SlideShare a Scribd company logo
1 of 4
Download to read offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 345
TRANSMISSION OF CRYPTIC TEXT USING ROTATIONAL VISUAL
CRYPTOGRAPHY
P. R. Sushma Priya1
, P. Vijaya Bharati2
1
student, 2
Asst.Prof.,Department of CSE, Vignan’s Institute of Engineering for Women, Visakhapatnam, Andhra Pradesh,
India, sushmapriya_pr3135@yahoo.co.in, pvijayabharati@gmail.com
Abstract
Today security is an important thing when we need to transmit data from one location to another safely. In this paper we are
proposing an empirical model of secure data transmission technique with a hybrid approach of Cryptography, Stegnography and
rotational analysis. In the initial phase, data is encrypted with DES algorithm with the help of Session key which is generated by the
Diffie-Hellman Key exchange Algorithm. In the second phase Cipher Data is hidden into the cover image’s LSB to form the stego
image, by considering security as the optimal security parameter. In the third phase, the Stego image is rotated with specific angle. At
the receiver end, the image is de-rotated and the cipher information from the LSB is retrieved and the cipher information is decrypted
with session key. This scheme achieves lossless recovery and is difficult to decrypt by the attackers.
Keywords: Cryptography, Stegnography, Visual Cryptography, DES, Diffie-Hellman Algorithm, Session Key
---------------------------------------------------------------------***-------------------------------------------------------------------------
1. INTRODUCTION
Cryptography is the method that allows information to be sent
in a secure form in such a way that the only receiver is able to
retrieve the information. Now-a-days, cryptography has many
commercial applications. It provides high level of privacy for
individuals and groups. However, the main purpose of the
cryptography is not only to provide confidentiality but also
provide solutions for other problems like: data integrity,
authentication, non-repudiation. Presently continuous
researches on the new cryptographic algorithms are going on.
However, it is very difficult to find out the specific algorithm
they must consider various factors like: security, the features
of algorithm, the time complexity and space complexity.
Visual Cryptography (VC) is a new technique of
cryptographic scheme, which can decrypt encrypted images
without any mathematical computations but with the help of
Human Visual System (HVS). Visual cryptography scheme
has many applications like secret sharing scheme, Copyright
protection, Halftoning process and Watermarking. There are
various schemes of Visual Cryptography. Visual
Cryptography scheme can also be used for authentication and
identification process (visual authentication and
identification)[11].
Steganography is the art and science of invisible
communication. This is accomplished through hiding
information in other information, thus hiding the existence of
the communicated information. The word steganography is
derived from the Greek words “stegos” meaning “cover” and
“grafia” meaning “writing” , defining it as “covered writing”.
In image steganography the information is hidden exclusively
in images [8].
The main feature of the encryption/decryption process
implementation is the generation of the encryption key. Our
hybrid approach achieves the optimal security during the
transmission of data over the network. Due to three levels of
security, cipher text cannot be decrypted and the time required
to break the cipher to plain is more.
Our approach follows the conversion of plain text to cipher
text, hiding the cipher information in the image pixels and
rotating the image with the required or specific angle to
prevent the unauthorized access over the network [5].
The main difference between Cryptography and stegnography
is, Cryptography is a process of converting a plain text to
cipher text where as Stegnography is a process of hiding the
data into the cover medias [3]. Image rotation enhances our
security feature by integrating with our previous stegnography
because of the noise factors we regularized our approach to
few specific angles of rotation of pixels in the image.
2. RELATED WORK
As our initial research starts with the different types of attacks,
mainly classified as Active attacks (Interruption, modification,
fabrication) and passive attacks(Interception) during the
transmission of data, Cryptography introduced to convert the
formatted text to unformatted text through the various
cryptographic algorithms[1][2].
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 346
Now-a-days hackers and attackers are also very familiar with
cryptanalysis(cracking of ciphers or unformatted texts),so
cryptography may not resolve the problem of security, later
stegnography is introduced for hiding the data into the image,
which is a simple implementation issue and human eye
undetectable changes are seen. In this process we consider
these two parameters i.e., cover image and the message are
embedded and form the stego image. Even though various
cryptography and stegnographic approaches are developed,
security is still an importantant research issue in the field of
network security [6][7].
Here we are introducing a new approach that uses image
rotational analysis along with the cryptographic and
Stegongraphic techniques.
In the traditional process of visual cryptography, data can be
added to the Cover image to convert it into stego image and
the stego image can be divided into number of shares, to
retrieve the data, we need to combine the shares, there is a
noise issue during the data retrieval. In our approach there is
no issue of noise during the stego image conversion or during
image rotation.
3. PROPOSED MODEL
We are proposing a hybrid approach with both cryptography
and rotational visual cryptography for secure data transmission
over the network. In our approach, initially the sender converts
the plain text to cipher text with Data Encryption Standard
(DES) algorithm. The reason to choose DES and Diffie-
Hellman algorithms in our paper is, DES is most certified
algorithm than the many traditional cryptographic algorithms.
Implementation of DES is not complex and it is fast in
