A Relevant Technique of Hiding Information in an image using Shared Cryptography

نویسندگان

  • Boina Avinash Kumar
  • Madhusmita Das
  • Madhusmita Sahu
چکیده

Steganography is the art and science of hidden writing. The purpose of steganography is covert communication to hide the existence of a message from an intermediate attacker .This paper will discuss about pure steganographic technique, which does not require prior exchange of data like shared-keys. The proposed technique use a secure mask generation technique and the masking of original data repeatedly generate shares. These shares of secret data are embedded using an irreversible stegonographic technique in cover image called stego image, which is sent to receiver node. General Terms Stegonography, Cryptography, Network Security

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Improving security of double random phase encoding with chaos theory using fractal images

This study presents a new method based on the combination of cryptography and information hiding methods. Firstly, the image is encoded by the Double Random Phase Encoding (DRPE) technique. The real and imaginary parts of the encoded image are subsequently embedded into an enlarged normalized host image. DRPE demands two random phase mask keys to decode the decrypted image at the destination. T...

متن کامل

Optimizing image steganography by combining the GA and ICA

In this study, a novel approach which uses combination of steganography and cryptography for hiding information into digital images as host media is proposed. In the process, secret data is first encrypted using the mono-alphabetic substitution cipher method and then the encrypted secret data is embedded inside an image using an algorithm which combines the random patterns based on Space Fillin...

متن کامل

EPR Hidden Medical Image Secret Sharing using DNA Cryptography

Security of medical images is an important issue, since applications such as Tele diagnosis exchange information over insecure communication channels. In this paper, Shamir secret sharing algorithm combined with DNA cryptography is proposed. The method involves the dispersion of medical image and Electronic Patient Record (EPR) into shadow images, aiming at better security characteristics. The ...

متن کامل

Halftone Visual Cryptography & Watermarking

R.Charanya, T. Vijayan Abstract: In this Paper, a method of Information hiding & Piracy protection in Image processing is discussed. Visual cryptography & Digital watermarking helps in enables Information hiding, copyright & piracy protection. Here, a technique involving halftone visual cryptography along with watermarking is proposed to achieve visual cryptography via half toning. Digital wate...

متن کامل

Visual Cryptography Techniques-A survey & Comparison

Image Processing is a technique of processing the images such that the visibility of images is clear to user. Some times in image processing security is an important concern and also used for the hiding of information in images. Visual cryptography is a special technique of encryption for the information hiding in images such that the image is visible only applying correct key to the image for ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013