Secure Text/Image Data Hiding in Images with Efficient Key Management
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 4 Issue 5, May 2015

Secure Text/Image Data Hiding in Images with Efficient Key Management

Anjaly Mohanachandran, Mary Linda P.A.

The security plays an important role in transmission of confidential data over internet. So, as a part of improving security in data transmission, we will hide the data inside an encrypted image. Thereby, confidentiality of the image as well as the embedded data is maintained. The embedded data can be extracted without any error, and also the cover image restoration is also free from error. So, here we are implementing a system in which text data can be embedded inside an encrypted image for security and also cover image can be send separately to the destination by hiding it inside another image. It maintains the excellent property that the original image can be losslessly recovered after embedded data is extracted. The major application of this method is medical imagery, military where both data and cover image is confidential. The most improved technique of data hiding is that we can make use of separate keys in case of encryption and data hiding in sender side and receiver side. Thus the concept of efficient key management improves the security.

Keywords: Data Hiding, Image encryption, image Decryption, Data Embedding, Data Extraction, LSB method

Edition: Volume 4 Issue 5, May 2015

Pages: 2325 - 2330

Share this Article

How to Cite this Article?

Anjaly Mohanachandran, Mary Linda P.A., "Secure Text/Image Data Hiding in Images with Efficient Key Management", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB154717, Volume 4 Issue 5, May 2015, 2325 - 2330

50 PDF Views | 42 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Data Hiding'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1642 - 1643

A Survey Paper on Various Encryption & Data Hiding Methods for Video Streams

Shrutika S. Giradkar, Antara Bhattacharya

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1579 - 1582

Data Hiding in H.264/AVC Video Encryption with XOR-ed User Information and Data in File Format

Neenu Shereef

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3075 - 3078

Secret Data Hiding in Compressed Video Bit Streams for Privacy Information Protection

B. Vengadalakshmi, S. Abiramasundari

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 647 - 651

Frequency Domain Based Robust Digital Image Watermarking Resilient to Desynchronization Attacks

Mahesh R. Shimpi, S. V. Gumaste

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2352 - 2357

RS and OFDM Methods Over Encrypted and Data Embedded Video Streams

Jithya J. Prakash, Hemand E. P.

Share this Article

Similar Articles with Keyword 'Image encryption'

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 1330 - 1335

Efficient Image Encryption EIE - Compression System Using Haar Wavelets Using Matlab

Kavita, Anil Vadhwa

Share this Article

Research Paper, Computer Science & Engineering, Indonesia, Volume 5 Issue 10, October 2016

Pages: 1363 - 1365

Arnold?s Cat Map Algorithm in Digital Image Encryption

Eko Hariyanto; Robbi Rahim

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1939 - 1942

An Uncompressed AVI Encryption Based on Haar Wavelet Decomposition of Frames and Audio

Minal C. Toley, Mayur S.Burange

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2480 - 2483

PSO (Particle Swarm Optimization) Based Reversible Data Hiding

Kritika Jaidka, Amandeep Mavi

Share this Article

Informative Article, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 1551 - 1554

Implementation of Encryption and Decryption Technique

Dayanand G Savakar, Anand S Ghuli

Share this Article

Similar Articles with Keyword 'image Decryption'

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2425 - 2428

Survey of Various Techniques on Cheating Prevention in Visual Cryptography with Steganography Scheme

Sneha A.Deshmukh, P.B.Sambhare

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2325 - 2330

Secure Text/Image Data Hiding in Images with Efficient Key Management

Anjaly Mohanachandran, Mary Linda P.A.

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 389 - 392

A Survey on Data Hiding in Encrypted Images

Diptee D. Lad, Sindhu M. R.

Share this Article

Similar Articles with Keyword 'Data Embedding'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1579 - 1582

Data Hiding in H.264/AVC Video Encryption with XOR-ed User Information and Data in File Format

Neenu Shereef

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3075 - 3078

Secret Data Hiding in Compressed Video Bit Streams for Privacy Information Protection

B. Vengadalakshmi, S. Abiramasundari

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2541 - 2544

Reversible Data Embedding using F5 Algorithm

Sanjivani Koli, N. B. Pokale

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2325 - 2330

Secure Text/Image Data Hiding in Images with Efficient Key Management

Anjaly Mohanachandran, Mary Linda P.A.

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 7, July 2013

Pages: 190 - 193

Data Embedding Method Using Video Pixel Pair Technique

Saleena Thongam, Manjima R.L

Share this Article

Similar Articles with Keyword 'Data Extraction'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1579 - 1582

Data Hiding in H.264/AVC Video Encryption with XOR-ed User Information and Data in File Format

Neenu Shereef

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3075 - 3078

Secret Data Hiding in Compressed Video Bit Streams for Privacy Information Protection

B. Vengadalakshmi, S. Abiramasundari

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1191 - 1194

Web Data Extraction by Using Trinity

Sayali Khodade, Nilav Mukharjee

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1493 - 1496

Feature Clustering and Annotating Search Results from Web Databases

Lekshmi S.S., Suryapriya S.

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 1434 - 1436

Method for Repossession of Content Based Video using Speech and Text Information

Manasi A. Kabade, U.A. Jogalekar

Share this Article

Similar Articles with Keyword 'LSB method'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2325 - 2330

Secure Text/Image Data Hiding in Images with Efficient Key Management

Anjaly Mohanachandran, Mary Linda P.A.

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 12, December 2013

Pages: 423 - 426

An Efficient Higher LSB Method for Hiding Encrypted Data into Guard Pixels Region of a Multicarrier Image Objects

Komal B.Bijwe, G. R. Bamnote

Share this Article
Top