hardware and relatively fast in software. But the DES requires
a 56-bit session key for the process of encryption and
decryption, which can be achieved by the Diffie-Hellman key
exchange protocol. After the session key generation, the
sender converts the plain text to cipher text by DES algorithm
with the key generated by the key exchange protocol (Diffie-
Hellman)[10]. It is one of the most efficient Symmetric key
approach. No individual user can create the session key,
without using the other half part of the receiver or sender.
Diffie-Hellman ephemeral key exchange provides perfect
forward secrecy. Computational complexity is low during the
key calculations and not much expensive. The cover image is
selected and is converted into binary format and the cipher text
is embedded into the LSB of the binary format of the image
which forms the stego image. The stego image is rotated by
some specific angle and is sent to receiver. The reverse
process is done at the receiver end. The receiver receives the
rotated image and the encrypted angle with the same session
key exchanged by Diffie-Hellman key exchange protocol. The
entire process is shown in architectural Fig-1.
Fig-1: Architecture
4. LSB APPROACH
LSB (Least Significant Bit) substitution is the process of
adjusting the least significant bit pixels of the carrier image. It
is a simple approach for embedding message and the image.
The Least Significant Bit insertion varies according to number
of bits in an image. For an 8 bit image, the least significant bit
i.e., the 8th bit of each byte of the image is changed with the
bit of cipher text. For a 24 bit image, the colors of each
component like RGB (red, green and blue) are changed. LSB
is effective in using BMP images since the compression in
BMP is lossless [4].
5. ROTATIONAL ANALYSIS
Rotational Analysis is a new approach where the image is
rotated with an angle instead of sending it directly. In our
approach, after hiding the data in the image, it is rotated with a
specific angle by the sender and is sent to the receiver. The
angle is transmitted in encrypted format using the session key
generated by Diffie-Hellman Key Exchange Algorithm. In the
reverse process, receiver decrypts the angle and than of
900,1800,2700, de-rotates the image with the same angle,
extracts the cipher information from the stego image (i.e., least
significant bits of the pixels of image) then converts the cipher
information to plain text with the DES algorithm followed by
the key generated with Diffie- Hellman Key Exchange.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 347
6. EXPERIMENTAL RESULT
Fig-2 shows the plain text , Fig-3 shows the cipher text, Fig-4
shows the binary text, Fig-5 shows the cover image before
embedding data into it, Fig-6 shows the stego image (i.e., after
data embedding) and Fig-7 shows the rotated image as follows
While in the reverse process, we derotate the image with the
specific angle and retrieve the cipher information from the
LSBs of the stego image to retrieve the final cover image and
plain text.
CONCLUSIONS
We are concluding our research issue with empirical approach
of data hiding through rotational visual cryptography. Our
experimental result shows an efficient performance results
than the traditional approach with hybrid mechanism of
cryptography, stegnogrpahy and rotational visual
cryptography.
FUTURE SCOPE
• We can enhance our approach by using the advanced
cryptographic algorithms like AES, but
Computational complexity is the major issue with the
advanced algorithms.
• We designed our architecture with some specific
static angles, we can enhance our system by
providing the flexibility of rotation of image with any
angle.
• We can also enhance our approach with elliptic curve
key exchange Algorithm for more secure session key
generation.
REFERENCES
[1] A. Forouzan.,: " Cryptography and Network Security ",
First Edition. McGraw-Hill, (2007), USA.
[2] R Hamamreh., M Farajallah., " Design of a Robust
Cryptosystem Algorithm for Non-Invertible Matrices Based
on Hill Cipher ". International Journal of Computer Science
and Network Security, (2009): Vol (9), pp: 12-21.
[3] J Hoffstein., et al, "An Introduction to Mathematical
Cryptography ", First Edition. Springer Science & Business
Media, (2008):, Germany.
[4] H.Kenneth, “Elementary Number Theory and Its
Applications " Third Edition. Addison-Wesley, (1992):
Germany.
[5] M.Lucas, “Thomas Jefferson wheel cipher ", Monticello
Research Department, Thomas Jefferson Foundation,
Charlottesville, (1995):, VA.
[6] Steganography and steganalysis-Robert Krenn, Internet
Publication, March 2004
[7] Steganographic Techniques and their use in an Open-
Systems Environment- Bret Dunbar, The Information Security
Reading Room, SANS Institute 2002
[8] Steganography Primer - Ruid, Computer Academic
underground,2004
[9] Image Compression and Discrete Cosine Transform - Ken
Cabeen and Peter Gent,Math 45 College of the
Redwoods,1998
[10] Practical Data Hiding in TCP/IP - Kamran Ahsan and
Deepa Kundur Multimedia and Security Workshop at ACM
Multimedia,
Juan-les-Pins, France, Friday, Dec 6th, 2002
[11] "Rotation Visual Cryptography Using Basic (2, 2)
Scheme", International Journal of Computing Science and
Communication Technologies, VOL. 3, NO. 2, Jan. 2011.
(ISSN 0974-3375) ,1B. Dinesh Reddy, 2V. Valli Kumari,
3KVSVN Raju, 4Y.H. Prassanna Raju 1Vignan Institute of
Information Technology.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 348
BIOGRAPHIES
P. R. Sushma Priya received the M.C.A
degree from JNTU, Hyderabad in 2007. She
is pursuing the M. Tech( Computer Science
Engineering ) degree from JNTU, Kakinada.
She worked as an assistant professor in
Vignan’s Institute of Engineering,
Visakhapatnam, Andhra Pradesh, India.
P. Vijaya Bharati received the M.Sc degree
in Computer Science from Gitam University
in 2004, Visakhapatnam and the M.Tech
degree in Computer Science from Vignan
University in 2009. She is pursuing her
Ph.D from Gitam University,
Visakhapatnam. Presently, she is working as an Assistant
Professor in Vignan’s Institute of Engineering for Women.
Her research interests in areas of Computer Networks, Mobile
Computing, DSP, MATLAB, Data Mining, Sensor Networks.
She attends so many Workshops and National & International
Conferences.

More Related Content

What's hot

Image encryption and decryption
Image encryption and decryptionImage encryption and decryption
Image encryption and decryptionAashish R
 
Image encryption
Image encryptionImage encryption
Image encryptionrakshit2105
 
Image Steganography Based On Hill Cipher with Key Hiding Technique
Image Steganography Based On Hill Cipher with Key Hiding TechniqueImage Steganography Based On Hill Cipher with Key Hiding Technique
Image Steganography Based On Hill Cipher with Key Hiding TechniqueIOSR Journals
 
Nesting of five modulus method with improved lsb subtitution to hide an image...
Nesting of five modulus method with improved lsb subtitution to hide an image...Nesting of five modulus method with improved lsb subtitution to hide an image...
Nesting of five modulus method with improved lsb subtitution to hide an image...eSAT Publishing House
 
DIP Using Image Encryption and XOR Operation Affine Transform
DIP Using Image Encryption and XOR Operation Affine TransformDIP Using Image Encryption and XOR Operation Affine Transform
DIP Using Image Encryption and XOR Operation Affine Transformiosrjce
 
Conditional entrench spatial domain steganography
Conditional entrench spatial domain steganographyConditional entrench spatial domain steganography
Conditional entrench spatial domain steganographysipij
 
Improved LSB Steganograhy Technique for grayscale and RGB images
Improved LSB Steganograhy Technique for grayscale and RGB imagesImproved LSB Steganograhy Technique for grayscale and RGB images
Improved LSB Steganograhy Technique for grayscale and RGB imagesIJERA Editor
 
High Capacity and Security Steganography Using Discrete Wavelet Transform
High Capacity and Security Steganography Using Discrete Wavelet TransformHigh Capacity and Security Steganography Using Discrete Wavelet Transform
High Capacity and Security Steganography Using Discrete Wavelet TransformCSCJournals
 
Steganography using visual cryptography: Report
Steganography using visual cryptography: ReportSteganography using visual cryptography: Report
Steganography using visual cryptography: ReportAparna Nk
 
An ideal steganographic scheme in networks using twisted payload
An ideal steganographic scheme in networks using twisted payloadAn ideal steganographic scheme in networks using twisted payload
An ideal steganographic scheme in networks using twisted payloadeSAT Journals
 
A New Approach of Cryptographic Technique Using Simple ECC & ECF
A New Approach of Cryptographic Technique Using Simple ECC & ECFA New Approach of Cryptographic Technique Using Simple ECC & ECF
A New Approach of Cryptographic Technique Using Simple ECC & ECFIJAEMSJORNAL
 
An ideal steganographic scheme in networks using
An ideal steganographic scheme in networks usingAn ideal steganographic scheme in networks using
An ideal steganographic scheme in networks usingeSAT Publishing House
 
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...IOSR Journals
 
IJAER Publishes
IJAER PublishesIJAER Publishes
IJAER PublishesAmAl C
 
Iaetsd design of image steganography using haar dwt
Iaetsd design of image steganography using haar dwtIaetsd design of image steganography using haar dwt
Iaetsd design of image steganography using haar dwtIaetsd Iaetsd
 
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...iosrjce
 

What's hot (19)

Image encryption and decryption
Image encryption and decryptionImage encryption and decryption
Image encryption and decryption
 
R04405103106
R04405103106R04405103106
R04405103106
 
Image encryption
Image encryptionImage encryption
Image encryption
 
Image Steganography Based On Hill Cipher with Key Hiding Technique
Image Steganography Based On Hill Cipher with Key Hiding TechniqueImage Steganography Based On Hill Cipher with Key Hiding Technique
Image Steganography Based On Hill Cipher with Key Hiding Technique
 
Image Security
Image SecurityImage Security
Image Security
 
Nesting of five modulus method with improved lsb subtitution to hide an image...
Nesting of five modulus method with improved lsb subtitution to hide an image...Nesting of five modulus method with improved lsb subtitution to hide an image...
Nesting of five modulus method with improved lsb subtitution to hide an image...
 
DIP Using Image Encryption and XOR Operation Affine Transform
DIP Using Image Encryption and XOR Operation Affine TransformDIP Using Image Encryption and XOR Operation Affine Transform
DIP Using Image Encryption and XOR Operation Affine Transform
 
Conditional entrench spatial domain steganography
Conditional entrench spatial domain steganographyConditional entrench spatial domain steganography
Conditional entrench spatial domain steganography
 
Improved LSB Steganograhy Technique for grayscale and RGB images
Improved LSB Steganograhy Technique for grayscale and RGB imagesImproved LSB Steganograhy Technique for grayscale and RGB images
Improved LSB Steganograhy Technique for grayscale and RGB images
 
High Capacity and Security Steganography Using Discrete Wavelet Transform
High Capacity and Security Steganography Using Discrete Wavelet TransformHigh Capacity and Security Steganography Using Discrete Wavelet Transform
High Capacity and Security Steganography Using Discrete Wavelet Transform
 
Steganography using visual cryptography: Report
Steganography using visual cryptography: ReportSteganography using visual cryptography: Report
Steganography using visual cryptography: Report
 
An ideal steganographic scheme in networks using twisted payload
An ideal steganographic scheme in networks using twisted payloadAn ideal steganographic scheme in networks using twisted payload
An ideal steganographic scheme in networks using twisted payload
 
A New Approach of Cryptographic Technique Using Simple ECC & ECF
A New Approach of Cryptographic Technique Using Simple ECC & ECFA New Approach of Cryptographic Technique Using Simple ECC & ECF
A New Approach of Cryptographic Technique Using Simple ECC & ECF
 
An ideal steganographic scheme in networks using
An ideal steganographic scheme in networks usingAn ideal steganographic scheme in networks using
An ideal steganographic scheme in networks using
 
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...
 
G0210032039
G0210032039G0210032039
G0210032039
 
IJAER Publishes
IJAER PublishesIJAER Publishes
IJAER Publishes
 
Iaetsd design of image steganography using haar dwt
Iaetsd design of image steganography using haar dwtIaetsd design of image steganography using haar dwt
Iaetsd design of image steganography using haar dwt
 
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
 

Viewers also liked

Raphaël Pichon: chef absolu.
Raphaël Pichon: chef absolu. Raphaël Pichon: chef absolu.
Raphaël Pichon: chef absolu. AstridRenoult
 
An improved double coding local binary pattern algorithm for face recognition
An improved double coding local binary pattern algorithm for face recognitionAn improved double coding local binary pattern algorithm for face recognition
An improved double coding local binary pattern algorithm for face recognitioneSAT Journals
 
천안오피™부평오피※다솜넷※강서오피방㏇역삼오피걸
천안오피™부평오피※다솜넷※강서오피방㏇역삼오피걸천안오피™부평오피※다솜넷※강서오피방㏇역삼오피걸
천안오피™부평오피※다솜넷※강서오피방㏇역삼오피걸dasom0505
 
Actividad financiera yenni
Actividad financiera yenniActividad financiera yenni
Actividad financiera yenniyennimar26
 
CSC_Less Self_More Together
CSC_Less Self_More TogetherCSC_Less Self_More Together
CSC_Less Self_More TogetherBenjamin Jones
 
Effect of elements on linear elastic stress analysis
Effect of elements on linear elastic stress analysisEffect of elements on linear elastic stress analysis
Effect of elements on linear elastic stress analysiseSAT Journals
 
Signs, Therapy and Counseling for Depression in Ashford
Signs, Therapy and Counseling for Depression in AshfordSigns, Therapy and Counseling for Depression in Ashford
Signs, Therapy and Counseling for Depression in AshfordSian Jones
 
Барилгын зураг
Барилгын зурагБарилгын зураг
Барилгын зурагGerlee Bayrmaa
 
Valoración del paciente crítico - CICAT-SALUD
Valoración del paciente crítico - CICAT-SALUDValoración del paciente crítico - CICAT-SALUD
Valoración del paciente crítico - CICAT-SALUDCICAT SALUD
 
ORGANIZACION SISTEMA TRIBUTARIO
ORGANIZACION SISTEMA TRIBUTARIOORGANIZACION SISTEMA TRIBUTARIO
ORGANIZACION SISTEMA TRIBUTARIOadeandreis
 

Viewers also liked (15)

HACCP CERT.
HACCP CERT.HACCP CERT.
HACCP CERT.
 
