Back to Search
Start Over
An Image Steganography-based Novel Approach to develop 8-Share Integrated Security Toolkit (ISTI-8)
- Source :
- International Journal of Information Engineering and Electronic Business. 7:52-59
- Publication Year :
- 2015
- Publisher :
- MECS Publisher, 2015.
-
Abstract
- Encryption is a process or algorithm to make information hidden or secret and considered as a subset of cryptography. Using encryption data are being transformed into some another form that appears to be meaningless and incomprehensible. Here we have embedded encrypted data bits about the entire image to some suitable nonlinear pixel positions using key. After that we have formed several shares of image and key using R, G and B components and character or digits respectively. At the decryption end through appropriate arrangement of shares of image and key, make possible to retrieve hidden data bits from stego-image and reform into its original content.
- Subjects :
- Steganography tools
Theoretical computer science
Pixel
Computer science
business.industry
Character (computing)
ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION
Process (computing)
Cryptography
Computer security
computer.software_genre
Encryption
Image (mathematics)
Key (cryptography)
business
computer
Subjects
Details
- ISSN :
- 20749031 and 20749023
- Volume :
- 7
- Database :
- OpenAIRE
- Journal :
- International Journal of Information Engineering and Electronic Business
- Accession number :
- edsair.doi...........b957754ae73b600fd6c0934e594afb23
- Full Text :
- https://doi.org/10.5815/ijieeb.2015.03.08