Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/336980
Title: Data And Image Hiding Using Combination Of Cryptography Steganography And Embedding Technique
Researcher: Manish, Kumar
Guide(s): Sunil, Kumar and Harish, Nagar
Keywords: Computer Science
Engineering and Technology
Imaging Science and Photographic Technology
University: Sangam University
Completed Date: 2021
Abstract: In the today going on technology, for the data exchange the Internet is the most newlinepopular and important medium. With advances of the internet and information newlinetechnology, the digital media has become one of the most popular and best-known newlinedata transfer tools. This digital data includes text, images, audio, video and newlinesoftware transferred via the public network. Most of this digital media takes the newlineform of images and is an important element in various applications such as chat, newlinenews, website, e-commerce, e-mail and e-books. The content is still facing newlinevarious challenges in which including the issues of protection of copyright, newlinemodification, authentication. For the protection of the digital data many newlinetechniques can be used such as the embedding, encryption, data hiding etc. newlineCryptography, Steganography and embedding techniques are widely used to newlinesecure the secret data or information. newlineIn the proposed work the combination of the embedding, hiding and encryption is newlineused to provide more security to the digital data which mean that it provides multi newlinelayers of protection which is very difficult to crack by the unauthorized person. newlineIn proposed work first hide the secret text into the secret image using the DCT newlineSteganography technique and after that get the Stego image that is shown same as newlinethe secret image but it consist of the secret text also. After getting the Stego image newlineapply the XOR embedding technique on Stego image and cover image and get the newlineembedded image. The embedded image showed same as the cover image but it newlineconsist of the stego image also. Now after getting the embedded image calculate newlinethe MSE and PSNR value. For better hiding low MSE and high PSNR value is newlinexxx newlinerequired. In proposed work get the low MSE and high PSNR value then the newlineprevious work done. Now apply the Cryptographic techniques in the embedded newlineimage and get the encrypted image that is totally differ then all the taken images newlineand data. After getting the embedded image also calculate the entropy value. In newlinethis proposed technique three cryptographic
Pagination: 13.1 mb
URI: http://hdl.handle.net/10603/336980
Appears in Departments:DEPARTMENT OF COMPUTER SCIENCE ENGINEERING

Files in This Item:
File Description SizeFormat 
10_references.pdfAttached File368 kBAdobe PDFView/Open
11_publications.pdf3.55 MBAdobe PDFView/Open
12_appendix.pdf232.86 kBAdobe PDFView/Open
1_title.pdf44.92 kBAdobe PDFView/Open
2_certificates.pdf186.88 kBAdobe PDFView/Open
3_preliminary pages.pdf365.48 kBAdobe PDFView/Open
4_chapter 1.pdf436.57 kBAdobe PDFView/Open
5_chapter 2.pdf337.85 kBAdobe PDFView/Open
6_chapter 3.pdf1.49 MBAdobe PDFView/Open
7_chapter 4.pdf1.9 MBAdobe PDFView/Open
80_recommendation.pdf494.99 kBAdobe PDFView/Open
8_chapter 5.pdf1.94 MBAdobe PDFView/Open
9_chapter 6.pdf2.05 MBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: