Submit Search
Upload
Encrypting and Decrypting Message via Image Slicing
•
0 likes
•
3 views
IRJET Journal
Follow
https://www.irjet.net/archives/V9/i2/IRJET-V9I2115.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 6
Download now
Download to read offline
Recommended
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE
IRJET Journal
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET Journal
MESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHY
IRJET Journal
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
IRJET Journal
Review On Encrypting and Decrypting Message Via Image Slicing
Review On Encrypting and Decrypting Message Via Image Slicing
IRJET Journal
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
IRJET Journal
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Dr. Amarjeet Singh
IRJET- Mosaic Image Creation in Video for Secure Transmission
IRJET- Mosaic Image Creation in Video for Secure Transmission
IRJET Journal
Recommended
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE
ACTIVITY SPOTTER DURING MEDICAL TREATMENT USING VISUAL CRYPTOGRAPHY TECHNIQUE
IRJET Journal
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET Journal
MESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHY
IRJET Journal
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
IRJET Journal
Review On Encrypting and Decrypting Message Via Image Slicing
Review On Encrypting and Decrypting Message Via Image Slicing
IRJET Journal
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
IRJET Journal
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Dr. Amarjeet Singh
IRJET- Mosaic Image Creation in Video for Secure Transmission
IRJET- Mosaic Image Creation in Video for Secure Transmission
IRJET Journal
IRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share Images
IRJET Journal
Encryption of Decomposed Image by using ASCII Code based Carrier Signal
Encryption of Decomposed Image by using ASCII Code based Carrier Signal
IRJET Journal
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
IJERD Editor
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
IRJET Journal
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
IRJET Journal
Protection of Secret Textual Data Using Steganography Based System
Protection of Secret Textual Data Using Steganography Based System
IRJET Journal
IRJET- A Probabilistic Model of Visual Cryptography Scheme for Anti-Phis...
IRJET- A Probabilistic Model of Visual Cryptography Scheme for Anti-Phis...
IRJET Journal
R04405103106
R04405103106
IJERA Editor
An improved color image encryption algorithm with pixel permutation and bit s...
An improved color image encryption algorithm with pixel permutation and bit s...
eSAT Journals
An improved color image encryption algorithm with
An improved color image encryption algorithm with
eSAT Publishing House
Security using image processing
Security using image processing
IJMIT JOURNAL
Security using image processing
Security using image processing
IJMIT JOURNAL
IRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography Technique
IRJET Journal
IRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography Technique
IRJET Journal
Advanced technique for video steganography with an encryption using LSB repl...
Advanced technique for video steganography with an encryption using LSB repl...
IRJET Journal
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
IRJET Journal
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
IRJET Journal
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
IRJET Journal
Transmission of cryptic text using rotational visual cryptography
Transmission of cryptic text using rotational visual cryptography
eSAT Journals
Transmission of cryptic text using rotational visual
Transmission of cryptic text using rotational visual
eSAT Publishing House
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
More Related Content
Similar to Encrypting and Decrypting Message via Image Slicing
IRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share Images
IRJET Journal
Encryption of Decomposed Image by using ASCII Code based Carrier Signal
Encryption of Decomposed Image by using ASCII Code based Carrier Signal
IRJET Journal
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
IJERD Editor
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
IRJET Journal
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
IRJET Journal
Protection of Secret Textual Data Using Steganography Based System
Protection of Secret Textual Data Using Steganography Based System
IRJET Journal
IRJET- A Probabilistic Model of Visual Cryptography Scheme for Anti-Phis...
IRJET- A Probabilistic Model of Visual Cryptography Scheme for Anti-Phis...
IRJET Journal
R04405103106
R04405103106
IJERA Editor
An improved color image encryption algorithm with pixel permutation and bit s...
An improved color image encryption algorithm with pixel permutation and bit s...
eSAT Journals
An improved color image encryption algorithm with
An improved color image encryption algorithm with
eSAT Publishing House
Security using image processing
Security using image processing
IJMIT JOURNAL
Security using image processing
Security using image processing
IJMIT JOURNAL
IRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography Technique
IRJET Journal
IRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography Technique
IRJET Journal
Advanced technique for video steganography with an encryption using LSB repl...
Advanced technique for video steganography with an encryption using LSB repl...
IRJET Journal
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
IRJET Journal
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
IRJET Journal
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
IRJET Journal
Transmission of cryptic text using rotational visual cryptography
Transmission of cryptic text using rotational visual cryptography
eSAT Journals
Transmission of cryptic text using rotational visual
Transmission of cryptic text using rotational visual
eSAT Publishing House
Similar to Encrypting and Decrypting Message via Image Slicing
(20)
IRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share Images
Encryption of Decomposed Image by using ASCII Code based Carrier Signal
Encryption of Decomposed Image by using ASCII Code based Carrier Signal
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
Protection of Secret Textual Data Using Steganography Based System
Protection of Secret Textual Data Using Steganography Based System
IRJET- A Probabilistic Model of Visual Cryptography Scheme for Anti-Phis...
