A Practical Approach for Secured Data Transmission using Wavelet based Steganography and Cryptography

نویسندگان

  • Indrasena Reddy
  • V. Uday Kumar
  • K. Subba Reddy
  • William Stallings
  • W. H. Tsai
  • Rafael C. Gonzalez
  • Richard E. Woods
چکیده

Steganography and cryptography methods are used together with wavelets to increase the security of the data while transmitting through networks. In the discrete wavelet transform, an image signal can be analyzed by passing it through an analysis filter bank. This analysis filter bank consists of a low pass and a high pass filter at each decomposition stage. Another technology, the digital watermarking is the process of embedding information into a digital (image) signal which may be used to verify its authenticity or the identity of its owners. The watermark to be embedded is 'text'. Before embedding the plain text into the image, the plain text is encrypted by using Data Encryption Standard (DES) algorithm. The plain text can be any sentence in English, and the key can be anything in English with a length of 8-characters. The encrypted text is embedded into the LL subband of the wavelet decomposed image using Least Significant Bit (LSB) method. Then the inverse wavelet transform is applied and the resultant image is transmitted to the receiver. At the receiver's end, the image is transformed using wavelet, from the LL subband the encrypted text is extracted by using the LSB method and the result is decrypted using DES.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Hybrid Model for Secure Data Transfer in Audio Signals using HCNN and DD DWT

In today’s world, there are a number of cryptographic and steganography techniques used in order to have secured data transfer between a sender and a receiver. In this paper a new hybrid approach that integrates the merits of cryptography and audio steganography is presented. First, the original message is encrypted using chaotic neural network and the resultant cipher text is embedded into a c...

متن کامل

A New Approach for Secure Data Transfer based on Wavelet Transform

In today’s world, there are a number of cryptographic and steganographic techniques used in order to have secured data transfer between a sender and a receiver. In this paper we present a new hybrid approach that integrates the merits of cryptography and Image steganography based on multi resolution wavelet domain. First, the original message is encrypted using modified blowfish algorithm and t...

متن کامل

Image Steganography Technique Using Sudoku Puzzle and Ecc Algorithm for Secured Data Transmission

Nowadays, Data transmission is becoming very important among humans. So there are many modes of data transmission introduced. Some of the modes of data transmission are through copper wires, wireless channels, computer buses, etc. Though there are certain modes of transmission, secured data transmission is an important thing what everyone needs, because everyone wants their data to transmit sec...

متن کامل

A Discrete Wavelet Transform Approach for Enhanced Security in Image Steganography

The magnitude of the growth in the Internet combined with the increase in technological innovations pose serious threats to the process of digital data transmission. The government, military, small and large businesses and corporations, and individuals transmit private or confidential information over public and private networks every day creating a need for preserving the confidentiality of th...

متن کامل

The Idea Of Using The Steganography As Encryption Tool

the increasing use of computers and the widespread use of networks, Social networking and use applications through the use of the Internet to make the spread images, which make it easy to be penetrated from the attacker and from everyone who try to change the information. So, the need arises to transmit the information securely through a secure manner . Steganography is the best solution to sol...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013