International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 129

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 3 Issue 6, June 2014


Security of Information Using Cryptography and Image Processing

Mrunalinee Patole [4] | Sheela A Bankar


Abstract: In this paper we propose a same technique of sending confidential information using encryption and data hiding concept with different encryption algorithms; that is for image encryption we use AES algorithm and for data encryption we use Twelve Square cipher substitution algorithm; and try to improve the security mechanism. With plain text data we also consider the confidential audio and video data for embedding purpose. This work also proposes a scheme for separable reversible data hiding in encrypted image which is remove the drawback of non separable reversible data hiding in encrypted image.


Keywords: Image encryption, Decryption, twelve square cipher, reversible data hiding, non-separable reversible data hiding


Edition: Volume 3 Issue 6, June 2014,


Pages: 449 - 455


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Mrunalinee Patole, Sheela A Bankar, "Security of Information Using Cryptography and Image Processing", International Journal of Science and Research (IJSR), Volume 3 Issue 6, June 2014, pp. 449-455, https://www.ijsr.net/get_abstract.php?paper_id=2014143

Similar Articles with Keyword 'Image encryption'

Downloads: 0

Research Paper, Computer Science & Engineering, India, Volume 11 Issue 6, June 2022

Pages: 654 - 659

Image Encryption using (k, n) Secret Sharing Scheme using Lagrange Polynomial

GVSS Jayanth Anish

Share this Article

Downloads: 105

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 1062 - 1064

Enriching Process of Image Encryption and Compression Using Hierarchical Decomposition

Devashri Anil Vyawahare [2] | Prof. Anil Gujar

Share this Article
Top