IRJET- A Probabilistic Model of Visual Cryptography Scheme for Anti-Phis...
R04405103106
R04405103106
An improved color image encryption algorithm with pixel permutation and bit s...
An improved color image encryption algorithm with pixel permutation and bit s...
An improved color image encryption algorithm with
An improved color image encryption algorithm with
Security using image processing
Security using image processing
Security using image processing
Security using image processing
IRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography Technique
Advanced technique for video steganography with an encryption using LSB repl...
Advanced technique for video steganography with an encryption using LSB repl...
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
Transmission of cryptic text using rotational visual cryptography
Transmission of cryptic text using rotational visual cryptography
Transmission of cryptic text using rotational visual
Transmission of cryptic text using rotational visual
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
Call Girls in Nagpur High Profile
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
GDSCAESB
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
João Esperancinha
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
ranjana rawat
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Anamika Sarkar
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
pranjaldaimarysona
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
ranjana rawat
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Low Rate Call Girls In Saket, Delhi NCR
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
SIVASHANKAR N
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
RajaP95
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
upamatechverse
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
rakeshbaidya232001
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
SIVASHANKAR N
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
Suhani Kapoor
Internship report on mechanical engineering
Internship report on mechanical engineering
malavadedarshan25
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
Recently uploaded
(20)
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
Internship report on mechanical engineering
Internship report on mechanical engineering
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Encrypting and Decrypting Message via Image Slicing
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 02 | Feb 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 674 Encrypting and Decrypting Message via Image Slicing Sudeshna Khedekar [1], Digvij Akre [2], Vishakha Mulik [3], Prof. Bhavna Arora [4] [1], [2], [3]Student, Department of Computer Engineering, Atharva College of Engineering, Mumbai [4]Professor, Department of Computer Engineering, Atharva College of Engineering, Mumbai ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - Communication via message has become a major and effective part of our day-to-day life. Even though it is convenient to send messages and receive data. One of the main problems that we face these days is Data Security. That is where encryption and decryption of the data comes into play and there exists multiple encryption and decryption algorithms to serve the purpose. But, using only one algorithm for this, is generally not secure enough. So, by using effectives encryption and decrypting standards for effective approach to provide Message encryption Key Words: Cryptography, Steganography, Encryption, Decryption, AES (Advanced encryption standard), LSB (least significant bit). 1. INTRODUCTION In today’s world, we use many types of digital data. The information between mobile devices and computers is transmitted via one network in various form. But, do you think your confidential information and the security of that data over the internet are secure? No, the confidential data and information in today’s advanced world are not safely transferred via the network. And Our data is stolen by unauthorized users on daily basis. Hence, ensuring the Security and Confidentiality of data transmission is a very important and current necessity. This security can be achieved by different techniques. One of the techniques is Steganography and Cryptography. Cryptography techniques can be described into two types’ Symmetric- key cryptography and Asymmetric-key cryptography. [11]Under Symmetric-key cryptography, only one key is carried out process between the sender and the receiver. Whereas In Asymmetric-key cryptography we have two different keys one is a public key and another one is the private key. A public key is revealed to all, and a private key is secretly known to the authorized recipient of that data. In the Cryptography technique, even if the data is sent securely, it gives the clue of the existence of secret data to the third-party source. However, In the Steganography technique, there is no such clue given that will unintended recipient as the secret data is hidden inside another data. 1.1 MOTIVATION OF PROJECT As per the knowledge the technology is going advanced and growing day by day. Our main motto is to send data securely over the internet. The idea behind our project can be used by many sectors like financial services, defence, detective agencies, government sectors. 1.2 BASIC CONCEPT Our solution is to transfer the data securely via image. To Securely carry out the process of hiding the data in image. Algorithm like image slicing, image stitching, AES, LSB are used. To maintain real time integrity and authenticity of the process it will asked to enter a 16-bit AES key to encrypt the data and same key is used by receiver to decrypt the data in between this process LSB, image slicing and image stitching techniques will be applied to securely encrypt and decrypt the data.
