Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Separable Information hiding by Embedding Keys

Author : Hariharan M 1 Chandramouli A 2 Pradeepkumar J 3 Elakiya R 4

Date of Publication :7th March 2015

Abstract: A rising in E-Commerce market is seen in recent time throughout the globe. With ever increasing quality of online searching, Debit or mastercard fraud and private data security area unit major considerations for purchasers, merchants and banks specifically within the case of CNP (Card Not Present). This paper presents a replacement approach for providing restricted data solely that's necessary for fund transfer throughout on-line searching thereby safeguarding client knowledge and increasing client confidence and preventing fraud. the tactic uses combined application of Modified Steganography and visual cryptography for this purpose.The proposed method aims at encrypting a JPEG bitstream into a properly systematic structure, and a secret message is embedded into the encrypted bitstream by modifying the JPEG stream. Usable bits suitable for data hiding is identified so that the encrypted bitstream carrying secret data can be decoded correctly.The cofidental message bits are encoded with error correction codes to achieve a data extraction and image recovery. The encryption and embedding are managed by encryption and embedding keys respectively.

Reference :

    1. Zhenxing Qian, Xinpeng Zhang, and Shuozhong Wang, ‖Reversible Data Hiding in Encrypted JPEG Bitstream‖,‖ IEEE TRANSACTIONS ON MULTIMEDIA,vol. 16, no. 5,August 2014‖.
    2. Souvik Roy and P. Venkateswaran,‖Online Payment System using Steganography and Visual Cryptography‖,‖ 2014 IEEE on Electrical, Electronics and Computer Science‖.
    3. K.Thamizhchelvy, G.Geetha, ―E-Banking Security: Mitigating Online Threats Using Message Authentication Image (MAI) Algorithm,‖Proceedings of 2012 International Conference on Computing Sciences(ICCS), pp. 276 – 280, 2013
    4. Juan Chen,Chuanxiong Guo,―Online Detection and Prevention of Phishing Attacks,‖ Proceedings of First International Conference on Communications and Networking in China (ChinaCom '06), pp. 1 - 7,Beijing, China, 2010
    5. Do Van Tuan, Tran Dang Hien,Pham Van At,‖ International Journal of Computer Science and Information Security”,Vol. 10, No. 8, August 2013.
    6. ShengDun Hu, KinTak U,‖A Novel Video Steganography based on Non-uniform Rectangular Partition‖,‖IEEE International Transaction on Computational Science and Engineering CSE/ISPA‖.
    7. Weiming Zhang, Biao Chen, and Nenghai Yu,‖ Improving Various Reversible Data Hiding Schemes via Optimal Codes for Binary Covers‖,IEEE Transaction on Image Processing, Vol. 21, no. 6, June 2012.
    8. Xiaolong Li, Bin Yang, and Tieyong Zeng,‖Efficient ReversibleWatermarking Based on Adaptive Prediction-Error Expansion and Pixel Selection‖, IEEE Transaction on Image Processing, vol.20, no. 12,December 2011.
    9. Zhicheng Ni, Yun-Qing Shi, Nirwan Ansari, and Wei Su,‖ Reversible Data Hiding‖, IEEE Transactions on Circuits and Systems for Video Technology, vol. 16,no. 3, March 2006.
    10. Diljith M. Thodi and Jeffrey J. Rodríguez,”Expansion Embedding Techniques for Reversible Watermarking‖, IEEE Transaction on Image Processing, vol.16, no.3, March 2007

Recent Article