHY AND STEGANOGRAPHYASSOCIATION OF CRYPTOGRAPHY AND STEGANOGRAPHY
ASSOCIATION OF CRYPTOGRAPHY AND STEGANOGRAPHYAsia Smith
 
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMA SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMijcisjournal
 
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITION
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITIONDUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITION
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITIONIJNSA Journal
 
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY IJCNCJournal
 
A Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and SteganographyA Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and SteganographyIJCNCJournal
 
Images Steganography using Pixel Value Difference and Histogram Analysis
Images Steganography using Pixel Value  Difference and Histogram AnalysisImages Steganography using Pixel Value  Difference and Histogram Analysis
Images Steganography using Pixel Value Difference and Histogram AnalysisNortheastern University
 
Steganography Engineering project report
Steganography Engineering project reportSteganography Engineering project report
Steganography Engineering project reportRishab Gupta
 
A Review on - Data Hiding using Cryptography and Steganography
A Review on - Data Hiding using Cryptography and SteganographyA Review on - Data Hiding using Cryptography and Steganography
A Review on - Data Hiding using Cryptography and SteganographyMangaiK4
 

Ähnlich wie A Robust Technique to Encrypt and Decrypt Confidential Data within Image (15)

A NOVEL APPROACHES TOWARDS STEGANOGRAPHY
A NOVEL APPROACHES TOWARDS STEGANOGRAPHYA NOVEL APPROACHES TOWARDS STEGANOGRAPHY
A NOVEL APPROACHES TOWARDS STEGANOGRAPHY
 
An Overview of Steganography
An Overview of SteganographyAn Overview of Steganography
An Overview of Steganography
 
H017255560
H017255560H017255560
H017255560
 
Feature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised ClusteringFeature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised Clustering
 
Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...
 
Text Embedded System using LSB Method
Text Embedded System using LSB MethodText Embedded System using LSB Method
Text Embedded System using LSB Method
 
ASSOCIATION OF CRYPTOGRAPHY AND STEGANOGRAPHY
ASSOCIATION OF CRYPTOGRAPHY AND STEGANOGRAPHYASSOCIATION OF CRYPTOGRAPHY AND STEGANOGRAPHY
ASSOCIATION OF CRYPTOGRAPHY AND STEGANOGRAPHY
 
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMA SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
 
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITION
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITIONDUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITION
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITION
 
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
 
A Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and SteganographyA Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and Steganography
 
Images Steganography using Pixel Value Difference and Histogram Analysis
Images Steganography using Pixel Value  Difference and Histogram AnalysisImages Steganography using Pixel Value  Difference and Histogram Analysis
Images Steganography using Pixel Value Difference and Histogram Analysis
 
F1803023843
F1803023843F1803023843
F1803023843
 
Steganography Engineering project report
Steganography Engineering project reportSteganography Engineering project report
Steganography Engineering project report
 
A Review on - Data Hiding using Cryptography and Steganography
A Review on - Data Hiding using Cryptography and SteganographyA Review on - Data Hiding using Cryptography and Steganography
A Review on - Data Hiding using Cryptography and Steganography
 

Kürzlich hochgeladen

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 

Kürzlich hochgeladen (20)

