IMAGE PROCESSING BASED SECURITY ANALYSIS

PROF. SANJAY SHRIVASTAVA

Abstract


Using image stitching and image steganography security can be provided to any
image which has to be sent over the network or transferred using any electronic mode.
There is a message and a secret image that has to be sent. The secret image is divided into
parts. The first phase is the Encrypting Phase, which deals with the process of converting
the actual secret message into cipher text using the AES algorithm. In the second phase
which is the Embedding Phase, the cipher text is embedded into any part of the secret
image that is to be sent. Third phase is the Hiding Phase, where steganography is
performed on the output image of Embedding Phase and other parts of the image where the
parts are camouflaged by another image using least significant bit replacement. These
individual parts are sent to the concerned receiver. At the receivers end decryption of Hiding
phase and Embedding Phase takes place respectively. The parts obtained are stitched
together using k nearest method. Using SIFT features the quality of the image is improved.


Keywords


Cryptography, image steganography, image stitching.

Full Text:

PDF

References


â€Automatic Panoramic Image Stitching using

Invariant Featuresâ€, Matthew Brown and

David G. Lowe of Computer Science,

University of British Columbia, Vancouver,

Canada.

â€High payload using mixed codebooks of

Vector Quantizationâ€, H. B. Kekre, Tanuja

K. Sarode, Archana Athawale, Kalpana

Sagvekar

â€Steganography Using Dictionary Sort on

Vector Quantized Codebookâ€,Dr. H.B.

Kekre, Archana Athawale, Tanuja Sarode,

Sudeep The pade & Kalpana Sagvekar

International Journal of Computer Science

and Security (IJCSS), Volume (4): Issue (4)

â€H.B. Kekre, Archana Athawale and Pallavi

N.Halarnkar,â€Polynomial Transformation to

improve Capacity of Cover Image For

Information Hiding in Multiple LSBsâ€,

International Journal of Engineering

Research and Industrial

Applications(IJERIA),Ascent Publications,

Volume 2,March 2009,Pune.

â€H.B.Kekre, Archana Athawale and Pallavi

N.Halarnkar,â€Performance Evaluation of

Pixel Value Differencing and Kekre’s

Modified Algorithm for Image Hiding in

Imagesâ€, ACM International Conference on

Advances in Computing, Communication

and Control(ICAC3)2009.

’Proposed System for data hiding using

Cryptography and Steganography *Dipti

Kapoor Sarmah1, Neha Bajpai2

Department of Computer Engineering,

Maharashtra Academy of Engineering,

Pune, INDIA 2Department of Information

Technology, Center of Development of

advance computing, Noida, INDIA.


Refbacks

  • There are currently no refbacks.