Separable Data Hiding Using AES Algorithm

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Separable Reversible Data Hiding Using Compression in Encrypted Image

In this paper, the problem of transmitting redundant data over an insecure, bandwidth-constrained communications channel is discussed. A content owner encrypts the original uncompressed image using an encryption key. Then, a data-hider may compress the least significant bits of the encrypted image using a data-hiding key to create a sparse space to accommodate some additional data. Using data h...

متن کامل

An Approach Towards Separable Lossy Data Hiding

Communication over the internet is facing some problems such as data security, copyright control, authentication etc. Here we introduce a novel scheme for separable data hiding when lossy image used as a cover media. This paper illustrates the various objectives of implementing separable lossy data hiding technique. The system is consists of three steps in the first step encryption of the cover...

متن کامل

Symmetric Key Cryptography on Images in AES Algorithm and Hiding Data Losslessly

Reversible (lossless) data embedding (hiding) has drawn lots of interest recently. Being reversible, the original cover content can be completely restored. This paper proposes a novel reversible data hiding scheme with a lower computational complexity and can be used in applications where both the image and the hidden information is highly confidential. It consists of three phases –AES image en...

متن کامل

A Lossless Data Hiding Technique based on AES-DWT

In this paper we propose a new data hiding technique. The new technique uses steganography and cryptography on images with a size of 256x256 pixels and an 8-bit grayscale format. There are design restrictions such as a fixed-size cover image, and reconstruction without error of the hidden image. The steganography technique uses a Haar-DWT (Discrete Wavelet Transform) with hard thresholding and ...

متن کامل

Data Transmission or Mailing on Security Basis Using AES Algorithm

The paper highlights the security needed door transmission of data on a wireless network, with the technology moving forward wireless communications has grown enormously. It is necessary to provide security for wireless data transfer as it is more vulnerable to the security attacks .70% of the online data transfer is in the images This implies it is important to provide security to text as well...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IJARCCE

سال: 2015

ISSN: 2278-1021

DOI: 10.17148/ijarcce.2015.4349