Author : Dr.S.Chakaravarthi 1
Date of Publication :11th August 2017
Abstract: Image processing is a new step to Security where we leverage images for hiding information and for other security Objectives. Using image stitching and image steganography security can be provided to any image which has to besent over the network or transferred using any electronic mode. There is a message and a secret image that has to be sent. The secret image is divided into parts. The first phase is the Encrypting Phase, which deals with the process of converting the actual secret message into ciphertext using the AES algorithm. In the second phase which is the Embedding Phase, the cipher text is embedded into any part of the secret image that is to be sent. Third phase is the Hiding Phase, where steganography is performed on the output image of Embedding Phase and other parts of the image where the parts are camouflaged by another image using least significant bit replacement. These individual parts are sent to the concerned receiver. At the receivers end decryption of Hiding phase and Embedding Phase takes place respectively. The parts obtained are stitched together using k nearest method. Using SIFT features the quality of the image is improved.
Reference :
-
- Automatic Panoramic Image Stitching using Invariant Features”, Matthew Brown and David G. Lowe of Computer Science, University of Bri
- High payload using mixed codebooks of Vector Quantization”, H. B. Kekre, Tanuja K. Sarode, ArchanaAthawale, KalpanaSagvekartish Columbia, Vancouver, Canada
- High payload using mixed codebooks of Vector Quantization”, H. B. Kekre, Tanuja K. Sarode, ArchanaAthawale, KalpanaSagvekar
- Steganography Using Dictionary Sort on Vector Quantized Codebook, Dr.H.B.Kekre, ArchanaAthawale,TanujaSarode,SudeepThepade&Kalpan aSagvekarInternational Journal of Computer Science and Security (IJCSS), Volume (4): Issue (4) 392
- H.B.Kekre,ArchanaAthawale and Pallavi N. Halarnkar, Polynomial Transformation to improve Capacity of Cover Image For Information Hiding in Multiple LSBs, International Journal of Engineering Research and Industrial Applications(IJERIA),Ascent Publications,Volume 2,March 2009,Pune.
- H.B.Kekre,ArchanaAthawale and Pallavi N.Halarnkar, Performance Evaluation of Pixel Value Differencing and Kekre’s Modified Algorithm for Image Hiding in Images”,ACM International Conference on Advances in Computing,Communication and Control(ICAC3)2009.
- Proposed System for data hiding using Cryptography and Steganography *Dipti Kapoor Sarmah1, Neha Bajpai2 1Department of Computer Engineering, Maharashtra Academy of Engineering, Pune, INDIA 2Department of Information Technology, Centre of Development of advance computing,Noida, INDIA