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 

A Robust Technique to Encrypt and Decrypt Confidential Data within Image

  • 1. International Journal of Engineering Science Invention ISSN (Online): 2319 – 6734, ISSN (Print): 2319 – 6726 www.ijesi.org ||Volume 4 Issue 11|| November 2015 || PP.01-07 www.ijesi.org 1 | Page A Robust Technique to Encrypt and Decrypt Confidential Data within Image Md. Shamimul Islam1 , Mahbuba Begum2 , Kanija Muntarina3 , and Md. Golam Moazzam1 1 Department of CSE, Jahangirnagar University, Savar, Dhaka-1342. Bangladesh. 2 Department of CSE, Mawlana Bhashani Science and Technology University, Tangail, Bangladesh 3 Department of CSE, Dhaka City College, Dhaka, Bangladesh. ABSTRACT : The rapid development of data transfer through the Internet made it easier to send the data accurate and faster to the destination. There are many transmission media to transfer the data to destination like e-mails; at the same time it may be easier to modify and misuse the valuable information through hacking. So, in order to transfer the data securely to the destination without any modifications, there are many approaches like cryptography and steganography. This paper deals with a new technique steganography to hide encrypted confidential data within images. Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the internet. For hiding secret information in images, there exist a large variety of steganography techniques. Some are more complex than others and all of them have respective strong and weak points. Different applications may require absolute invisibility of the secret information, while others require a large secret message to be hidden. This paper intends to give a brief idea about the new image steganographic approach that makes use of Least Significant Bit (LSB) algorithm for embedding the data into the bit map image. KEYWORDS - Cryptography, Embedding technique, LSB, Steganography, Stegoimage. I. INTRODUCTION With the rapid growth of computer networks, data security has become a major concern and thus, data hiding technique has attracted people around the globe. Steganography techniques are used to address digital copyrights management, protect information, and conceal secrets [1]. It is the art and science of hiding information into picture or other media in such a way that no-one apart from the sender and intended recipient even realizes there is a hidden information [2], [3]. This includes the concealment of digital information within computer files. Generally, a steganographic message will appear to be something else, may be picture, video, sound file, even the radio communication. This apparent message is the covertext. For instance, a message may be hidden by using invisible ink between the visible lines of innocuous documents. The hidden information is called stego message which may be open message, but may be encrypted one as well. Data hiding [4] in the image has become an important technique for image authentication. Ownership verification and authentication is the major task for military people, research institute and scientist. It refers to the nearly invisible embedding of information within a host data set as message, image, and video. In steganographic [5], [6] applications, the hidden data may be secrete message or secrete hologram or secrete video whose mere presence within the host data set should be undetectable; The goal of steganography is to hide the message in the source image by some key techniques and cryptography is a process to hide the message content. To hide a message inside an image without changing its visible properties [7] the source image may be altered. The most common methods to make these alteration involves the usage of the least-significant bit (LSB) developed by masking, filtering and transformations on the source image [8]. This paper focuses on the technique to secure data or message with authenticity and integrity. The entire work has been done in MATLAB. In this work, the secret message is encrypted before the actual embedding process starts. It uses a simple encryption technique and a secret key and hence it will almost be impossible for the intruder to unhide the actual secret message from the embedded cover file without knowing secret key. Only receiver and sender know the secret key. N-bit LSB substitution technique is used as embedding and extraction method.
