Subscribe Now Subscribe Today
Science Alert
 
FOLLOW US:     Facebook     Twitter
Blue
   
Curve Top
Research Journal of Information Technology
  Year: 2013 | Volume: 5 | Issue: 3 | Page No.: 341-351
DOI: 10.3923/rjit.2013.341.351
Why Image Encryption for Better Steganography
Rengarajan Amirtharajan, P. Archana and J.B.B. Rayappan

Abstract:
In this study, declared a new fangled methodology for image encryption using one of the cryptographic modes. The need for protection rises phenomenally with greater than before custom of internet and online communication. It is challenging and crucial to safeguard the information be it any multimedia file online and to check illegal entrée’. Naturally images play a huge role in doing so in so called cryptographic and steganographic techniques. The former is very primeval but interestingly is still in use and lends a helping hand to realize secret sharing. Of the various fruits of cryptographic techniques, image encryption is awe-inspiring having multiple proficiencies possessing countless platforms to explore. This paper paints yet another advantageous model to image encryption where the image undergoes exceptional echelon of shuffling, scrambling and encrypting customs with Cipher Block Chaining (CBC) cryptographic mode as the brain. The analytical results demonstrate that this proposal is unsurpassed in the grounds of Correlation, BER, UACI, NPCR, PSNR and MSSIM. The encrypted images and their corresponding histograms are publicized to prove the paper’s purpose creation.
PDF Fulltext XML References Citation Report Citation
 RELATED ARTICLES:
  •    Horse DNA Runs on Image: A Novel Road to Image Encryption
  •    Image Merger Encryptor: A Chaotic and Chebyshev Key Approach
  •    Chain of Shuffling and Chaos: A Tied Encryptic Approach
  •    Light Weight Steganography on RISC Platform-Implementation and Analysis
  •    Brownian Motion of Binary and Gray-Binary and Gray Bits in Image for Stego
  •    Inverted Pattern in Inverted Time Domain for Icon Steganography
  •    Pixel Authorized by Pixel to Trace with SFC on Image to Sabotage Data Mugger: A Comparative Study on PI Stego
  •    Random Image Steganography and Steganalysis: Present Status and Future Directions
How to cite this article:

Rengarajan Amirtharajan, P. Archana and J.B.B. Rayappan, 2013. Why Image Encryption for Better Steganography. Research Journal of Information Technology, 5: 341-351.

DOI: 10.3923/rjit.2013.341.351

URL: https://scialert.net/abstract/?doi=rjit.2013.341.351

 
COMMENT ON THIS PAPER
 
 
 

 

 
 
 
 
 
 
 
 
 

 
 
 
 
 

       

       

Curve Bottom