HIDING DATA IN ENCRYPTED IMAGE WITH LSB SUBSTITUTION
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Downloads: 119 | Monthly Hits: ⮙8

Informative Article | Computer Science & Engineering | India | Volume 2 Issue 6, June 2013

HIDING DATA IN ENCRYPTED IMAGE WITH LSB SUBSTITUTION

M.C.Padma, Yashaswini.J

Using data hiding technique one can send the information to the accurate user without noticing to third person. Data can be hidden using different cover Medias, like video, audio, images or text. As an Internet based communications of images have increased, encryption of images has become very important way to protect images especially on the Internet. This work proposes a new scheme for hiding data in encrypted image with LSB substitution. It consists of image encryption, data embedding and data-extraction/image-recovery phases. A content owner encrypts the original image using an encryption key. A data-hider changes the least significant bits of the encrypted image using a data-hiding key to create a sparse space to accommodate some additional data. At the receiver side, the data that is embedded in the created space can be easily retrieved from the encrypted image using the data-hiding key. Since the data embedding only affects the LSB, a decryption with the encryption key can result in an image similar to the original version. When using both of the encryption and data-hiding keys, the embedded additional data can be successfully extracted and the original image can be perfectly recovered.

Keywords: Data hiding, data extraction, image encryption, reversible data hiding

Edition: Volume 2 Issue 6, June 2013

Pages: 125 - 128

Share this Article

How to Cite this Article?

M.C.Padma, Yashaswini.J, "HIDING DATA IN ENCRYPTED IMAGE WITH LSB SUBSTITUTION", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=IJSRON20131100, Volume 2 Issue 6, June 2013, 125 - 128

Enter Your Registered Email Address





Similar Articles with Keyword 'Data hiding'

Downloads: 101 | Monthly Hits: ⮙12

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1579 - 1582

Data Hiding in H.264/AVC Video Encryption with XOR-ed User Information and Data in File Format

Neenu Shereef

Share this Article

Downloads: 102 | Weekly Hits: ⮙5 | Monthly Hits: ⮙10

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1175 - 1178

Steganographic Method of Data Hiding using JPEG Images

Shabana Vathelil Subair, Fathima A Muhammadali

Share this Article

Downloads: 103 | Weekly Hits: ⮙1

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1642 - 1643

A Survey Paper on Various Encryption & Data Hiding Methods for Video Streams

Shrutika S. Giradkar, Antara Bhattacharya

Share this Article

Downloads: 103 | Weekly Hits: ⮙1 | Monthly Hits: ⮙10

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1130 - 1132

Survey On: Reversible Data Hiding in Encrypted JPEG Images

N. B. Pokale, Sanjivani S. Koli

Share this Article

Downloads: 104 | Weekly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1319 - 1323

Advanced Technique for Comprehensive Data Security

Pramendra Kumar, Vijay Kumar Sharma

Share this Article

Similar Articles with Keyword 'data extraction'

Downloads: 96 | Weekly Hits: ⮙2 | Monthly Hits: ⮙9

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1191 - 1194

Web Data Extraction by Using Trinity

Sayali Khodade, Nilav Mukharjee

Share this Article

Downloads: 101 | Monthly Hits: ⮙12

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1579 - 1582

Data Hiding in H.264/AVC Video Encryption with XOR-ed User Information and Data in File Format

Neenu Shereef

Share this Article

Downloads: 106 | Weekly Hits: ⮙1

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 1434 - 1436

Method for Repossession of Content Based Video using Speech and Text Information

Manasi A. Kabade, U.A. Jogalekar

Share this Article

Downloads: 107 | Weekly Hits: ⮙4 | Monthly Hits: ⮙13

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1152 - 1154

A Survey on Content based Video Retrieval Using Speech and Text information

Laxmikant S. Kate, M. M. Waghmare

Share this Article

Downloads: 109 | Weekly Hits: ⮙1 | Monthly Hits: ⮙12

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2425 - 2428

Survey of Various Techniques on Cheating Prevention in Visual Cryptography with Steganography Scheme

Sneha A.Deshmukh, P.B.Sambhare

Share this Article

Similar Articles with Keyword 'image encryption'

Downloads: 104 | Weekly Hits: ⮙4 | Monthly Hits: ⮙14

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 1062 - 1064

Enriching Process of Image Encryption and Compression Using Hierarchical Decomposition

Devashri Anil Vyawahare, Prof. Anil Gujar

Share this Article

Downloads: 106 | Weekly Hits: ⮙3 | Monthly Hits: ⮙8

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2033 - 2036

A Survey Work on ETC System for an Efficient Image Encryption and Compression

Gauri Chavan, Prashant Kumbharkar

Share this Article

Downloads: 106 | Monthly Hits: ⮙13

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 1330 - 1335

Efficient Image Encryption EIE - Compression System Using Haar Wavelets Using Matlab

Kavita, Anil Vadhwa

Share this Article

Downloads: 107 | Weekly Hits: ⮙5

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1830 - 1833

A Survey on Efficient ETC (Encryption-Then-Compression) Techniques for Image Data Security

Ganesh Lamkhade, Ajay Kumar Gupta

Share this Article

Downloads: 108 | Monthly Hits: ⮙6

Informative Article, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 1548 - 1550

Joint Task Migration and Power Management in Wireless Computing

Dayanand G Savakar, Anand S Ghuli

Share this Article

Similar Articles with Keyword 'reversible data hiding'

Downloads: 103 | Weekly Hits: ⮙1 | Monthly Hits: ⮙10

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1130 - 1132

Survey On: Reversible Data Hiding in Encrypted JPEG Images

N. B. Pokale, Sanjivani S. Koli

Share this Article

Downloads: 109

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3099 - 3106

Separable Reversible Data Hiding In Encrypted Image Using Modified Least Significant Bit and Virtual Embedding

Shreya M. S., Sandeep Kumar S

Share this Article

Downloads: 111 | Weekly Hits: ⮙4 | Monthly Hits: ⮙11

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1251 - 1253

Survey of Reversible Data Hiding using Chaos and Genetic Algorithm in Encrypted JPEG Bitstream

Vaibhav Sonyabapu Barve, S. S. Bere

Share this Article

Downloads: 112 | Weekly Hits: ⮙2

Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 7, July 2017

Pages: 2156 - 2159

Review on Reversible Data Hiding With Distributed Source Encoding Using Identity Hiding Mechanism for Image and Data Owner

Sanjyot A. Biranje, Dr. D S. Bhosle

Share this Article

Downloads: 113 | Weekly Hits: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 762 - 767

Reversible Data Hiding in Encrypted Images

Chaple Gopal, G Balram

Share this Article



Top