  • 2. A Robust Technique to Encrypt and Decrypt… www.ijesi.org 2 | Page II. LITERATURE REVIEW Information security and image authentication has become very important to protect digital image document from unauthorized access. Data is the backbone of today’s communication. To ensure that data is secured and does not go to unintended destination, the concept of data hiding came up to protect a piece of information [9]. Digital data can be delivered over computer networks with little errors and often without interference. The Internet provides a communication method to distribute information to the masses. Therefore, the confidentiality and data integrity are required to protect against unauthorized access and use. Steganography and Cryptography are parallel data security techniques and the techniques can be implemented side by side, in fact steganographic system can implement cryptographic data security. With cryptography we can protect the message but not hide its existence [10]. Steganography pay attention to the degree of invisibility while cryptography pays attention to the security of the message. Once the presence of hidden information is revealed or even suspected, the purpose of steganography is partly defeated. The strength of steganography can thus be increased by combining it with cryptography. Steganography relies on hiding message in unsuspected multimedia data and is generally used in secret communication between acknowledged parties [11]. The technique replaces insignificant bits of the digital media with the secret data. The concept is to embed the hidden object into a significantly larger object so that the change is undetectable by the human eye [12]. All digital file formats can be used for steganography, but the formats those are with a high degree of redundancy are more suitable. The redundant bits of an object are those bits that can be altered without the alteration being detected easily. The most popular cover objects used for steganography are digital images. Digital images often have a large amount of redundant data, and this is what steganography uses to hide the message [13]. Cryptography merely obscures the integrity of the information so that it does not make sense to anyone except the creator and the recipient. Steganography could be considered as the dark cousin of cryptography. Cryptography assures privacy whereas Steganography assures secrecy. Steganography and cryptography are both used to ensure data confidentiality. However, steganography differs from cryptography in the sense that the cryptography focuses on keeping the contents of a message secret, steganography focuses on keeping the existence of a message secret [14]. Thus, with cryptography anybody can see that both parties are communicating in secret. Steganography hides the existence of a secret message in such a way that nobody can see that both parties are communicating in secret. The basics of embedding data rely on three different facts i.e. capacity, security, and robustness. Capacity means the media on which the data is to be hidden should hold the data, so that the complexity of the medium should not be disturbed [15]. Security means the embedding algorithm is said to be secure if the embedded information cannot be removed beyond reliable detection by targeted attacks [16]. Finally, robustness means the amount of manipulation a cover image (original image) can handle without drawing any attention that a change has taken place. Steganography and cryptography have to guarantee any of the requirements. III. PROPOSED METHOD Ensuring data security is a big challenge for all computer users. To enhance the embedding capacity of image steganography and provide an imperceptible stegoimage for human vision, it proposes a framework for hiding large volumes of data in images by combining cryptography and steganography while incurring minimal perceptual degradation and to solve the problem of unauthorized data access. Steganography can also be implemented to cryptographic data so that it increases the security of this data. The method first encrypts a message using transposition cipher technique and then embeds the encrypted message inside an image using LSB embedding technique. The block diagram of proposed system is as shown in Fig. 1.
  • 3. A Robust Technique to Encrypt and Decrypt… www.ijesi.org 3 | Page The resulting stego-image can be transmitted without revealing that secret information is being exchanged. Furthermore, even if an attacker were to defeat the steganographic technique to detect the message from the stego-image, he/she would still require the cryptographic decoding method to decipher the encrypted message. 3.1 Encryption Procedure This encryptiom procedure is simple and efficient and is of symmetric type where only receiver and sender know the secret key. The secret key length is variable and is of range double precision. At the receiver side during extraction process the decryption, that is the reverse process of encryption is carried out using the same key to obtain the secret message from the stego-image. In transposition cipher method, the plaintext is written row wise in a matrix of given size, but is read out column wise in a specific order depending on a key [17]. The key tells the size of the matrix. To encrypt plaintext, the transposition cipher writes the message in a rectangle, row by row, and reads the message off, column by column, but permutes the order of the columns based on the key. In a regular columnar transposition cipher, any extra spaces are filled with nulls and in an irregular columnar transposition cipher, the spaces are left blank. 