Raphaël Pichon: chef absolu.
Raphaël Pichon: chef absolu. Raphaël Pichon: chef absolu.
Raphaël Pichon: chef absolu.
 
EMNewsletter-Fall2015-9.14.2015
EMNewsletter-Fall2015-9.14.2015EMNewsletter-Fall2015-9.14.2015
EMNewsletter-Fall2015-9.14.2015
 
An improved double coding local binary pattern algorithm for face recognition
An improved double coding local binary pattern algorithm for face recognitionAn improved double coding local binary pattern algorithm for face recognition
An improved double coding local binary pattern algorithm for face recognition
 
천안오피™부평오피※다솜넷※강서오피방㏇역삼오피걸
천안오피™부평오피※다솜넷※강서오피방㏇역삼오피걸천안오피™부평오피※다솜넷※강서오피방㏇역삼오피걸
천안오피™부평오피※다솜넷※강서오피방㏇역삼오피걸
 
Actividad financiera yenni
Actividad financiera yenniActividad financiera yenni
Actividad financiera yenni
 
CSC_Less Self_More Together
CSC_Less Self_More TogetherCSC_Less Self_More Together
CSC_Less Self_More Together
 
O Livro do Juízo Final
O Livro do Juízo FinalO Livro do Juízo Final
O Livro do Juízo Final
 
Tarea 2
Tarea 2Tarea 2
Tarea 2
 
Archimista e Soprintendenza 2014
Archimista e Soprintendenza 2014Archimista e Soprintendenza 2014
Archimista e Soprintendenza 2014
 
Effect of elements on linear elastic stress analysis
Effect of elements on linear elastic stress analysisEffect of elements on linear elastic stress analysis
Effect of elements on linear elastic stress analysis
 
Signs, Therapy and Counseling for Depression in Ashford
Signs, Therapy and Counseling for Depression in AshfordSigns, Therapy and Counseling for Depression in Ashford
Signs, Therapy and Counseling for Depression in Ashford
 
Барилгын зураг
Барилгын зурагБарилгын зураг
Барилгын зураг
 
Valoración del paciente crítico - CICAT-SALUD
Valoración del paciente crítico - CICAT-SALUDValoración del paciente crítico - CICAT-SALUD
Valoración del paciente crítico - CICAT-SALUD
 
ORGANIZACION SISTEMA TRIBUTARIO
ORGANIZACION SISTEMA TRIBUTARIOORGANIZACION SISTEMA TRIBUTARIO
ORGANIZACION SISTEMA TRIBUTARIO
 

Similar to IJRET Journal Visual Cryptography Article

Review On Encrypting and Decrypting Message Via Image Slicing
Review On Encrypting and Decrypting Message Via Image SlicingReview On Encrypting and Decrypting Message Via Image Slicing
Review On Encrypting and Decrypting Message Via Image SlicingIRJET Journal
 
Public key steganography using lsb method with chaotic neural network
Public key steganography using lsb method with chaotic neural networkPublic key steganography using lsb method with chaotic neural network
Public key steganography using lsb method with chaotic neural networkIAEME Publication
 
Review paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and SteganographyReview paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and Steganographyvivatechijri
 
Unified Approach With Neural Network for Authentication, Security and Compres...
Unified Approach With Neural Network for Authentication, Security and Compres...Unified Approach With Neural Network for Authentication, Security and Compres...
Unified Approach With Neural Network for Authentication, Security and Compres...CSCJournals
 
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...IRJET Journal
 
MESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHYMESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHYIRJET Journal
 
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY IJCNCJournal
 
A Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and SteganographyA Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and SteganographyIJCNCJournal
 
Implementation of Image Steganography in Image by using FMM nested with LSB S...
Implementation of Image Steganography in Image by using FMM nested with LSB S...Implementation of Image Steganography in Image by using FMM nested with LSB S...
Implementation of Image Steganography in Image by using FMM nested with LSB S...Praneeta Dehare
 
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...IRJET Journal
 
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...CSCJournals
 
Image Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH TechniqueImage Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH TechniqueEditor IJCATR
 
An improved color image encryption algorithm with
An improved color image encryption algorithm withAn improved color image encryption algorithm with
An improved color image encryption algorithm witheSAT Publishing House
 
An improved color image encryption algorithm with pixel permutation and bit s...
An improved color image encryption algorithm with pixel permutation and bit s...An improved color image encryption algorithm with pixel permutation and bit s...
An improved color image encryption algorithm with pixel permutation and bit s...eSAT Journals
 
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...IRJET Journal
 
Image Steganography V2 i11 0143
Image Steganography V2 i11 0143Image Steganography V2 i11 0143
Image Steganography V2 i11 0143Praneeta Dehare
 
