Back to Search Start Over

An Image Steganography-based Novel Approach to develop 8-Share Integrated Security Toolkit (ISTI-8)

Authors :
Gautam Sanyal
Saurabh Dutta
Sabyasachi Samanta
Source :
International Journal of Information Engineering and Electronic Business. 7:52-59
Publication Year :
2015
Publisher :
MECS Publisher, 2015.

Abstract

Encryption is a process or algorithm to make information hidden or secret and considered as a subset of cryptography. Using encryption data are being transformed into some another form that appears to be meaningless and incomprehensible. Here we have embedded encrypted data bits about the entire image to some suitable nonlinear pixel positions using key. After that we have formed several shares of image and key using R, G and B components and character or digits respectively. At the decryption end through appropriate arrangement of shares of image and key, make possible to retrieve hidden data bits from stego-image and reform into its original content.

Details

ISSN :
20749031 and 20749023
Volume :
7
Database :
OpenAIRE
Journal :
International Journal of Information Engineering and Electronic Business
Accession number :
edsair.doi...........b957754ae73b600fd6c0934e594afb23
Full Text :
https://doi.org/10.5815/ijieeb.2015.03.08