An Information Security Technique Using Steganography

Authors

  • Prof. A. N. Gedam Department of Computer Engineering, AISSMS’s Polytechnic, Pune
  • Pooja Nehul Department of Computer Engineering, AISSMS’s Polytechnic, Pune
  • Sushant Shinde Department of Computer Engineering, AISSMS’s Polytechnic, Pune
  • Irshad Shaikh Department of Computer Engineering, AISSMS’s Polytechnic, Pune

Keywords:

Image encryption, Lossless data hiding, Reversible data hiding, Public key encryption.

Abstract

This technology proposes a lossless, a reversible, and a combined knowledge activity schemes for cipher text
pictures encrypted by public key cryptosystems with probabilistic and holomorphic properties. Within the lossless theme,
the cipher text pixels are replaced with new values to introduce the extra knowledge into many LSB-planes of cipher text
pixels by multiple layer wet paper writing. Then, the embedded knowledge are often directly extracted from the encrypted
domain and therefore the knowledge embedding operation doesn't have an effect on the secret writing of original
plaintext image. Within the reversible theme, a preprocessing is used to shrink the image bar chart before image coding,
so the modification on encrypted pictures for knowledge embedding won't cause any component oversaturation in
plaintext domain. Though a small distortion is introduced, the embedded knowledge is often extracted and therefore the
original image are often recovered from the directly decrypted image. As a result of the compatibility between the
lossless and reversible schemes, the info embedding operations within the 2 manners are often at the same time
performed in associate degree encrypted image. With the combined technique, a receiver could extract a neighborhood
of embedded knowledge before secret writing, and extract another part of embedded knowledge and recover the first
plaintext image when secret writing.

Published

2017-03-25

How to Cite

Prof. A. N. Gedam, Pooja Nehul, Sushant Shinde, & Irshad Shaikh. (2017). An Information Security Technique Using Steganography. International Journal of Advance Engineering and Research Development (IJAERD), 4(3), 649–655. Retrieved from https://ijaerd.com/index.php/IJAERD/article/view/2143