SECURE TRANSACTION USING VISUAL CRYPTOGRAPHY AND STEGANOGRAPHY
Journal Title: World Journal of Engineering Research and Technology - Year 2018, Vol 4, Issue 3
Abstract
It is not safe to rely on internet to store all the information because of tremendous realization and growth in the field of internet technology and hacking. For personal privacy protection, it‟s needed to secure data while transmission through electronic media. Image encryption is one of the innovative are a in this era of Internet technology. The algorithm mainly deals with Image Processing, Visual Cryptography and Steganography. In this paper, any image from the applicant is processed in such a way that it is pre-processed and encrypted first using standard AES algorithm. Pixels of encrypted image are modified by Chaotic Genetic Algorithm. This modified image is embedded in Cover image using Steganography. Decomposition of this image is done using Discrete Wavelet Transform. One approximate share of output image is given to the applicant and all other shares are preserved in the database. The applicant need to provide his share during every transaction and those shares are over lapped with the already existing shares in the database and a check for authentication is done by using correlation technique. If a higher correlation co-efficient is achieved, then the authentication is succeeded. Also, value of MSE is lower so the Error.
Authors and Affiliations
Shweta Sisodiya
INDIAN GOVERNMENT’S KEY TARGETS AND POLICIES RELATING TO REDUCTION AND ELIMINATION OF ENERGY POVERTY
This paper is a guide for the people highlighting Indian Government’s key targets and policies relating to reduction and elimination of energy poverty in the country. It is a well-known fact that India is one among the d...
IMPROVING THE SENSE OF APPRECIATION AND BEHAVIORAL LOYALTY OF INSURANCE CLIENTS THROUGH RELATIONAL MARKETING
Background and purpose: relational marketing means maintaining customers, developing relations and making the relations even more attractive for customers. Relational marketing is the identification, creation and promoti...
ENERGY OPTIMIZATION IN WSN USING CHANNEL CODING
The Wireless Sensor networks are highly distributed networks of small, lightweight wireless nodes, deployed in large numbers to monitor the physical or environmental conditions. The major challenges of WSN arerobust, rel...
MECHANICAL ENGINEERING IN ANCIENT EGYPT, PART 59: SYMBOLS INDUSTRY (EARLY DYNASTIC TO MIDDLE KINGDOM)
The objective of this paper is to investigate the development of mechanical engineering in ancient Egypt through the design and use of symbols during the Early Dynastic to Middle Kingdom Periods. This study covers the ap...
DESIGN OF PI CONTROLLER FOR A CONICAL TANK SYSTEM
Conical tanks are widely used in the process industries because of its shape that contributes better drainage for solid mixtures, slurries and viscous liquids. The cone is a well-known system, which is having high non li...