Hybrid information security system via combination of compression, cryptogra...
Hybrid information security system via combination of  compression, cryptogra...Hybrid information security system via combination of  compression, cryptogra...
Hybrid information security system via combination of compression, cryptogra...IJECEIAES
 
Implementation of image steganography using lab view
Implementation of image steganography using lab viewImplementation of image steganography using lab view
Implementation of image steganography using lab viewIJARIIT
 
Images Steganography using Pixel Value Difference and Histogram Analysis
Images Steganography using Pixel Value  Difference and Histogram AnalysisImages Steganography using Pixel Value  Difference and Histogram Analysis
Images Steganography using Pixel Value Difference and Histogram AnalysisNortheastern University
 

Similar to IJRET Journal Visual Cryptography Article (20)

Review On Encrypting and Decrypting Message Via Image Slicing
Review On Encrypting and Decrypting Message Via Image SlicingReview On Encrypting and Decrypting Message Via Image Slicing
Review On Encrypting and Decrypting Message Via Image Slicing
 
Public key steganography using lsb method with chaotic neural network
Public key steganography using lsb method with chaotic neural networkPublic key steganography using lsb method with chaotic neural network
Public key steganography using lsb method with chaotic neural network
 
Review paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and SteganographyReview paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and Steganography
 
Unified Approach With Neural Network for Authentication, Security and Compres...
Unified Approach With Neural Network for Authentication, Security and Compres...Unified Approach With Neural Network for Authentication, Security and Compres...
Unified Approach With Neural Network for Authentication, Security and Compres...
 
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
 
MESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHYMESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHY
 
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
 
A Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and SteganographyA Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and Steganography
 
Implementation of Image Steganography in Image by using FMM nested with LSB S...
Implementation of Image Steganography in Image by using FMM nested with LSB S...Implementation of Image Steganography in Image by using FMM nested with LSB S...
Implementation of Image Steganography in Image by using FMM nested with LSB S...
 
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
 
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...
 
Image Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH TechniqueImage Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH Technique
 
An improved color image encryption algorithm with
An improved color image encryption algorithm withAn improved color image encryption algorithm with
An improved color image encryption algorithm with
 
An improved color image encryption algorithm with pixel permutation and bit s...
An improved color image encryption algorithm with pixel permutation and bit s...An improved color image encryption algorithm with pixel permutation and bit s...
An improved color image encryption algorithm with pixel permutation and bit s...
 
19_2
19_219_2
19_2
 
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
 
Image Steganography V2 i11 0143
Image Steganography V2 i11 0143Image Steganography V2 i11 0143
Image Steganography V2 i11 0143
 
Hybrid information security system via combination of compression, cryptogra...
Hybrid information security system via combination of  compression, cryptogra...Hybrid information security system via combination of  compression, cryptogra...
Hybrid information security system via combination of compression, cryptogra...
 
Implementation of image steganography using lab view
Implementation of image steganography using lab viewImplementation of image steganography using lab view
Implementation of image steganography using lab view
 
Images Steganography using Pixel Value Difference and Histogram Analysis
Images Steganography using Pixel Value  Difference and Histogram AnalysisImages Steganography using Pixel Value  Difference and Histogram Analysis
Images Steganography using Pixel Value Difference and Histogram Analysis
 

More from eSAT Journals

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementseSAT Journals
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case studyeSAT Journals
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case studyeSAT Journals
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreeSAT Journals
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialseSAT Journals
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...eSAT Journals
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...eSAT Journals
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizereSAT Journals
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementeSAT Journals
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...eSAT Journals
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteeSAT Journals
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...eSAT Journals
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...eSAT Journals
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabseSAT Journals
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaeSAT Journals
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...eSAT Journals
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodeSAT Journals
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniqueseSAT Journals
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...eSAT Journals
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...eSAT Journals
 

More from eSAT Journals (20)

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavements
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case study
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case study
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangalore
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizer
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources management
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concrete
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabs
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in india
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn method
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniques
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...
 

Recently uploaded

IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 

Recently uploaded (20)

IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 

IJRET Journal Visual Cryptography Article

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 345 TRANSMISSION OF CRYPTIC TEXT USING ROTATIONAL VISUAL CRYPTOGRAPHY P. R. Sushma Priya1 , P. Vijaya Bharati2 1 student, 2 Asst.Prof.,Department of CSE, Vignan’s Institute of Engineering for Women, Visakhapatnam, Andhra Pradesh, India, sushmapriya_pr3135@yahoo.co.in, pvijayabharati@gmail.com Abstract Today security is an important thing when we need to transmit data from one location to another safely. In this paper we are proposing an empirical model of secure data transmission technique with a hybrid approach of Cryptography, Stegnography and rotational analysis. In the initial phase, data is encrypted with DES algorithm with the help of Session key which is generated by the Diffie-Hellman Key exchange Algorithm. In the second phase Cipher Data is hidden into the cover image’s LSB to form the stego image, by considering security as the optimal security parameter. In the third phase, the Stego image is rotated with specific angle. At the receiver end, the image is de-rotated and the cipher information from the LSB is retrieved and the cipher information is decrypted with session key. This scheme achieves lossless recovery and is difficult to decrypt by the attackers. Keywords: Cryptography, Stegnography, Visual Cryptography, DES, Diffie-Hellman Algorithm, Session Key ---------------------------------------------------------------------***------------------------------------------------------------------------- 1. INTRODUCTION Cryptography is the method that allows information to be sent in a secure form in such a way that the only receiver is able to retrieve the information. Now-a-days, cryptography has many commercial applications. It provides high level of privacy for individuals and groups. However, the main purpose of the cryptography is not only to provide confidentiality but also provide solutions for other problems like: data integrity, authentication, non-repudiation. Presently continuous researches on the new cryptographic algorithms are going on. However, it is very difficult to find out the specific algorithm they must consider various factors like: security, the features of algorithm, the time complexity and space complexity. Visual Cryptography (VC) is a new technique of cryptographic scheme, which can decrypt encrypted images without any mathematical computations but with the help of Human Visual System (HVS). Visual cryptography scheme has many applications like secret sharing scheme, Copyright protection, Halftoning process and Watermarking. There are various schemes of Visual Cryptography. Visual Cryptography scheme can also be used for authentication and identification process (visual authentication and identification)[11]. Steganography is the art and science of invisible communication. This is accomplished through hiding information in other information, thus hiding the existence of the communicated information. The word steganography is derived from the Greek words “stegos” meaning “cover” and “grafia” meaning “writing” , defining it as “covered writing”. In image steganography the information is hidden exclusively in images [8]. The main feature of the encryption/decryption process implementation is the generation of the encryption key. Our hybrid approach achieves the optimal security during the transmission of data over the network. Due to three levels of security, cipher text cannot be decrypted and the time required to break the cipher to plain is more. Our approach follows the conversion of plain text to cipher text, hiding the cipher information in the image pixels and rotating the image with the required or specific angle to prevent the unauthorized access over the network [5]. The main difference between Cryptography and stegnography is, Cryptography is a process of converting a plain text to cipher text where as Stegnography is a process of hiding the data into the cover medias [3]. Image rotation enhances our security feature by integrating with our previous stegnography because of the noise factors we regularized our approach to few specific angles of rotation of pixels in the image. 2. RELATED WORK As our initial research starts with the different types of attacks, mainly classified as Active attacks (Interruption, modification, fabrication) and passive attacks(Interception) during the transmission of data, Cryptography introduced to convert the formatted text to unformatted text through the various cryptographic algorithms[1][2].
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 346 Now-a-days hackers and attackers are also very familiar with cryptanalysis(cracking of ciphers or unformatted texts),so cryptography may not resolve the problem of security, later stegnography is introduced for hiding the data into the image, which is a simple implementation issue and human eye undetectable changes are seen. In this process we consider these two parameters i.e., cover image and the message are embedded and form the stego image. Even though various cryptography and stegnographic approaches are developed, security is still an importantant research issue in the field of network security [6][7]. Here we are introducing a new approach that uses image rotational analysis along with the cryptographic and Stegongraphic techniques. In the traditional process of visual cryptography, data can be added to the Cover image to convert it into stego image and the stego image can be divided into number of shares, to retrieve the data, we need to combine the shares, there is a noise issue during the data retrieval. In our approach there is no issue of noise during the stego image conversion or during image rotation. 