SlideShare a Scribd company logo
1 of 4
Download to read offline
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 11, Issue 5 (May. - Jun. 2013), PP 47-50
www.iosrjournals.org
www.iosrjournals.org 47 | Page
Image Steganography Based On Hill Cipher with Key Hiding
Technique
Pavan N1
, Nagarjun G A2
, Nihaar N3
, Gokul S Gaonkar4
, Mrs.Poonam Sharma5
Department of Electronics and Communication, Dayananda Sagar College of Engineering, Bangalore, INDIA
Abstract : In today’s digital world invisible ink and paper have been replaced by much more versatile and
practical covers for hiding messages – digital documents, images, video, and audio files. As long as an
electronic document contains irrelevant or redundant information, it can be used as a “cover” to hide secret
messages. Cryptography is the study of encoding and decoding secret messages where as Steganography is the
art and science of writing hidden messages in such a way that no one apart from the sender and intended
recipient even realizes there is a hidden message.
In this paper we implement Hill Cipher algorithm, for hiding our text behind the cover image and decrypt the
cover image to get original text. The highlight of this paper is that, the key is encrypted and scrambled within
the cover image.
Keywords : Encryption, Decryption, Hill Cipher, Steganography, Symmetric Key Encryption.
I. INTRODUCTION
With the rapid advancement in network technology especially Internet, it has become possible to
transmit any type of data across networks. This has raised concern for the security of the transmitted data as
access to data which has become easier by interception of communication media. Hence, data security is
becoming an imperative and critical issue in data storage and transmission to prevent it from attacks. Images are
widely used in several processes. Therefore, the protection of image data from unauthorized access is important.
Encryption refers to the algorithmic schemes that encode the original message referred to as plain text using a
key into non-readable form, a coded message known as cipher text so that it is computationally infeasible to be
interpreted by any eavesdropper. The receiver of the cipher text uses a key to retrieve back the message in
original plain text form.
Steganography is the art and science of writing hidden messages in such a way that no one apart from
the sender and intended recipient even realizes there is a hidden message. By contrast, cryptography obscures
the meaning of a message, but it does not conceal the fact that there is a message. Today, the term
Steganography includes the concealment of digital information within computer files. For example, the sender
might start with an ordinary looking image file, then adjust the color of every 100th
pixel to correspond to a
letter in the alphabet—a change so subtle that someone who isn't actively looking for it is unlikely to notice it.
Steganography and cryptography are used together to ensure security of the covert message. In this paper we
propose a method in which the key is transformed and is hidden in the cover image which also has the cipher
text hidden in it. Thus eliminating the requirement of a key distribution centre and also eliminating the need for
a secure channel for transmission of key to sender and receiver from the key distribution centre.
II. EXISTING SYSTEM
The Hill cipher is a polygraphic block cipher based on linear algebra developed by Lester Hill in 1929.
Using frequency analysis, substitution ciphers like mono-alphabetic ciphers can be easily broken. But Hill
cipher completely hides single letter frequencies by encrypting pairs of plain text and so it’s safe against cipher-
text only attacks. It provides good diffusion as change in one letter of plain text affects all letters in the cipher
text. All arithmetic is done modulo some integer z that is the total number of possible symbols.
For encryption, the algorithm takes m successive plain text letters and instead of that substitutes m
cipher letters. Each character is assigned a numerical value like a = 0, b = 1 and so on. The substitution of cipher
text letters in the place of plain text letters leads to m linear equation. For m = 3, the system can be described as
follows
C1 = (K11P1+K12P2+K13P3) mod 26 (2.1)
C2 = (K21P1+K22P2+K23P3) mod 26 (2.2)
C3 = (K31P1+K32P2+K33P3) mod 26 (2.3)
This case can be expressed in terms of column vectors and matrices: or simply C = KP , where C and P are
