Bit (RGB) With Cryptography
نویسندگان
چکیده
In recent years it have been witnessed, the rapid development of the internet and telecommunication techniques. But with this development, the security of information is becoming very difficult. To tackle information security problem steganography and cryptography techniques are used. Where cryptography is to scramble the contents of secret message and in steganography the secret message is embedded into the cover medium. In this paper a new technique is discussed by combining both security techniques cryptography and steganography. Firstly information is encrypted by using multiple column transposition cryptography and then this message is hide behind any cover image on LSB 7 bit pixel. This method makes extraction of original message difficult. If hacker will come to know about message hidden in image then will not be able to know original message as it has to be encrypted through cryptography techniques.
منابع مشابه
A Dynamic RGB Intensity Based Steganography Scheme
Steganography meaning covered writing. Steganography includes the concealment of information within computer files [1]. In other words, it is the Secret communication by hiding the existence of message. In this paper, we will refer to cover image, to indicate the images that do not yet contain a secret message, while we will refer to stego images, to indicate an image with an embedded secret me...
متن کاملA Karnaugh Map Based { 2 , 2 } Visual Cryptography Scheme For Color Images
A novel {2,2} visual cryptography scheme for processing color images based on a Karnaugh map design is introduced in this paper. The encryption and decryption functions are executed at the bit levels of the RGB color representation. The proposed scheme affords no pixel expansion and offers perfect reconstruction. Experimental results including in this paper support the main argument that the de...
متن کاملVisual Cryptography in Gray Scale Images
Visual Cryptography is a new Cryptography technique which is used to secure the images. In Visual Cryptography the Image is divided into parts called shares and then they are distributed to the participants. The Decryption side just stacking the share images gets the image. The initial model developed only for the bi-level or binary images or monochrome images. Later it was advanced to suit for...
متن کاملSecret Information Steganography Using LSB Insertion Methodwithout Bit Layout Section with Increasing Substitution Rate and High Reliability
In this paper, a faster method for embedding cryptographic information in the image ispresented by expressing the concept of latent prints (Steganography). Data is encrypted bytwo methods before embedding to increase reliability. Then they are embedded into the imageby a button, a method has been expressed to reduce potential noise impact on the wayinformation is encoded.
متن کاملEfficient implementation of low time complexity and pipelined bit-parallel polynomial basis multiplier over binary finite fields
This paper presents two efficient implementations of fast and pipelined bit-parallel polynomial basis multipliers over GF (2m) by irreducible pentanomials and trinomials. The architecture of the first multiplier is based on a parallel and independent computation of powers of the polynomial variable. In the second structure only even powers of the polynomial variable are used. The par...
متن کامل