SECURE TRANSACTION USING VISUAL CRYPTOGRAPHY AND STEGANOGRAPHY

Journal Title: World Journal of Engineering Research and Technology - Year 2018, Vol 4, Issue 3

Abstract

It is not safe to rely on internet to store all the information because of tremendous realization and growth in the field of internet technology and hacking. For personal privacy protection, it‟s needed to secure data while transmission through electronic media. Image encryption is one of the innovative are a in this era of Internet technology. The algorithm mainly deals with Image Processing, Visual Cryptography and Steganography. In this paper, any image from the applicant is processed in such a way that it is pre-processed and encrypted first using standard AES algorithm. Pixels of encrypted image are modified by Chaotic Genetic Algorithm. This modified image is embedded in Cover image using Steganography. Decomposition of this image is done using Discrete Wavelet Transform. One approximate share of output image is given to the applicant and all other shares are preserved in the database. The applicant need to provide his share during every transaction and those shares are over lapped with the already existing shares in the database and a check for authentication is done by using correlation technique. If a higher correlation co-efficient is achieved, then the authentication is succeeded. Also, value of MSE is lower so the Error.

Authors and Affiliations

Shweta Sisodiya

Keywords

Related Articles

INDIAN GOVERNMENT’S KEY TARGETS AND POLICIES RELATING TO REDUCTION AND ELIMINATION OF ENERGY POVERTY

This paper is a guide for the people highlighting Indian Government’s key targets and policies relating to reduction and elimination of energy poverty in the country. It is a well-known fact that India is one among the d...

IMPROVING THE SENSE OF APPRECIATION AND BEHAVIORAL LOYALTY OF INSURANCE CLIENTS THROUGH RELATIONAL MARKETING

Background and purpose: relational marketing means maintaining customers, developing relations and making the relations even more attractive for customers. Relational marketing is the identification, creation and promoti...

ENERGY OPTIMIZATION IN WSN USING CHANNEL CODING

The Wireless Sensor networks are highly distributed networks of small, lightweight wireless nodes, deployed in large numbers to monitor the physical or environmental conditions. The major challenges of WSN arerobust, rel...

MECHANICAL ENGINEERING IN ANCIENT EGYPT, PART 59: SYMBOLS INDUSTRY (EARLY DYNASTIC TO MIDDLE KINGDOM)

The objective of this paper is to investigate the development of mechanical engineering in ancient Egypt through the design and use of symbols during the Early Dynastic to Middle Kingdom Periods. This study covers the ap...

DESIGN OF PI CONTROLLER FOR A CONICAL TANK SYSTEM

Conical tanks are widely used in the process industries because of its shape that contributes better drainage for solid mixtures, slurries and viscous liquids. The cone is a well-known system, which is having high non li...

Download PDF file
  • EP ID EP662292
  • DOI -
  • Views 187
  • Downloads 0

How To Cite

Shweta Sisodiya (2018). SECURE TRANSACTION USING VISUAL CRYPTOGRAPHY AND STEGANOGRAPHY. World Journal of Engineering Research and Technology, 4(3), 96-108. https://europub.co.uk/articles/-A-662292