column vectors of length 3, representing the plain text and cipher text respectively, and K is a 3×3 matrix, which
is the encryption key. All operations are performed mod 26 here. Decryption requires using the inverse of the
Image Steganography Based On Hill Cipher With Key Hiding Technique
www.iosrjournals.org 48 | Page
matrix K. The inverse matrix K
-1
of a matrix K is defined by the equation KK
-1
= K
-1
K = I, where I is the
Identity matrix.
But the inverse of the matrix does not always exist, and when it does, it satisfies the preceding equation.
K
-1
is applied to the cipher text, and then the plain text is recovered. In general term, we can write as follows:
For encryption: C = Ek (P) = KP
[4]
For decryption: P= Dk (C) = K
-1
C = K
-1
KP = P
[4]
If the block length is m, there are 26m different m letters blocks possible, each of them can be regarded
as a letter in a 26m letter alphabet. In this paper, we have used Hill Cipher for encryption of data. All arithmetic
has been done modulo 256 (8 bits per pixel for gray scale and 8 bits for RGB per color component).
III. PROPOSED SCHEME
In this paper, we have implemented Hill Cipher technique. We consider an image which acts a cover
for hiding the cipher text as well as the key. As first step, we add the cipher text which is obtained by using Hill
cipher technique to the cover image. In the second step, we add the encrypted key into the cover image which
forms the encrypted image. The encrypted image is communicated over unsecured channel. At the receiver side
the key is extracted from the cover image and by using its inverse the plain text is obtained.
IV. Flowchart
Encryption Decryption
Input the plain text
Encryption using hill
cipher
Extract the original pixel
values of cover image
Replace original pixel
values with the cipher
text values
Insert key and transform
the pixel values
Transmit the image
Read the image
Extract the pixel values
De-transform and extract
key from pixel value
Extract cipher text from
pixel values
Apply inverse hill cipher
Plain text obtained
Image Steganography Based On Hill Cipher With Key Hiding Technique
www.iosrjournals.org 49 | Page
V. ILLUSTRATION OF THE METHOD
Figure 4.1 Original cover image
key = 5 8
17 3
Initial key insertion into the image pixels.
5 159 158 155 158 156 159 158 157 158 158 159 160 156
8 154 157 158 157 159 158 158 158 160 155 156 159 158
17 159 158 155 158 156 159 158 157 158 158 159 160 160
3 154 157 158 157 159 158 158 158 160 155 156 159 158
Due to space constraints, we are displaying only 4 rows of the 256x256 pixel matrix containing the key.
Figure 4.2 Encrypted image before transformation
Figure 4.3 Encrypted image after transformation
Image Steganography Based On Hill Cipher With Key Hiding Technique
www.iosrjournals.org 50 | Page
Transformed key matrix within the pixels of the image.
154 159 158 155 158 156 159 158 157 158
146 154 157 158 157 159 158 158 158 160
142 159 158 155 158 156 159 158 157 160
151 154 157 158 157 159 158 158 158 160
Figure 4.4 Decrypted cover image
CONCLUSION
In this paper, we perform image steganography based on Hill cipher technique. We have successfully
implemented a scheme which eliminates the use key distribution system. The key is transformed in manner such
that it is diffused within the pixel values, thus making the key invisible amongst the pixel values. The
transformation is highly efficient since the encrypted data and also encrypted key similar values of the
neighboring pixels. Thus making the system highly secure for various network applications.
REFERENCES
[1] Bibhudendra Acharya, Saroj Kumar Panigrahy and Debasish Jena. Image encryption using self invertible key matrix of Hill cipher
algorithm. Ist International Conference on Advances in Computing. Chikhli, India. 21-22 February 2008.
[2] Bibhudendra Acharya, Girija Sankar Rath, Sarat Kumar Patra, Saroj Kumar Panigrahy. 2007. Novel Methods of
Generating Self-Invertible Matrix for Hill Cipher Algorithm, International Journal of Security,
Vol 1, Issue 1, 2007.
[3] S.K.Muttoo1, Deepika Aggarwal, Bhavya Ahuja. A Secure Image Encryption Algorithm Based on Hill Cipher System, Buletin
Teknik Elektro dan Informatika (Bulletin of Electrical Engineering and Informatics) Vol.1, No.1, March 2012, pp. 51~60.
[4] W. Stallings, “Cryptography and Network Security”, 4th edition, Prentice Hall, 2005
[5] Amogh Mahapatra Rrajballav Dash .Data encryption and decryption by using hill cipher technique and self repetitive matrix.
Department of Electronics & Instrumentation Engineering National Institute of Technology Rourkela 2007

More Related Content

What's hot

Multiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity AnalysisMultiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity AnalysisIJCERT
 
Image encryption and decryption
Image encryption and decryptionImage encryption and decryption
Image encryption and decryptionAashish R
 
Improved LSB Steganograhy Technique for grayscale and RGB images
Improved LSB Steganograhy Technique for grayscale and RGB imagesImproved LSB Steganograhy Technique for grayscale and RGB images
Improved LSB Steganograhy Technique for grayscale and RGB imagesIJERA Editor
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansionSreeda Perikamana
 
Cryptography and steganography
Cryptography and steganographyCryptography and steganography
Cryptography and steganographyJishnu Grandhi
 
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...IJCSIS Research Publications
 
Image encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithmImage encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithmIAEME Publication
 
Image steganography and cryptography
Image steganography and cryptographyImage steganography and cryptography
Image steganography and cryptographyAvinash Mishra
 
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...Bikash Chandra Prusty
 
Color Image Encryption and Decryption Using Multiple Chaotic Maps
Color Image Encryption and Decryption Using Multiple Chaotic MapsColor Image Encryption and Decryption Using Multiple Chaotic Maps
Color Image Encryption and Decryption Using Multiple Chaotic MapsIJTET Journal
 
“Multimedia Steganography with Cipher Text and Compression ppt.
“Multimedia Steganography with Cipher Text and Compression ppt.“Multimedia Steganography with Cipher Text and Compression ppt.
“Multimedia Steganography with Cipher Text and Compression ppt.Pradeep Vishwakarma
 
Conditional entrench spatial domain steganography
Conditional entrench spatial domain steganographyConditional entrench spatial domain steganography
Conditional entrench spatial domain steganographysipij
 
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...iosrjce
 
RSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT ApproachRSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT ApproachIJERA Editor
 
Steganography Engineering project report
Steganography Engineering project reportSteganography Engineering project report
Steganography Engineering project reportRishab Gupta
 
Modifications in lsb based steganography
Modifications in lsb based steganographyModifications in lsb based steganography
Modifications in lsb based steganographyAslesha Niki
 

What's hot (20)

Multiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity AnalysisMultiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity Analysis
 
Image encryption and decryption
Image encryption and decryptionImage encryption and decryption
Image encryption and decryption
 
Improved LSB Steganograhy Technique for grayscale and RGB images
Improved LSB Steganograhy Technique for grayscale and RGB imagesImproved LSB Steganograhy Technique for grayscale and RGB images
Improved LSB Steganograhy Technique for grayscale and RGB images
 
G018143943
G018143943G018143943
G018143943
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansion
 
Cryptography and steganography
Cryptography and steganographyCryptography and steganography
Cryptography and steganography
 
Image Encryption in java ppt.
Image Encryption in java ppt.Image Encryption in java ppt.
Image Encryption in java ppt.
 
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
 
Image encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithmImage encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithm
 
Image steganography and cryptography
Image steganography and cryptographyImage steganography and cryptography
Image steganography and cryptography
 
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
 
Color Image Encryption and Decryption Using Multiple Chaotic Maps
Color Image Encryption and Decryption Using Multiple Chaotic MapsColor Image Encryption and Decryption Using Multiple Chaotic Maps
Color Image Encryption and Decryption Using Multiple Chaotic Maps
 
“Multimedia Steganography with Cipher Text and Compression ppt.
“Multimedia Steganography with Cipher Text and Compression ppt.“Multimedia Steganography with Cipher Text and Compression ppt.
“Multimedia Steganography with Cipher Text and Compression ppt.
 
Az24339344
Az24339344Az24339344
Az24339344
 
Conditional entrench spatial domain steganography
Conditional entrench spatial domain steganographyConditional entrench spatial domain steganography
Conditional entrench spatial domain steganography
 
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
 
Secure image encryption using aes
Secure image encryption using aesSecure image encryption using aes
Secure image encryption using aes
 
RSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT ApproachRSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT Approach
 
Steganography Engineering project report
Steganography Engineering project reportSteganography Engineering project report
Steganography Engineering project report
 
Modifications in lsb based steganography
Modifications in lsb based steganographyModifications in lsb based steganography
Modifications in lsb based steganography
 

Viewers also liked

Presentasjon brønnøysunds avis
Presentasjon brønnøysunds avisPresentasjon brønnøysunds avis
Presentasjon brønnøysunds avisMarius Andersen
 
Effects of Weight Approximation Methods on Performance of Digital Beamforming...
Effects of Weight Approximation Methods on Performance of Digital Beamforming...Effects of Weight Approximation Methods on Performance of Digital Beamforming...
Effects of Weight Approximation Methods on Performance of Digital Beamforming...IOSR Journals
 
Auroras boreales
Auroras borealesAuroras boreales
Auroras borealespaulau2012
 
тестфонетика9 класса
тестфонетика9 классатестфонетика9 класса
тестфонетика9 классаNatalya Dyrda
 
Analysis of Technical, Economic and Allocative Efficiencies of CassavaProduct...
Analysis of Technical, Economic and Allocative Efficiencies of CassavaProduct...Analysis of Technical, Economic and Allocative Efficiencies of CassavaProduct...
Analysis of Technical, Economic and Allocative Efficiencies of CassavaProduct...IOSR Journals
 
Pixel Ad Mall :: Advertising the Pixel Way
Pixel Ad Mall :: Advertising the Pixel WayPixel Ad Mall :: Advertising the Pixel Way
Pixel Ad Mall :: Advertising the Pixel Waybelieve52
 
Báo cáo thực tập phạm thị huyền trang new
Báo cáo thực tập phạm thị huyền trang newBáo cáo thực tập phạm thị huyền trang new
Báo cáo thực tập phạm thị huyền trang newTrang Xebit
 
A Secure Model for Cloud Computing Based Storage and Retrieval
A Secure Model for Cloud Computing Based Storage and  RetrievalA Secure Model for Cloud Computing Based Storage and  Retrieval
A Secure Model for Cloud Computing Based Storage and RetrievalIOSR Journals
 
Selling Children's Items On Ebay
Selling Children's Items On EbaySelling Children's Items On Ebay
Selling Children's Items On Ebaybelieve52
 
Response of Watermelon to Five Different Rates of Poultry Manure in Asaba Are...
Response of Watermelon to Five Different Rates of Poultry Manure in Asaba Are...Response of Watermelon to Five Different Rates of Poultry Manure in Asaba Are...
Response of Watermelon to Five Different Rates of Poultry Manure in Asaba Are...IOSR Journals
 
Low ict competencies in language teaching
Low ict competencies in language teachingLow ict competencies in language teaching
Low ict competencies in language teachingblueseaqnu
 
Characterization of Arsenic contaminated Rice (Oryza Sativa L.) through RAPD ...
Characterization of Arsenic contaminated Rice (Oryza Sativa L.) through RAPD ...Characterization of Arsenic contaminated Rice (Oryza Sativa L.) through RAPD ...
Characterization of Arsenic contaminated Rice (Oryza Sativa L.) through RAPD ...IOSR Journals
 
Behavioral Analysis of Second Order Sigma-Delta Modulator for Low frequency A...
Behavioral Analysis of Second Order Sigma-Delta Modulator for Low frequency A...Behavioral Analysis of Second Order Sigma-Delta Modulator for Low frequency A...
Behavioral Analysis of Second Order Sigma-Delta Modulator for Low frequency A...IOSR Journals
 
Finding Good URLs: Aligning Entities in Knowledge Bases with Public Web Docum...
Finding Good URLs: Aligning Entities in Knowledge Bases with Public Web Docum...Finding Good URLs: Aligning Entities in Knowledge Bases with Public Web Docum...
Finding Good URLs: Aligning Entities in Knowledge Bases with Public Web Docum...Thomas Gottron
 
Secondary Distribution for Grid Interconnected Nine-level Inverter using PV s...
Secondary Distribution for Grid Interconnected Nine-level Inverter using PV s...Secondary Distribution for Grid Interconnected Nine-level Inverter using PV s...
Secondary Distribution for Grid Interconnected Nine-level Inverter using PV s...IOSR Journals
 

Viewers also liked (20)

Presentasjon brønnøysunds avis
Presentasjon brønnøysunds avisPresentasjon brønnøysunds avis
Presentasjon brønnøysunds avis
 
Effects of Weight Approximation Methods on Performance of Digital Beamforming...
Effects of Weight Approximation Methods on Performance of Digital Beamforming...Effects of Weight Approximation Methods on Performance of Digital Beamforming...
Effects of Weight Approximation Methods on Performance of Digital Beamforming...
 
Modelo pedagogico
Modelo pedagogicoModelo pedagogico
Modelo pedagogico
 
Auroras boreales
Auroras borealesAuroras boreales
Auroras boreales
 
Brian
BrianBrian
Brian
 
тестфонетика9 класса
тестфонетика9 классатестфонетика9 класса
тестфонетика9 класса
 
Analysis of Technical, Economic and Allocative Efficiencies of CassavaProduct...
Analysis of Technical, Economic and Allocative Efficiencies of CassavaProduct...Analysis of Technical, Economic and Allocative Efficiencies of CassavaProduct...
Analysis of Technical, Economic and Allocative Efficiencies of CassavaProduct...
 
Pixel Ad Mall :: Advertising the Pixel Way
Pixel Ad Mall :: Advertising the Pixel WayPixel Ad Mall :: Advertising the Pixel Way
Pixel Ad Mall :: Advertising the Pixel Way
 
Báo cáo thực tập phạm thị huyền trang new
Báo cáo thực tập phạm thị huyền trang newBáo cáo thực tập phạm thị huyền trang new
Báo cáo thực tập phạm thị huyền trang new
 
A Secure Model for Cloud Computing Based Storage and Retrieval
A Secure Model for Cloud Computing Based Storage and  RetrievalA Secure Model for Cloud Computing Based Storage and  Retrieval
A Secure Model for Cloud Computing Based Storage and Retrieval
 
Selling Children's Items On Ebay
Selling Children's Items On EbaySelling Children's Items On Ebay
Selling Children's Items On Ebay
 
Response of Watermelon to Five Different Rates of Poultry Manure in Asaba Are...
Response of Watermelon to Five Different Rates of Poultry Manure in Asaba Are...Response of Watermelon to Five Different Rates of Poultry Manure in Asaba Are...
Response of Watermelon to Five Different Rates of Poultry Manure in Asaba Are...
 
Low ict competencies in language teaching
Low ict competencies in language teachingLow ict competencies in language teaching
Low ict competencies in language teaching
 
D006462595
D006462595D006462595
D006462595
 
C0621115
C0621115C0621115
C0621115
 
Characterization of Arsenic contaminated Rice (Oryza Sativa L.) through RAPD ...
Characterization of Arsenic contaminated Rice (Oryza Sativa L.) through RAPD ...Characterization of Arsenic contaminated Rice (Oryza Sativa L.) through RAPD ...
Characterization of Arsenic contaminated Rice (Oryza Sativa L.) through RAPD ...
 
Behavioral Analysis of Second Order Sigma-Delta Modulator for Low frequency A...
Behavioral Analysis of Second Order Sigma-Delta Modulator for Low frequency A...Behavioral Analysis of Second Order Sigma-Delta Modulator for Low frequency A...
Behavioral Analysis of Second Order Sigma-Delta Modulator for Low frequency A...
 
Finding Good URLs: Aligning Entities in Knowledge Bases with Public Web Docum...
Finding Good URLs: Aligning Entities in Knowledge Bases with Public Web Docum...Finding Good URLs: Aligning Entities in Knowledge Bases with Public Web Docum...
Finding Good URLs: Aligning Entities in Knowledge Bases with Public Web Docum...
 
Secondary Distribution for Grid Interconnected Nine-level Inverter using PV s...
Secondary Distribution for Grid Interconnected Nine-level Inverter using PV s...Secondary Distribution for Grid Interconnected Nine-level Inverter using PV s...
Secondary Distribution for Grid Interconnected Nine-level Inverter using PV s...
 
Arlington road
Arlington roadArlington road
Arlington road
 

Similar to Image Steganography Based On Hill Cipher with Key Hiding Technique

Combined Implementation of Robust Cryptosystem for Non-invertible Matrices ba...
Combined Implementation of Robust Cryptosystem for Non-invertible Matrices ba...Combined Implementation of Robust Cryptosystem for Non-invertible Matrices ba...
Combined Implementation of Robust Cryptosystem for Non-invertible Matrices ba...IDES Editor
 
Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..Jayanth Dwijesh H P
 
Review paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and SteganographyReview paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and Steganographyvivatechijri
 
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”IOSR Journals
 
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...IOSR Journals
 
Improved security system using steganography and elliptic curve crypto...
Improved  security  system using  steganography  and  elliptic  curve  crypto...Improved  security  system using  steganography  and  elliptic  curve  crypto...
Improved security system using steganography and elliptic curve crypto...atanuanwesha
 
A Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography TechniqueA Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography TechniqueJeff Brooks
 
ASCII Value Based Encryption System (AVB)
ASCII Value Based Encryption System (AVB)ASCII Value Based Encryption System (AVB)
ASCII Value Based Encryption System (AVB)IJERA Editor
 
Text in Image Hiding using Developed LSB and Random Method
Text in Image Hiding using Developed LSB and  Random Method Text in Image Hiding using Developed LSB and  Random Method
Text in Image Hiding using Developed LSB and Random Method IJECEIAES
 
A Novel Secure Combination Technique of Steganography and Cryptography
A Novel Secure Combination Technique of Steganography and CryptographyA Novel Secure Combination Technique of Steganography and Cryptography
A Novel Secure Combination Technique of Steganography and CryptographyZac Darcy
 
A novel secure combination technique of steganography and cryptography
A novel secure combination technique of steganography and cryptographyA novel secure combination technique of steganography and cryptography
A novel secure combination technique of steganography and cryptographyZac Darcy
 
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...IJEACS
 
Color Cryptography using Substitution Method
Color Cryptography using Substitution MethodColor Cryptography using Substitution Method
Color Cryptography using Substitution Methodijtsrd
 
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message AuthenticationPairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message AuthenticationIJTET Journal
 
QUATERNİON SECURİTY USİNG MODİFYİNG VERNAM CİPHER WİTH İMAGE STEGANOGRAPHY
QUATERNİON SECURİTY USİNG MODİFYİNG VERNAM CİPHER WİTH İMAGE STEGANOGRAPHYQUATERNİON SECURİTY USİNG MODİFYİNG VERNAM CİPHER WİTH İMAGE STEGANOGRAPHY
QUATERNİON SECURİTY USİNG MODİFYİNG VERNAM CİPHER WİTH İMAGE STEGANOGRAPHYijma
 
Iaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detectionIaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detectionIaetsd Iaetsd
 
Cryptography Methodologies
Cryptography MethodologiesCryptography Methodologies
Cryptography Methodologiesijtsrd
 

Similar to Image Steganography Based On Hill Cipher with Key Hiding Technique (20)

Combined Implementation of Robust Cryptosystem for Non-invertible Matrices ba...
Combined Implementation of Robust Cryptosystem for Non-invertible Matrices ba...Combined Implementation of Robust Cryptosystem for Non-invertible Matrices ba...
Combined Implementation of Robust Cryptosystem for Non-invertible Matrices ba...
 
Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..
 
Review paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and SteganographyReview paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and Steganography
 
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
 
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
 
Improved security system using steganography and elliptic curve crypto...
Improved  security  system using  steganography  and  elliptic  curve  crypto...Improved  security  system using  steganography  and  elliptic  curve  crypto...
Improved security system using steganography and elliptic curve crypto...
 
A Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography TechniqueA Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography Technique
 
ASCII Value Based Encryption System (AVB)
ASCII Value Based Encryption System (AVB)ASCII Value Based Encryption System (AVB)
ASCII Value Based Encryption System (AVB)
 
Text in Image Hiding using Developed LSB and Random Method
Text in Image Hiding using Developed LSB and  Random Method Text in Image Hiding using Developed LSB and  Random Method
Text in Image Hiding using Developed LSB and Random Method
 
A Novel Secure Combination Technique of Steganography and Cryptography
A Novel Secure Combination Technique of Steganography and CryptographyA Novel Secure Combination Technique of Steganography and Cryptography
A Novel Secure Combination Technique of Steganography and Cryptography
 
A novel secure combination technique of steganography and cryptography
A novel secure combination technique of steganography and cryptographyA novel secure combination technique of steganography and cryptography
A novel secure combination technique of steganography and cryptography
 
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
 
Ew4301904907
Ew4301904907Ew4301904907
Ew4301904907
 
Be32364369
Be32364369Be32364369
Be32364369
 
Color Cryptography using Substitution Method
Color Cryptography using Substitution MethodColor Cryptography using Substitution Method
Color Cryptography using Substitution Method
 
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message AuthenticationPairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
 
QUATERNİON SECURİTY USİNG MODİFYİNG VERNAM CİPHER WİTH İMAGE STEGANOGRAPHY
QUATERNİON SECURİTY USİNG MODİFYİNG VERNAM CİPHER WİTH İMAGE STEGANOGRAPHYQUATERNİON SECURİTY USİNG MODİFYİNG VERNAM CİPHER WİTH İMAGE STEGANOGRAPHY
QUATERNİON SECURİTY USİNG MODİFYİNG VERNAM CİPHER WİTH İMAGE STEGANOGRAPHY
 
Iaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detectionIaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detection
 
Cryptography Methodologies
Cryptography MethodologiesCryptography Methodologies
Cryptography Methodologies
 
H42054550
H42054550H42054550
H42054550
 

More from IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Recently uploaded

HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...Call Girls in Nagpur High Profile
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 

Recently uploaded (20)

HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 

Image Steganography Based On Hill Cipher with Key Hiding Technique

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 11, Issue 5 (May. - Jun. 2013), PP 47-50 www.iosrjournals.org www.iosrjournals.org 47 | Page Image Steganography Based On Hill Cipher with Key Hiding Technique Pavan N1 , Nagarjun G A2 , Nihaar N3 , Gokul S Gaonkar4 , Mrs.Poonam Sharma5 Department of Electronics and Communication, Dayananda Sagar College of Engineering, Bangalore, INDIA Abstract : In today’s digital world invisible ink and paper have been replaced by much more versatile and practical covers for hiding messages – digital documents, images, video, and audio files. As long as an electronic document contains irrelevant or redundant information, it can be used as a “cover” to hide secret messages. Cryptography is the study of encoding and decoding secret messages where as Steganography is the art and science of writing hidden messages in such a way that no one apart from the sender and intended recipient even realizes there is a hidden message. In this paper we implement Hill Cipher algorithm, for hiding our text behind the cover image and decrypt the cover image to get original text. The highlight of this paper is that, the key is encrypted and scrambled within the cover image. Keywords : Encryption, Decryption, Hill Cipher, Steganography, Symmetric Key Encryption. I. INTRODUCTION With the rapid advancement in network technology especially Internet, it has become possible to transmit any type of data across networks. This has raised concern for the security of the transmitted data as access to data which has become easier by interception of communication media. Hence, data security is becoming an imperative and critical issue in data storage and transmission to prevent it from attacks. Images are widely used in several processes. Therefore, the protection of image data from unauthorized access is important. Encryption refers to the algorithmic schemes that encode the original message referred to as plain text using a key into non-readable form, a coded message known as cipher text so that it is computationally infeasible to be interpreted by any eavesdropper. The receiver of the cipher text uses a key to retrieve back the message in original plain text form. Steganography is the art and science of writing hidden messages in such a way that no one apart from the sender and intended recipient even realizes there is a hidden message. By contrast, cryptography obscures the meaning of a message, but it does not conceal the fact that there is a message. Today, the term Steganography includes the concealment of digital information within computer files. For example, the sender might start with an ordinary looking image file, then adjust the color of every 100th pixel to correspond to a letter in the alphabet—a change so subtle that someone who isn't actively looking for it is unlikely to notice it. Steganography and cryptography are used together to ensure security of the covert message. In this paper we propose a method in which the key is transformed and is hidden in the cover image which also has the cipher text hidden in it. Thus eliminating the requirement of a key distribution centre and also eliminating the need for a secure channel for transmission of key to sender and receiver from the key distribution centre. II. EXISTING SYSTEM The Hill cipher is a polygraphic block cipher based on linear algebra developed by Lester Hill in 1929. Using frequency analysis, substitution ciphers like mono-alphabetic ciphers can be easily broken. But Hill cipher completely hides single letter frequencies by encrypting pairs of plain text and so it’s safe against cipher- text only attacks. It provides good diffusion as change in one letter of plain text affects all letters in the cipher text. All arithmetic is done modulo some integer z that is the total number of possible symbols. For encryption, the algorithm takes m successive plain text letters and instead of that substitutes m cipher letters. Each character is assigned a numerical value like a = 0, b = 1 and so on. The substitution of cipher text letters in the place of plain text letters leads to m linear equation. For m = 3, the system can be described as follows C1 = (K11P1+K12P2+K13P3) mod 26 (2.1) C2 = (K21P1+K22P2+K23P3) mod 26 (2.2) C3 = (K31P1+K32P2+K33P3) mod 26 (2.3) This case can be expressed in terms of column vectors and matrices: or simply C = KP , where C and P are column vectors of length 3, representing the plain text and cipher text respectively, and K is a 3×3 matrix, which is the encryption key. All operations are performed mod 26 here. Decryption requires using the inverse of the
  • 2. Image Steganography Based On Hill Cipher With Key Hiding Technique www.iosrjournals.org 48 | Page matrix K. The inverse matrix K -1 of a matrix K is defined by the equation KK -1 = K -1 K = I, where I is the Identity matrix. But the inverse of the matrix does not always exist, and when it does, it satisfies the preceding equation. K -1 is applied to the cipher text, and then the plain text is recovered. In general term, we can write as follows: For encryption: C = Ek (P) = KP [4] For decryption: P= Dk (C) = K -1 C = K -1 KP = P [4] If the block length is m, there are 26m different m letters blocks possible, each of them can be regarded as a letter in a 26m letter alphabet. In this paper, we have used Hill Cipher for encryption of data. All arithmetic has been done modulo 256 (8 bits per pixel for gray scale and 8 bits for RGB per color component). III. PROPOSED SCHEME In this paper, we have implemented Hill Cipher technique. We consider an image which acts a cover for hiding the cipher text as well as the key. As first step, we add the cipher text which is obtained by using Hill cipher technique to the cover image. In the second step, we add the encrypted key into the cover image which forms the encrypted image. The encrypted image is communicated over unsecured channel. At the receiver side the key is extracted from the cover image and by using its inverse the plain text is obtained. IV. Flowchart Encryption Decryption Input the plain text Encryption using hill cipher Extract the original pixel values of cover image Replace original pixel values with the cipher text values Insert key and transform the pixel values Transmit the image Read the image Extract the pixel values De-transform and extract key from pixel value Extract cipher text from pixel values Apply inverse hill cipher Plain text obtained
  • 3. Image Steganography Based On Hill Cipher With Key Hiding Technique www.iosrjournals.org 49 | Page V. ILLUSTRATION OF THE METHOD Figure 4.1 Original cover image key = 5 8 17 3 Initial key insertion into the image pixels. 5 159 158 155 158 156 159 158 157 158 158 159 160 156 8 154 157 158 157 159 158 158 158 160 155 156 159 158 17 159 158 155 158 156 159 158 157 158 158 159 160 160 3 154 157 158 157 159 158 158 158 160 155 156 159 158 Due to space constraints, we are displaying only 4 rows of the 256x256 pixel matrix containing the key. Figure 4.2 Encrypted image before transformation Figure 4.3 Encrypted image after transformation
  • 4. Image Steganography Based On Hill Cipher With Key Hiding Technique www.iosrjournals.org 50 | Page Transformed key matrix within the pixels of the image. 154 159 158 155 158 156 159 158 157 158 146 154 157 158 157 159 158 158 158 160 142 159 158 155 158 156 159 158 157 160 151 154 157 158 157 159 158 158 158 160 Figure 4.4 Decrypted cover image CONCLUSION In this paper, we perform image steganography based on Hill cipher technique. We have successfully implemented a scheme which eliminates the use key distribution system. The key is transformed in manner such that it is diffused within the pixel values, thus making the key invisible amongst the pixel values. The transformation is highly efficient since the encrypted data and also encrypted key similar values of the neighboring pixels. Thus making the system highly secure for various network applications. REFERENCES [1] Bibhudendra Acharya, Saroj Kumar Panigrahy and Debasish Jena. Image encryption using self invertible key matrix of Hill cipher algorithm. Ist International Conference on Advances in Computing. Chikhli, India. 21-22 February 2008. [2] Bibhudendra Acharya, Girija Sankar Rath, Sarat Kumar Patra, Saroj Kumar Panigrahy. 2007. Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm, International Journal of Security, Vol 1, Issue 1, 2007. [3] S.K.Muttoo1, Deepika Aggarwal, Bhavya Ahuja. A Secure Image Encryption Algorithm Based on Hill Cipher System, Buletin Teknik Elektro dan Informatika (Bulletin of Electrical Engineering and Informatics) Vol.1, No.1, March 2012, pp. 51~60. [4] W. Stallings, “Cryptography and Network Security”, 4th edition, Prentice Hall, 2005 [5] Amogh Mahapatra Rrajballav Dash .Data encryption and decryption by using hill cipher technique and self repetitive matrix. Department of Electronics & Instrumentation Engineering National Institute of Technology Rourkela 2007