3.2 Data Embedding Procedure Least Significant Bit substitution method is a very simple approach for embedding information in a cover image. The basic idea is to insert the secret message in the least significant bits of the images. The algorithm has to take the first N cover pixels, where N is the total length of the secret message that is to be embedded in bits. After that every pixel's last bit will be replaced by one of the message bits. To explain how the data embedding procedure works, let us consider the following cover image. Byte 1 Byte 2 Byte 3 Byte 4 Byte 5 Byte 6 Byte 7 Byte 8 10101101 01011100 10011100 00101101 11000100 01101100 11010010 10110111 Suppose a secret number 183 is to embed. The binary equivalent of the number is 10110111. At least 8 bytes in cover image are needed to embed the secret number 183. Now modify the LSB of each byte of the cover image by each of the bit of the secret number 10110111. Table-1 shows the data embedding procedure for this secret number 183. Table 1: Data Embedding Procedure using LSB Method Before Embedding After Embedding Bit Inserted Consequences 10101101 10101101 1 No change in bit pattern 01011100 01011100 0 No change in bit pattern 10011100 10011101 1 Change in bit Pattern 00101101 00101101 1 No change in bit pattern 11000100 11000100 0 No change in bit pattern 01101100 01101101 1 Change in bit Pattern 11010010 11010011 1 Change in bit Pattern 10110111 10110111 1 No change in bit pattern 3.3 Data Extraction Procedure The data extraction procedure is the inverse of the data embedding procedure. In this procedure the secret message is extracted from the stego-image. The receiver inputs the stego-image to the data extraction algorithm. The LSBs of each pixel of stego-image is extracted and placed in an array. Each 8 bit from the array is then converted into characters. This output is actually encrypted form of the original message. Then the message is decrypted using the same transposition method that is used in encrypting. In decrypting, the ciphertext is written row wise in a matrix of same size as in encrypting method. To get the plaintext, the matrix will be read out column wise in a specific order depending on the key. IV. IMPLEMENTATION AND EXPERIMENTAL RESULTS Fig. 2 shows the steganography process of the cover image being passed into the embedding function with the message to encode resulting in a stego-image containing the hidden message. A key is used to protect the hidden message. The key is usually a password also used to encrypt and decrypt the message before and after embedding. Secret message can be hidden inside all sorts of cover information: text, images, audio, video and more. However, there are tools available to store secrets inside almost any type of cover source. The most important property of a cover source is the amount of data that can be stored inside it, without changing the noticeable properties of the cover image.
  • 4. A Robust Technique to Encrypt and Decrypt… www.ijesi.org 4 | Page It has basically two modules: i) Encryption and Embedding Module, and ii) Extraction and Decryption Module. First module is used to hide encrypted information into the image; no one can see that information. This module requires any type of image and message and gives the only one image file in the destination. Second module is used to get the hidden information in an image file. It takes the image file as an output, and gives two files at the destination folder, one is the same image file and another is the original message file. The graphical representation of the system is as follows: 1. Encryption and Embedding Module. Select two files: Image file and Message file as input. (a) Start application (b) Selection of the image file (c) Preview of the image file (d) Selection of the message file Secret Message Encryption and Embedding Key Stego Image Cover Image Extraction and Decryption Key Extracted Secret Message Fig. 2: Steganography Procedure
  • 5. A Robust Technique to Encrypt and Decrypt… www.ijesi.org 5 | Page I. CONCLUSION (11 BOLD) (e) Stego-image Fig. 3: Encryption and Embedding Module 2. Extraction and Decryption Module. Select Stego-image file as input. (a) Start application (b) Selection of the stego-image file (c) Preview of the stego-image (d) After extraction generated message file Fig. 4: Extraction and Decryption Module
  • 6. A Robust Technique to Encrypt and Decrypt… www.ijesi.org 6 | Page V. CONCLUSION Data security is the most important issue in any communication. Lots of data security and data hiding algorithms have been developed in the last decade. Steganography has its place in security. It is the art of hiding information and an effort to conceal the existence of the embedded information. This work is a combination of steganography and cryptography, which provides a strong backbone for its security. Original message is being hidden within a carrier such that the changes so occurred in the carrier are not observable. In this paper we have discussed how digital images can be used as a carrier to hide messages. Steganography is a useful tool that allows covert transmission of information over communication channel. Combining secret image with the carrier image gives the hidden image. The hidden image is difficult