Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/336980
Title: | Data And Image Hiding Using Combination Of Cryptography Steganography And Embedding Technique |
Researcher: | Manish, Kumar |
Guide(s): | Sunil, Kumar and Harish, Nagar |
Keywords: | Computer Science Engineering and Technology Imaging Science and Photographic Technology |
University: | Sangam University |
Completed Date: | 2021 |
Abstract: | In the today going on technology, for the data exchange the Internet is the most newlinepopular and important medium. With advances of the internet and information newlinetechnology, the digital media has become one of the most popular and best-known newlinedata transfer tools. This digital data includes text, images, audio, video and newlinesoftware transferred via the public network. Most of this digital media takes the newlineform of images and is an important element in various applications such as chat, newlinenews, website, e-commerce, e-mail and e-books. The content is still facing newlinevarious challenges in which including the issues of protection of copyright, newlinemodification, authentication. For the protection of the digital data many newlinetechniques can be used such as the embedding, encryption, data hiding etc. newlineCryptography, Steganography and embedding techniques are widely used to newlinesecure the secret data or information. newlineIn the proposed work the combination of the embedding, hiding and encryption is newlineused to provide more security to the digital data which mean that it provides multi newlinelayers of protection which is very difficult to crack by the unauthorized person. newlineIn proposed work first hide the secret text into the secret image using the DCT newlineSteganography technique and after that get the Stego image that is shown same as newlinethe secret image but it consist of the secret text also. After getting the Stego image newlineapply the XOR embedding technique on Stego image and cover image and get the newlineembedded image. The embedded image showed same as the cover image but it newlineconsist of the stego image also. Now after getting the embedded image calculate newlinethe MSE and PSNR value. For better hiding low MSE and high PSNR value is newlinexxx newlinerequired. In proposed work get the low MSE and high PSNR value then the newlineprevious work done. Now apply the Cryptographic techniques in the embedded newlineimage and get the encrypted image that is totally differ then all the taken images newlineand data. After getting the embedded image also calculate the entropy value. In newlinethis proposed technique three cryptographic |
Pagination: | 13.1 mb |
URI: | http://hdl.handle.net/10603/336980 |
Appears in Departments: | DEPARTMENT OF COMPUTER SCIENCE ENGINEERING |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
10_references.pdf | Attached File | 368 kB | Adobe PDF | View/Open |
11_publications.pdf | 3.55 MB | Adobe PDF | View/Open | |
12_appendix.pdf | 232.86 kB | Adobe PDF | View/Open | |
1_title.pdf | 44.92 kB | Adobe PDF | View/Open | |
2_certificates.pdf | 186.88 kB | Adobe PDF | View/Open | |
3_preliminary pages.pdf | 365.48 kB | Adobe PDF | View/Open | |
4_chapter 1.pdf | 436.57 kB | Adobe PDF | View/Open | |
5_chapter 2.pdf | 337.85 kB | Adobe PDF | View/Open | |
6_chapter 3.pdf | 1.49 MB | Adobe PDF | View/Open | |
7_chapter 4.pdf | 1.9 MB | Adobe PDF | View/Open | |
80_recommendation.pdf | 494.99 kB | Adobe PDF | View/Open | |
8_chapter 5.pdf | 1.94 MB | Adobe PDF | View/Open | |
9_chapter 6.pdf | 2.05 MB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: