Symmetric Key Cryptography on Images in AES Algorithm and Hiding Data Losslessly

نویسنده

  • T. Arumuga Maria Devi
چکیده

Reversible (lossless) data embedding (hiding) has drawn lots of interest recently. Being reversible, the original cover content can be completely restored. This paper proposes a novel reversible data hiding scheme with a lower computational complexity and can be used in applications where both the image and the hidden information is highly confidential. It consists of three phases –AES image encryption, data embedding and data extraction/image-recovery phases. Here, the encrypted image is made highly secured by using an AES (Advanced Encryption standard) stream cipher. Although a datahider does not know the original image content, he can embed additional data into the encrypted image using the data hiding key. A receiver may firstly decrypt the encrypted image using the encryption key. This decrypted image is similar to the original image. With the datahiding key, the embedded data can be correctly extracted while the original image can be perfectly recovered.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Reversible Data Hiding in Encrypted 3D Mesh Models

Reversible data hiding in encrypted domain (RDHED) has greatly attracted researchers as the original content can be losslessly reconstructed after the embedded data are extracted, while the content owner’s privacy remains protected. Most of the existing RDH-ED algorithms are designed for grayscale/color images, which cannot be directly applied to other carriers, such as three-dimensional (3D) m...

متن کامل

A Survey on Reversible Data Hiding in Encrypted Image

Recently more attention is paid to reversible data hiding (RDH) in encrypted images, since it maintains the excellent property that the original image cover can be losslessly recovered after data embedded is extracted while protecting the image content’s as confidential. In this survey paper different reversible data hiding methods are analyzed. All previous methods embed data by reversibly vac...

متن کامل

Proposed Approach to Enhanced Multimedia Information Security

The concept of image security and the word cryptography might be intimidating and complicated. The objective of the research is to design an idea that helps the user and the operations to achieve images security. Nowadays, information or image security is becoming more important in data storage and transmission. Images are widely used in several processes. Therefore, the protection of image dat...

متن کامل

PERFORMANCE ANALYSIS OF SYMMETRIC KEY CRYPTOGRAPHY ALGORITHMS: DES, AES and BLOWFISH

Security is the most challenging aspects in the internet and network applications. Cryptography is the one of the main categories of computer security that converts information from its normal form into an unreadable form. The two main characteristics that identify and differentiate one encryption algorithm from another are its ability to secure the protected data against attacks and its speed ...

متن کامل

Optimizing image steganography by combining the GA and ICA

In this study, a novel approach which uses combination of steganography and cryptography for hiding information into digital images as host media is proposed. In the process, secret data is first encrypted using the mono-alphabetic substitution cipher method and then the encrypted secret data is embedded inside an image using an algorithm which combines the random patterns based on Space Fillin...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012