3. PROPOSED MODEL We are proposing a hybrid approach with both cryptography and rotational visual cryptography for secure data transmission over the network. In our approach, initially the sender converts the plain text to cipher text with Data Encryption Standard (DES) algorithm. The reason to choose DES and Diffie- Hellman algorithms in our paper is, DES is most certified algorithm than the many traditional cryptographic algorithms. Implementation of DES is not complex and it is fast in hardware and relatively fast in software. But the DES requires a 56-bit session key for the process of encryption and decryption, which can be achieved by the Diffie-Hellman key exchange protocol. After the session key generation, the sender converts the plain text to cipher text by DES algorithm with the key generated by the key exchange protocol (Diffie- Hellman)[10]. It is one of the most efficient Symmetric key approach. No individual user can create the session key, without using the other half part of the receiver or sender. Diffie-Hellman ephemeral key exchange provides perfect forward secrecy. Computational complexity is low during the key calculations and not much expensive. The cover image is selected and is converted into binary format and the cipher text is embedded into the LSB of the binary format of the image which forms the stego image. The stego image is rotated by some specific angle and is sent to receiver. The reverse process is done at the receiver end. The receiver receives the rotated image and the encrypted angle with the same session key exchanged by Diffie-Hellman key exchange protocol. The entire process is shown in architectural Fig-1. Fig-1: Architecture 4. LSB APPROACH LSB (Least Significant Bit) substitution is the process of adjusting the least significant bit pixels of the carrier image. It is a simple approach for embedding message and the image. The Least Significant Bit insertion varies according to number of bits in an image. For an 8 bit image, the least significant bit i.e., the 8th bit of each byte of the image is changed with the bit of cipher text. For a 24 bit image, the colors of each component like RGB (red, green and blue) are changed. LSB is effective in using BMP images since the compression in BMP is lossless [4]. 5. ROTATIONAL ANALYSIS Rotational Analysis is a new approach where the image is rotated with an angle instead of sending it directly. In our approach, after hiding the data in the image, it is rotated with a specific angle by the sender and is sent to the receiver. The angle is transmitted in encrypted format using the session key generated by Diffie-Hellman Key Exchange Algorithm. In the reverse process, receiver decrypts the angle and than of 900,1800,2700, de-rotates the image with the same angle, extracts the cipher information from the stego image (i.e., least significant bits of the pixels of image) then converts the cipher information to plain text with the DES algorithm followed by the key generated with Diffie- Hellman Key Exchange.
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 347 6. EXPERIMENTAL RESULT Fig-2 shows the plain text , Fig-3 shows the cipher text, Fig-4 shows the binary text, Fig-5 shows the cover image before embedding data into it, Fig-6 shows the stego image (i.e., after data embedding) and Fig-7 shows the rotated image as follows While in the reverse process, we derotate the image with the specific angle and retrieve the cipher information from the LSBs of the stego image to retrieve the final cover image and plain text. CONCLUSIONS We are concluding our research issue with empirical approach of data hiding through rotational visual cryptography. Our experimental result shows an efficient performance results than the traditional approach with hybrid mechanism of cryptography, stegnogrpahy and rotational visual cryptography. FUTURE SCOPE • We can enhance our approach by using the advanced cryptographic algorithms like AES, but Computational complexity is the major issue with the advanced algorithms. • We designed our architecture with some specific static angles, we can enhance our system by providing the flexibility of rotation of image with any angle. • We can also enhance our approach with elliptic curve key exchange Algorithm for more secure session key generation. REFERENCES [1] A. Forouzan.,: " Cryptography and Network Security ", First Edition. McGraw-Hill, (2007), USA. [2] R Hamamreh., M Farajallah., " Design of a Robust Cryptosystem Algorithm for Non-Invertible Matrices Based on Hill Cipher ". International Journal of Computer Science and Network Security, (2009): Vol (9), pp: 12-21. [3] J Hoffstein., et al, "An Introduction to Mathematical Cryptography ", First Edition. Springer Science & Business Media, (2008):, Germany. [4] H.Kenneth, “Elementary Number Theory and Its Applications " Third Edition. Addison-Wesley, (1992): Germany. [5] M.Lucas, “Thomas Jefferson wheel cipher ", Monticello Research Department, Thomas Jefferson Foundation, Charlottesville, (1995):, VA. [6] Steganography and steganalysis-Robert Krenn, Internet Publication, March 2004 [7] Steganographic Techniques and their use in an Open- Systems Environment- Bret Dunbar, The Information Security Reading Room, SANS Institute 2002 [8] Steganography Primer - Ruid, Computer Academic underground,2004 [9] Image Compression and Discrete Cosine Transform - Ken Cabeen and Peter Gent,Math 45 College of the Redwoods,1998 [10] Practical Data Hiding in TCP/IP - Kamran Ahsan and Deepa Kundur Multimedia and Security Workshop at ACM Multimedia, Juan-les-Pins, France, Friday, Dec 6th, 2002 [11] "Rotation Visual Cryptography Using Basic (2, 2) Scheme", International Journal of Computing Science and Communication Technologies, VOL. 3, NO. 2, Jan. 2011. (ISSN 0974-3375) ,1B. Dinesh Reddy, 2V. Valli Kumari, 3KVSVN Raju, 4Y.H. Prassanna Raju 1Vignan Institute of Information Technology.
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 10 | Oct-2013, Available @ http://www.ijret.org 348 BIOGRAPHIES P. R. Sushma Priya received the M.C.A degree from JNTU, Hyderabad in 2007. She is pursuing the M. Tech( Computer Science Engineering ) degree from JNTU, Kakinada. She worked as an assistant professor in Vignan’s Institute of Engineering, Visakhapatnam, Andhra Pradesh, India. P. Vijaya Bharati received the M.Sc degree in Computer Science from Gitam University in 2004, Visakhapatnam and the M.Tech degree in Computer Science from Vignan University in 2009. She is pursuing her Ph.D from Gitam University, Visakhapatnam. Presently, she is working as an Assistant Professor in Vignan’s Institute of Engineering for Women. Her research interests in areas of Computer Networks, Mobile Computing, DSP, MATLAB, Data Mining, Sensor Networks. She attends so many Workshops and National & International Conferences.