scispace - formally typeset
Open AccessJournal ArticleDOI

Hide image and text using lsb, dwt and rsa based on image steganography

Swati Bhargava, +1 more
- 01 Feb 2019 - 
- Vol. 9, Iss: 3, pp 1940-1946
TLDR
New strategies wherein cryptography and steganography are mixed to scramble the information and in addition to cover the insights in some other medium through image processing (IP) are presented.
Abstract
In this modern era, where technology is increasing at rapid pace and made all day new developments, security is of highest priority. To protect facts into the unrecognizable form diverse technique are used for records hiding like steganography and cryptography techniques have been advanced. This paper securing the image by way of encryption is completed by LSB bits, DWT and RSA algorithm. This paper additionally presents new strategies wherein cryptography and steganography are mixed to scramble the information and in addition to cover the insights in some other medium through image processing (IP). The encrypted picture can be hiding in some other image by way of the use of LSB bits, DWT strategies so that the secret’s message exists. RSA algorithm applied, receiver will use his/her private key because the secret data have been encrypted by recipient public key. Hide encrypted image in the cover image by DWT. Extract encrypted image from cover image and decrypt text by DWT. The proposed scheme is implemented in MATLAB platform the use of preferred cryptography and steganography set of regulations. Calculate PSNR and MSE. Also calculate the entropy of cover image and stego image. This method is secure for communication in the digital world with the digital data transmission.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Securing matrix counting-based secret-sharing involving crypto steganography

TL;DR: In this paper, two particular secret sharing techniques known as counting-based secret sharing and matrix-based Secret Sharing were studied. And the results demonstrated that the use of steganography and encryption along with the matrix based secret sharing did not affect the quality of operation nor compromised the security of information presenting attractive remarks.
Journal ArticleDOI

Increasing Participants Using Counting-Based Secret Sharing via Involving Matrices and Practical Steganography

TL;DR: In this article, a matrix-based counting-based secret sharing scheme was proposed to accommodate a high number of participants, where the secret key can be shared in different forms among several authorized participants where a certain number of which is required to retrieve the original secret.
Journal ArticleDOI

Securing matrix counting-based secret-sharing involving crypto steganography

TL;DR: In this article , two particular secret sharing techniques known as counting-based secret sharing and matrix-based private key sharing were studied, and the results demonstrated that the use of steganography and encryption along with matrix based secret sharing did not affect the quality of operation nor compromised the security of information presenting attractive remarks.
Proceedings ArticleDOI

Data Encryption & Decryption Using Steganography

TL;DR: This paper proposes secure steganography methods i.e. Secure base LSB method, Neural Networks & Fuzzy logic, and checks their using PSNR and MSE data of the methods.
Proceedings ArticleDOI

Enhanced Digital Image and Text Data Security Using Hybrid Model of LSB Steganography and AES Cryptography Technique

TL;DR: In this article , a hybrid model of LSB steganography and AES cryptography is presented to enhance the security of the digital image and text that is undeniably challenging to break by the unapproved person.
References
More filters
Posted Content

Proposed System for data hiding using Cryptography and Steganography Proposed System for data hiding using Cryptography and Steganography

TL;DR: This project is developing a system where they develop a new technique in which Cryptography and Steganography are used as integrated part along with newly developed enhanced security module.
Proceedings ArticleDOI

An improved image steganography technique based on MSB using bit differencing

TL;DR: A novel image stegnography technique based on most significant bits (MSB) of image pixels is proposed that ensures significant improvements in signal to noise ratio and is not only secure, but computationally efficient as well.
Proceedings ArticleDOI

Multiple layer text security using variable block size cryptography and image steganography

TL;DR: The aim of this work is to design an algorithm for text security as well as improve MSE and PSNR value and the data hiding capacity is also considered.

Modern Steganographic technique: A survey

TL;DR: In this paper, various steganographic techniques are analyzed and an overview of steganography, different methods of steGANography, its applications, how it is different from cryptography is given.
Proceedings ArticleDOI

Image Sharing and Recovering Based on Chinese Remainder Theorem

TL;DR: This paper investigates image sharing based on the concept of (k, n)-threshold strategy according to the Chinese remainder theorem (CRT), which discusses existing CRT-based sharing methods, proposes a simple CRt-based method and illustrates (3,5)- threshold results for RGB color images.
Related Papers (5)