IRJET- Advance Image Encryption using Cryptography and Steganography: A Combine Approach

Page 1

International Research Journal of Engineering and Technology (IRJET) Volume: 08 Issue: 03 | Mar 2021

www.irjet.net

e-ISSN: 2395-0056 p-ISSN: 2395-0072

Advance Image Encryption using Cryptography and Steganography: A Combine Approach Sudhans Shekher Panday1, Mohammad Mustafa Ali2, Ankesh Jaiswal3, Amogh agarwall4, Hritik Somvanshi5, Aditya Kumar6 1Prof.

CSE Dept, Lovely Professional University, Jalandhar, India 2-6Lovely Professional University, Jalandhar, India

-----------------------------------------------------------------***------------------------------------------------------------------

for encrypting secret data in order to implement steganography.

Abstract - This paper proposes a security technique for

confidential data that combines three techniques: first, image compression based on wavelet transformation, which compresses the confidential image and reduces its size, and second, cryptography based on symmetric key, which encrypts the confidential image, and the third method is steganography, which uses the least significant bit (LSB) to embed encrypted data within a cover picture. As a result, the suggested technique's goal is to ensure that the reconstructed cover image is secure and of high quality. Index Terms- Encryption, Cryptography, Steanography, Security, Blow fish, LSB AAlgorithm.

I.

INTRODUCTION

Information security is incomplete without steganography and cryptography. Cryptography is the science of encrypting and decrypting data using mathematics; the data is converted into some other gibberish form, and then the encrypted data is sent. Steganography is the practice of encoding/embedding secret information in cover media in such a manner that an eavesdropper will not suspect you. When a message is encrypted and hidden using a steganographic method, it adds an extra layer of security and eliminates the risk of the hidden message being discovered. The main goal of this paper is to provide two levels of security through a two-step process in which the message bits are scrambled in a random A 2D Arnold Cat Map is used to generate the letter, which is then encrypted and covered behind a cover image using the basic LSB technique. Two common quality measurements to measure the difference between the cover-image and the stego-image are MSE (Mean Square Error) and PSNR (Peak Signal to Noise Ratio). The results showed that the proposed technique outperforms simple LSB in terms of PSNR and MSE.

II.

Information protection can be described as a set of measures, procedures, and techniques used to prevent and detect unauthorized access to computer network resources, as well as troubleshooting, disclosure, perturbation, and modification. Enhancing the work's anonymity, eligibility, and dependability necessitates a significant amount of effort to enhance existing approaches while still testing new ones. As a result, encoding has been proved to be one of the most effective tools for securing information since the ancient Romans used similar techniques to ensure the protection of their valuable knowledge and records. The method of transforming the shape of data into symbols using nonsensical codes is known as data encoding. Identical key cryptography is a method of encoding and decoding that relies entirely on a single key. The same key is used for both the encryption and decryption processes in this process. To communicate the hidden key, the sender and recipient must use a secure connection.

This paper's main goal is to design and develop a secure and efficient symmetric cryptography method © 2021, IRJET

|

Impact Factor value: 7.529

CRYPTOGRAPHY ALGORITHM

|

ISO 9001:2008 Certified Journal

|

Page 3090


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.
IRJET- Advance Image Encryption using Cryptography and Steganography: A Combine Approach by IRJET Journal - Issuu