IMAGE PROCESSING BASED SECURITY ANALYSIS
Abstract
Using image stitching and image steganography security can be provided to any
image which has to be sent over the network or transferred using any electronic mode.
There is a message and a secret image that has to be sent. The secret image is divided into
parts. The first phase is the Encrypting Phase, which deals with the process of converting
the actual secret message into cipher text using the AES algorithm. In the second phase
which is the Embedding Phase, the cipher text is embedded into any part of the secret
image that is to be sent. Third phase is the Hiding Phase, where steganography is
performed on the output image of Embedding Phase and other parts of the image where the
parts are camouflaged by another image using least significant bit replacement. These
individual parts are sent to the concerned receiver. At the receivers end decryption of Hiding
phase and Embedding Phase takes place respectively. The parts obtained are stitched
together using k nearest method. Using SIFT features the quality of the image is improved.
Keywords
Full Text:
PDFReferences
â€Automatic Panoramic Image Stitching using
Invariant Featuresâ€, Matthew Brown and
David G. Lowe of Computer Science,
University of British Columbia, Vancouver,
Canada.
â€High payload using mixed codebooks of
Vector Quantizationâ€, H. B. Kekre, Tanuja
K. Sarode, Archana Athawale, Kalpana
Sagvekar
â€Steganography Using Dictionary Sort on
Vector Quantized Codebookâ€,Dr. H.B.
Kekre, Archana Athawale, Tanuja Sarode,
Sudeep The pade & Kalpana Sagvekar
International Journal of Computer Science
and Security (IJCSS), Volume (4): Issue (4)
â€H.B. Kekre, Archana Athawale and Pallavi
N.Halarnkar,â€Polynomial Transformation to
improve Capacity of Cover Image For
Information Hiding in Multiple LSBsâ€,
International Journal of Engineering
Research and Industrial
Applications(IJERIA),Ascent Publications,
Volume 2,March 2009,Pune.
â€H.B.Kekre, Archana Athawale and Pallavi
N.Halarnkar,â€Performance Evaluation of
Pixel Value Differencing and Kekre’s
Modified Algorithm for Image Hiding in
Imagesâ€, ACM International Conference on
Advances in Computing, Communication
and Control(ICAC3)2009.
’Proposed System for data hiding using
Cryptography and Steganography *Dipti
Kapoor Sarmah1, Neha Bajpai2
Department of Computer Engineering,
Maharashtra Academy of Engineering,
Pune, INDIA 2Department of Information
Technology, Center of Development of
advance computing, Noida, INDIA.
Refbacks
- There are currently no refbacks.