Open Access Journal

ISSN : 2394 - 6849 (Online)

International Journal of Engineering Research in Electronics and Communication Engineering(IJERECE)

Monthly Journal for Electronics and Communication Engineering

Open Access Journal

International Journal of Engineering Research in Electronics and Communication Engineering(IJERECE)

Monthly Journal for Electronics and Communication Engineering

ISSN : 2394-6849 (Online)

Secure Image Transmission Technique using Cryptograhy and Steganography

Author : A. Poonguzhali 1 Bindhiya B.S 2 Dhanvanthi P 3 Deeksha V 4 Chaithra S 5

Date of Publication :16th May 2017

Abstract: Cryptography and steganography are two conventional techniques used to cipher or hide information or data in existing communication. Cryptography is the art of saving information by encrypting it into an obscure format. On the other hand, steganography is the art and science of secret communication to send messages in a way which hides even the existence of the communication. Although cryptography and steganography provide an acceptable level of security when used separately via communicating in the unreliable medium like the Internet, advances in steganalysis make it a constantly an evolving field. This project aims to improve a new scheme of hiding a secret image in a cover image, by exploiting the benefits of combining both cryptography and steganography.The security of the images has always been a concern while transferring the images over the internet. In the proposed framework, the secret Image is encrypted using XOR Cipher Algorithm and embedded into the cover image using LSB Algorithm.Finally the encrypted secret image file is extracted from embedded cover image using LSB algorithm and decrypting the secret image again using Stream cipher algorithm to recover the original image.

Reference :

    1. “Expansion Embedding Techniques for Reversible Watermarking”,By Diljith M. Thodi and Jeffrey J. Rodríguez - in IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 16, NO. 3, MARCH 2007
    2. ” Efficient Compression of Encrypted Grayscale Images”,By Wei Liu, Wenjun Zeng,Lina Dong, and Qiuming Yao – in IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 19, NO. 4, APRIL 2010
    3. ” An Efficient Buyer-Seller Watermarking Protocol Based on Composite Signal Representation”,By M. Deng, T. Bianchi, A. Piva, and B. Preneel – in Proc. 11th ACM Workshop Multimedia and Security, 2009, pp. 9–18
    4. ”Reversible Image Watermarking Using Interpolation Technique”,By Lixin Luo, Zhenyong Chen, Ming Chen, Xiao Zeng, and Zhang Xiong – in IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 5, NO. 1, MARCH 2010
    5. “Scalable Coding of Encrypted Images”, By X. Zhang, G. Feng, Y. Ren and Z. Qian – in IEEE Trans. Inform. Forensics Security, vol. 21, no. 6, pp.3108-3114, June 2012.
    6. “On compressing encrypted data”,By M. Johnson, P. Ishwar, V. M. Prabhakaran, D. Schonberg, and K. Ramchandran, -in IEEE Trans. Signal Process., vol. 52, no. 10, pp. 2992–3006, Oct. 2004.
    7. "Expansion Embedding Techniques for Reversible Watermarking”,By D. M. Thodi and J. J. Rodriguez – in IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 16, NO. 3, MARCH 2007
    8. “Separable Reversible Data hiding in Encrypted Images by n-nary Histogram Modification”,By Z. Qian, X. Han and X. Zhang – in 3rd International Conference on Multimedia Technology (ICMT 2013), pp. 869-876, Guangzhou, China, 2013.

Recent Article