Abstract
This paper proposes a system for encrypting images which is performed by patch wise separable reversible data. In the beginning, with the help of encryption key, a content writer prepares the unique uncompressed image. Then, the data-hider abridge encrypted images with least significant using data smacking key therefore to construct a sparse path that can incorporate with some additional data. The encrypted image data consisting of additional data, will aid the receiver to use only one encryption key to recall both additional data and image after decryption. The proposed system enables the receiver, to bring out the data and retrieving the actual content without an error by using both data-hiding key and encryption keys. The key generated is stored and the log is maintained. Data transmission through public communication system is unsecure due to be inaccuracy and improper exploitation by eavesdropper. The specific problem can be resolved by the technique Steganography, where the hidden messages are written in a way where it is only understood by the sender and intend recipient which gives the complete security for the messages. This proposed method includes Advanced Encryption Standard algorithm for encrypting both the image and the data. In order to achieve efficient working of encryption process, Separable Patch wise Reversible Data Hiding (SPRDH) algorithm is used in rescindable manner. The performance are analyzed using available Classical database images with the metrics Bits per Pixel (BPP). Peak Signal Noise Ratio (PSNR) and Mean Square Error (MSE).
Highlights
One of major tool that is employed for encryption is the cryptography
The algorithm of Cryptography can be comprehensively classified into symmetric and asymmetric, which are considered as two prominent categories of key algorithms [2]
Asymmetric algorithm, commonly known as the Public key algorithm, two separate keys - Private and Revised Manuscript Received on February 05, 2020
Summary
One of major tool that is employed for encryption is the cryptography. It acts as a security tool by which the data can encrypted and converted into plain meaningful information from the untidy unknown information / data [1]. Asymmetric algorithm, commonly known as the Public key algorithm, two separate keys - Private and Revised Manuscript Received on February 05, 2020 Gayathri.A, Associate Professor, Department of Computer Science and Engineering, Saveetha School of Engineering, SIMATS, Chennai, India Thanga Revathi.S , 2Assistant Professor, Department of Information. Two different keys are created for every user in the asymmetric method known as the private key and public key These keys will be used for encryption and decryption process so these keys have to be kept secret from the intruders. The safeguard envisaged by steganography technique is much better and reliable than what is provided by cryptography. Present days these concepts are widely used due to some common reasons. The prime objective of cryptography helps in transforming the data of unintelligible image from the source of third party who is prohibited in accessing the information, wherein the technology of steganography helps in hacking the data from unauthorized individuals with the process of image overlapping the data
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: International Journal of Engineering and Advanced Technology
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.