to detect without retrieval. The entire work has done in MATLAB. The hidden message is encrypted using a simple encryption algorithm using secret key and hence it will be almost impossible for the intruder to unhide the actual secret message from the embedded cover file without knowing secret key. Steganography has numerous useful applications. However, it can be misused like other technologies. For instance terrorists may use this technique for their secret secure communication. REFERENCES [1] Khare, P., Singh, J. and Tiwari, M., “Digital Image Steganography”, Journal of Engineering Research and Studies, Vol. II, Issue III, pp. 101-104, 2011, ISSN: 0976-7916. [2] Ghoshal N., Mandal, J. K., “Masking based Data Hiding and Image Authentication Technique (MDHIAT)”, Proceedings of 16th International Conference of IEEE on Advanced Computing and Communications ADCOM-2008, ISBN: 978-1-4244-2962-2, December 14-17th, Anna University. [3] S. Pavan, S. Gangadharpalli and V. Sridhar, “Multivariate entropy detector based hybrid image registration algorithm”, IEEE Int. Conf. on Acoustics, Speech and Signal Processing, Philadelphia, Pennsylvania, USA, pp. 18-23, March 2005. [4] P. Moulin and J. A. O’Sullivan, “Information-theoretic analysis of information Hiding”, IEEE Trans. On Info. Theory, Vol. 49, No. 3, pp. 563-593, March 2003. [5] C. Rechberger, V. Rijman and N. Sklavos, “The NIST cryptographic Workshop on Hash Functions”, IEEE Security & Privacy, Vol. 4, pp. 54-56, Austria, Jan-Feb 2006. [6] C.Y. Lin and S. F. Chang, “A robust image authentication method surviving JPEG lossy compression”, Proc. SPIE, Vol. 3312, San Jose, pp. 296-307, Jan. 1998. [7] S. Dumitrescu, W. Xiaolin and Z. Wang, “Detection of LSB steganography via sample pair analysis”, IEEE Trans. on Signal processing, Vol. 51, No. 7, pp. 1995-2007, 2003 [8] R., Chandramouli, and Nasir Memon., "Analysis of LSB based image steganography techniques." International Conference on Image Processing, 2001, IEEE, Vol. 3, pp. 1019-1022. [9] Petitcolas, F.A.P., Anderson, R. J. and Kuhn, M.G. “Information Hiding -A Survey”, Proceedings of the IEEE, Special issue on Protection of Multimedia Content, Vol. 87, No. 7, 1999, pp.1062-1078. [10] Younes, M.A.B. and Jantan, A., "Image Encryption Using Block-Based Transformation Algorithm," International Journal of Computer Science, Vol. 35, Issue.1, 2008, pp.15-23. [11] Rabah, K., “Steganography – The Art of Hiding Data”, Information Technology Journal, Vol.3, no.3, 2004, pp. 245-269. [12] Chan, Chi-Kwong, and L. M. Cheng., "Hiding data in images by simple LSB substitution." Pattern Recognition Vol. 37, No. 3, 2004, pp. 469-474. [13] Curran, K. and Bailey, K., “An Evaluation of Image Based Steganography Methods”, International Journal of Digital Evidence Fall 2003, Volume 2, Issue 2, www.ijde.org. [14] Raphael, A. J. and Sundaram, V. “Cryptography and Steganography – A Survey”, Int. J. Comp. Tech. Appl., Vol 2 (3), pp. 626-630, ISSN: 2229-6093. [15] Laskar, S.A. and Hemachandran, K., “An Analysis of Steganography and Steganalysis Techniques”, Assam University Journal of Sscience and Technology, Vol.9, No.II, 2012, pp.83-103, ISSN: 0975-2773. [16] Soumyendu Das, Subhendu Das, Bijoy Bandyopadhyay, Sugata Sanyal, “Steganography and Steganalysis: Different Approaches”, International Journal of Computers, Information Technology and Engineering (IJCITAE), Vol. 2, No 1, June, 2008, Serial Publications, pp. 1-11. [17] Kahate, A., “Cryptography and Network Security”, 2nd Edition, Tata McGraw-Hill, 2008.
  • 7. A Robust Technique to Encrypt and Decrypt… www.ijesi.org 7 | Page AUTHOR’S PROFILE Md. Shamimul Islam completed his B.Sc (Hons) and M.S. in Computer Science and Engineering from Jahangirnagar University in 2011 and 2012 respectively. His research interests include Image Processing, Mobile Applications Development, Software Engineering and so on. Mahbuba Begum received her B.Sc. and M.S. degree in Computer Science and Engineering from Jahangirnagar University, Bangladesh, in the year 2007 and 2009, respectively. Currently, She is serving in the Department of Computer Science and Engineering, Mawlana Bhashani Science and Technology University, Tangail, Bangladesh as a Lecturer. Her research interest is image processing, pattern recognition, face recognition & trademarks recognition Kanija Muntarina completed her B.Sc (Hons) in Computer Science and Engineering from Jahangirnagar University in 2003 and M.S. in Computer Science and Engineering from the same University in 2005 respectively. Currently, She is an Assistant Professor in the Dept. of Computer Science and Engineering, Dhaka City College, Dhaka, Bangladesh. Her research interests include Artificial Intelligence, Neural Networks, Computer Vision, Image Processing and so on. Md. Golam Moazzam completed his B.Sc (Hons) in Electronics and Computer Science and M.S. in Computer Science and Engineering from Jahangirnagar University in 1997 and 2001 respectively. His research interests include Digital Image Processing, Artificial Intelligence, Computer Graphics, Neural Networks, Computer Vision and so on.