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 02 | Feb 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 675 2. BACKGROUND STUDY The basic ideology of this project came from a background study of [5] Information hiding in images using a steganography technique paper written by Ramadhan Mstafa and Christian Bach. Where they have used steganography and different watermarking technique for securely transferring the data and from other paper [3] Image Security using Image Encryption and Image Stitching paper written by Jyoti T.G. Kankonkar and Prof. Nitesh Naik, where image stitching techniques are used to securely transfer the data. So, in an effort to make the process more secure, our idea of using image slicing and image stitching with cryptography and steganography techniques to provide more security of data that is to be transmitted over an internet. 3. OVERVIEW OF ALGORITHMS: 1. ADVANCED ENCRYPTION STANDARD (AES) The advanced encryption standard (AES) is a symmetric- key block cipher that was published by the (NIST) National Institute of Standards and Technology in December 2001.[9] AES is a non – Feistel cipher. It encrypts and decrypts 128 bits data blocks. How many rounds will be carried out will depend on the key length i.e. If the key length is 128 bits it has 10 rounds, if the key length is 192 bits there are 12 rounds to carry out. Whereas if the key length is 256 it has bit 14 rounds. [4] AES has three different AES versions: AES-128, AES-192, and AES-256. Every round has sub bytes, shift rows, mix columns and add round key. In the sub bytes, we interpret the byte as two hexadecimal digits. Where the row defines the left digits and the column that defines the right digit. The function of the two hexadecimal digits of the row and column is the new bytes. Shift rows are shifting to the left. In the Mix column step, it is to mix the column matrix. In add round key step it adds the round keyword with every state column matrix 1.1 CIPHER-BLOCK CHAINING (CBC) MODE The CBC mode is as for including XOR to every plaintext block to the cipher text block that was created prior. Keeping the use of same approach where cipher algorithm used for encrypting the result. The first block act as resultant block of cipher text, every following block of plaintext is then XOR with the preceding block of cipher text prior to encryption, the action perform is termed as chaining that comes in cipher block chaining. To keep away from making identical output cipher text blocks from identical plaintext data this mode is being implied for encryption in CBC mode i.e. Cipher block chaining mode which will only be done using one thread. Despite this disadvantage, this could be a really common approach that makes use of block ciphers. CBC mode is used in lots of applications. all through decrypting of a cipher text block, one should add XOR the output data acquired from the decoding(decrypting) algorithms to the preceding cipher text block. due to the receiver is aware of all of the cipher text blocks simply when getting the encrypted message, he's going to decipher the message by the use of numerous threads on the same time. Decryption in the CBC mode works in the opposite order. while decrypting the final block of cipher text, the ensuing data is XOR'd with the preceding block of cipher text to recover the initial plaintext.
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 02 | Feb 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 676 2. LEAST SIGNIFICANT BIT LSB steganography is one technique that merge the hidden data inside an image. In a Gray scale image, every pixel is represented in 8 bits. The last bit of the pixel is called as Least Significant bit as its value will affect the pixel value only by “1”. [7] In short LSB technique is used to hide the data in the image. If someone considered the last two bits as a LSB bits it will affect the pixel value only by “3”. This helps in hiding extra data. LSB steganography is a technique where the last bit of any selected image is replaced with a data bit. As this method is vulnerable to steganalysis so as to make it more secure, we first encrypt that data in a raw manner. Before merging the data in the image. While it increases time complexity during encryption process, it provides higher security also. This approach is very simple. In this method, the LSB bits of some or all of the bytes present within an image are replaced with bits of the secrete message. [2] To hide message with in several multimedia carrier data by using one of the basic techniques called LSB approach. LSB embedding may even applied in specific data domains - to give an example, embedding a hidden message into the color values of RGB bitmap data, or inside the frequency coefficients of a JPEG image. We can also applied LSB embedding approach to a variety of data formats and types. Therefore, Nowadays LSB embedding is a primarily important and popular steganography technique. 3. IMAGE SLICING Image slicing is method is simple process of cutting the images into pieces without any changing in dimension or changing any features of the image image is slide into matrix form by increasing size of matrix number of sliced images can be increased 4. IMAGE STITCHING [4] Image stitching is the process which is carried out where the image is stitched without changing any dimension or changing any features of the image it is an opposite of image slicing process 4. PROPOSED SYSTEM 4.1 IMPLEMENTATION Process flow is as follow: Sender side: Step 1: The data which is shared over the internet is unsafe and easy to access. To protect them using key, which will be in the 128-bit format. The key is shared between only sender and receiver to access the confidential data. Step 2: After entering plain text it will get encrypted by using AES algorithm. Advance Encryption Standard
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 02 | Feb 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 677 algorithm is used to encrypt the plain text which is entered by the sender using key. It converts original data to an unreadable format so that stranger or attacker is not able to read or understand the original data. The plain text if hard to read is known as cipher text. Step 3: After converting the data into cipher text It will hide inside cover medium using LSB steganography. [8] The cover medium can be in various form like audio, image, video or text document. The size of the image is depending on the amount of data which is entered by the sender. After done with all process the image called as stego image. Step 4: Image Slicing is simple process of cutting the images into pieces without any changing in dimension or changing any features of the image. Image is slide into matrix form. By increasing size of matrix number of sliced images can be increased. Step 5: Finally, receiver received the data via stego image in slices without any changing in dimension or changing any features of the image. By increasing size of matrix number of sliced images can be increased. Receiver side: Step 1: Receiver received the data via stego image in slices without any changing in dimension or changing any features of the image. Now, the image in slices will get stitched using image stitching process. process where the image is stitched without changing any dimension or changing any features of the image. It is an opposite of Image Slicing process. After this process the entire image is called as stego image. Step 2: We got the image then apply the LSB decoded algorithm. For the algorithm we used the image got after image stitching apply the algorithm then we find the cipher text which is hidden inside the stego image. Step 3: Using this cipher text and 128-bits key which is shared between sender and receiver as input we apply AES decode algorithm to get the original data file. The process of decryption of an AES cipher text is opposite to the AES encryption process. Each round consists of the four processes conducted in the reverse order 1. Add round key, 2. Mix columns, 3. Shift rows, 4. Byte substitution. Step 4: Finally, receiver received the confidential data safely without any anonyms attack. 4.2 SYSTEM DESIGN 5. DESIGN DETAIL 5.1 SENDERS FLOWCHART
5.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 02 | Feb 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 678 5.2 RECEIVER FLOWCHART 5.3 CLASS DIAGRAM 6. FUTURE SCOPE This idea and approach that we have implemented does not end here. There can be a future scope for development we can extend this particular project into multiple platforms. Particularly, we can incorporate additional algorithm together to make is more appealing. One other scope of improvement in expanding the idea hiding the data into a video format so that the application can be more secure so that different sector can use this to secure the way of communication between the user and themself. As specially, since the sensitive data can be stored without anyone knowing about it. Such that storing sensitive data won’t be a problem it as we add higher level of security. 7. CONCLUSION In this project we have combine different data security technique to share data on an unreliable channel. This Hybrid technique consist of AES Cryptography, LSB Steganography, Image slicing and image stitching process. Using this Hybrid technique, we are able to retrieve the data at receiver end without any Data loss. so, we believe various sector and entity can greatly benefit from our application in the current scenario, also maintaining authenticity and integrity of the entire REFERENCES [1] Wafaa Mustafa Abduallah and Abdul Monem S. Rahma,“A Review on Steganography Techniques”, American Scientific Research Journal for Engineering, Technology, and Sciences (ASRJETS), ISSN (Print) 2313-4410, ISSN (Online) 2313-4402 [2] Rajarathnam Chandramouli and Nasir D. Memon, “Analysis of LSB based image steganography techniques”, 2001 International Conference onVolume: 3, DOI: 10.1109/ICIP.2001.958299 [3] Jyoti T.G.Kankonkar and Prof. Nitesh Naik,“Image Security using Image Encryption and Image Stitching”, Proceedings of the IEEE 2017 International Conference on Computing Methodologies and Communication [4] Ako Muhammad Abdullah, “Advanced Encryption Standard (AES) Algorithm to Encrypt and Decrypt Data” [5] Ramadhan J. Mstafa and Christian Bach, “Information Hiding in Images Using Steganography Techniques”, Northeast Conference of the American Society for Engineering Education (ASEE)At: Norwich University David Crawford School of Engineering, DOI:10.13140/RG.2.1.1350.9360 [6] Nikhil Patel and Shweta Meena, “LSB based image steganography using dynamic key cryptography”, 2016 International Conference on Emerging Trends in Communication Technologies (ETCT), DOI:10.1109/ETCT.2016.7882955 [7] Arun Kumar Singh, Juhi Singh and Dr. Harsh Vikram Singh, “Steganography in Images Using LSB Technique”, International Journal of Latest Trends in
6.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 02 | Feb 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 679 Engineering and Technology (IJLTET), ISSN: 2278- 621X [8] Dr. Amarendra K, Venkata Naresh Mandhala, B.Chetan gupta, G.Geetha Sudheshna, V.Venkata Anusha, “Image Steganography Using LSB”, international journal of scientific & technology research volume 8, issue 12, december 2019, issn 2277-8616 [9] M.Pitchaiah, Philemon Daniel and Praveen, “Implementation of Advanced Encryption Standard Algorithm”, International Journal of Scientific & Engineering Research Volume 3, Issue 3, March - 2012,ISSN 2229-5518 [10] M. Pavani1, S. Naganjaneyulu, C. Nagaraju, ”A Survey on LSB Based Steganography Methods” International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 8 August, 2013 Page No. 2464-2467 [11] Akshay Kekunnaya, Rajeshwari Gundla , Siddharth Nanda, “A research Paper for Symmetric and asymmetric cryptography”, ijrece vol. 7 issue 2 (april- june 2019), issn: 2393-9028 (print) | issn: 2348-2281 (online)
Download now