Image Security Using Steganography And Cryptographic Techniques
Journal Title: INTERNATIONAL JOURNAL OF ENGINEERING TRENDS AND TECHNOLOGY - Year 2012, Vol 3, Issue 3
Abstract
Steganography is the art of hiding the fact communication is taking place, by hiding information in other information.Many different carrier file formats can be used,but digital images are the most popular because of their frequency on the internet.This paper introduces two new methods where in cryptography and steganography are combined to encrypt the data as well as to hide the data in another medium through image processing . This paper securing the image by encryption is done by DES algorithm using the key image. The encrypted image can be hide in another image by using LSB techniques,so that the secret’s very existence is concealed. The decryption can be done by the same key image using DES algorithm.
Authors and Affiliations
R. Nivedhitha1 , Dr. T. Meyyappan,M. sc. ,M. Phil. ,M. BA. ,Ph. D2
A Novel Method for Detecting Triple JPEG Compression with the Same Quantization Matrix
The detection of JPEG compression plays an important role in digital forensics. The JPEG image can be compressed one, two, three or n times. But if the number of times of the compression of a same JPEG image incr...
Sinusoidal and Space Vector Pulse Width Modulation for Inverter
Inverters inherently have the property of controlling output frequency but the output voltage can’t be varied. Usually to vary output voltage we have to vary supply voltage which is not always possible for this r...
Enhancement of Public Transportation Services Using Wireless Technologies
One of the major issues now a days is controlling of traffic. The main motive in bringing up this paper is to develop a user friendly system for transportation purpose by involving wireless technologies like Zigbee, RFID...
ARM7 BASED SMART CAR SECURITY SYSTEM.
main aim of this project is to offer an advance security system in CAR, which consists of a face detection subsystem, a GPS module, a GSM module and a control platform. The face detection subsystem can detect fac...
A Survey on an Efficient Technique of Encryption Scheme and its Extension in Cloud Based PHR System
Scalable and secure sharing of personal health record in cloud computing is an emerging trend in Health field for exchange and the use of personal Health information. This sensitive data is shared and stored by the third...