Abstract

Steganography and cryptographic methods are used together with wavelets to increase the security of the data while transmitting through networks. Another technology, the digital watermarking is the process of embedding information into a digital (image) signal. Before embedding the plain text into the image, the plain text is encrypted by using Data Encryption Standard (DES) algorithm. The encrypted text is embedded into the LL subband of the wavelet decomposed image using Least Significant Bit (LSB) method. Then the inverse wavelet transform is applied and the resultant image is transmitted to the receiver. The receiver will perform the same operations in reverse order.

Highlights

  • Provide examples of relevant research types, methods, and approaches for this field: E.g., Historical Inquiry; QuasiExperimental; Literary Analysis; Survey/Interview

  • The given text which is to be transmitted is encrypted with one of the symmetric key techniques: Data Encryption Standard (DES) with the given key. In this process by using the key, the given text is encrypted. This resultant text is decrypted with the same key. (Here, the key is of length 56-bit.) that cipher text is embedded into the LL subband of the wavelet transformed image

  • Once the cipher text is embedded into the LL subband, inverse wavelet transform is applied

Read more

Summary

Introduction

Provide examples of relevant research types, methods, and approaches for this field: E.g., Historical Inquiry; QuasiExperimental; Literary Analysis; Survey/Interview. Cryptography and Steganography are well known and widely used techniques that manipulate information (messages) in order to cipher or hide their existence. The art of protecting information (plain text) by transforming it (encrypting it) into an unreadable format is called cipher text Those who possess a secret key can decipher (or decrypt) the message into plain text. Cryptography encrypts the actual message that is being sent This security mechanism uses mathematical schemes and algorithms to scramble data into unreadable text. It can only be decoded or decrypted by the party that possesses the associated key [1]. (Here, the key is of length 56-bit.) that cipher text is embedded into the LL subband of the wavelet transformed image.

Methods
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.