Subscribe Now Subscribe Today
Science Alert
Curve Top
Research Journal of Information Technology
  Year: 2013 | Volume: 5 | Issue: 3 | Page No.: 341-351
DOI: 10.17311/rjit.2013.341.351
Facebook Twitter Digg Reddit Linkedin StumbleUpon E-mail

Why Image Encryption for Better Steganography

Rengarajan Amirtharajan, P. Archana and J.B.B. Rayappan

In this study, declared a new fangled methodology for image encryption using one of the cryptographic modes. The need for protection rises phenomenally with greater than before custom of internet and online communication. It is challenging and crucial to safeguard the information be it any multimedia file online and to check illegal entrée’. Naturally images play a huge role in doing so in so called cryptographic and steganographic techniques. The former is very primeval but interestingly is still in use and lends a helping hand to realize secret sharing. Of the various fruits of cryptographic techniques, image encryption is awe-inspiring having multiple proficiencies possessing countless platforms to explore. This paper paints yet another advantageous model to image encryption where the image undergoes exceptional echelon of shuffling, scrambling and encrypting customs with Cipher Block Chaining (CBC) cryptographic mode as the brain. The analytical results demonstrate that this proposal is unsurpassed in the grounds of Correlation, BER, UACI, NPCR, PSNR and MSSIM. The encrypted images and their corresponding histograms are publicized to prove the paper’s purpose creation.
PDF Fulltext XML References Citation Report Citation
  •    Horse DNA Runs on Image: A Novel Road to Image Encryption
  •    Image Merger Encryptor: A Chaotic and Chebyshev Key Approach
  •    Chain of Shuffling and Chaos: A Tied Encryptic Approach
  •    Light Weight Steganography on RISC Platform-Implementation and Analysis
  •    Brownian Motion of Binary and Gray-Binary and Gray Bits in Image for Stego
  •    Inverted Pattern in Inverted Time Domain for Icon Steganography
  •    Pixel Authorized by Pixel to Trace with SFC on Image to Sabotage Data Mugger: A Comparative Study on PI Stego
  •    Random Image Steganography and Steganalysis: Present Status and Future Directions
How to cite this article:

Rengarajan Amirtharajan, P. Archana and J.B.B. Rayappan, 2013. Why Image Encryption for Better Steganography. Research Journal of Information Technology, 5: 341-351.

DOI: 10.17311/rjit.2013.341.351






Curve Bottom