Concoction of steganography and cryptography

0Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In recent year, the seuciryt of digital applications require significant research attention, When the usage and number of users increases. This in turn makes it easy to steal the sensitive information. This paper describes how the data is encrypted and hidden in an image. Initially the data is taken and encrypted it with Burrows Wheeler Transform Algorithm and then modified Double Advanced Encryption Standard encryption is applied and the encrypted data is hidden in image. Each character of the data is represented as 8-bit binary format obtained from its ASCII value out of which first three bits is replaced with last three bits of pixel value in R Matrix and the next three bits are replaced with last three bits of pixel value (in binary format) in the G matrix and the last two bits are replaced with last two bits of pixel value in the B matrix of the image. Here hiding is achieved by process of replacing bits in image matrix. After hiding the data in the image, Mean Square Error (MSE), Peak signal to noise ratio (PSNR) values of original image and the stego image (data hidden image) are tabulated and the graph is plotted for them.

Cite

CITATION STYLE

APA

Balasubramanian, K., Komara, P. S., Karanam, N., & Dasari, S. N. S. (2020). Concoction of steganography and cryptography. In Lecture Notes on Data Engineering and Communications Technologies (Vol. 39, pp. 327–334). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-3-030-34515-0_35

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free