A Novel Framework for Information Hiding and Image Encryption using Least Significant Bit Techniques

Authors

  • H. B. Kekre NMIMS University
  • Tanuja Sarode Mumbai University
  • Pallavi Halarnkar NMIMS University

DOI:

https://doi.org/10.14738/aivp.23.265

Keywords:

Image security, Information Hiding, Steganography, Image Encryption, Image Scrambling.

Abstract

Security of Digital Images is utmost important. Nowadays not only data but also digital images are increasing in a huge number. Good encryption techniques are always in need. In this paper we have proposed a Novel Framework, which is a combination of Information Hiding and Image Scrambling. The proposed framework is one of its kind and doesn’t resemble to any existing frameworks in literature. For Image scrambling R-Prime Shuffle technique has been  used.

References

. Mielikainen, Jarno. LSB matching revisited. Signal Processing Letters, IEEE 13, no. 5 (2006) .p. 285-287.

. Battisti, F., M. Carli, A. Neri, and K. Egiaziarian. A Generalized Fibonacci LSB Data Hiding Technique. Computers and Devices for Communication (CODEC-06), Institute of Radio Physics and Electronics, University of Calcutta International Conference on. 2006.

. Dey, Sandipan, Ajith Abraham, and Sugata Sanyal. An LSB data hiding technique using prime numbers. In Information Assurance and Security, 2007. IAS 2007. Third International Symposium on,. IEEE, 2007. p. 101-108

. Kekre, H. B., and Archana A. Athawale. Personal Data Ingrain and Regain., NCA, FCRCE, Bandra (W), Mumbai, 16th-17th May (2008).National Conference on Algorithms p. 88-93

. Kekre, H. B., Archana A. Athawale, and Sudeep D. Thepade. Clandestine Data Entrenching and Salvaging. In National Conference on Information and Communication Technology 29th Feb and 1st Mar, NCICT-08.p. 1-7

. Biswas, Rajib, Sayantan Mukherjee, and Samir Kumar Bandyopadhyay. DCT Domain Encryption in LSB Steganography. In Computational Intelligence and Communication Networks (CICN), 2013 5th International Conference on,. IEEE, 2013. p. 405-408

. Zhang, Hai-Yan. A new image scrambling algorithm based on queue transformation. In Machine Learning and Cybernetics, 2007 International Conference on, vol. 3, IEEE, 2007. p. 1526-1530.

. Li, Min, Ting Liang, and Yu-jie He. Arnold Transform Based Image Scrambling Method. Multimedia Tecnhnology (ICMT 2013) International Conference on .2013. p.1309-1316

. Kekre, H. B., Tanuja Sarode, and Pallavi Halarnkar. Image Scrambling using R-Prime Shuffle. IJAREEIE, International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering.2013. 2(8). p.4070-4076

. Kekre, H. B., Tanuja Sarode, and Pallavi Halarnkar. Image Scrambling using R-Prime Shuffle on Image and Image Blocks. IJARCCE. International Journal of Advanced Research in Computer and Communication Engineering. 2014. 3(2). p.5471-5476.

. Yongjie, Tan, and Zhou Wengang. Image scrambling degree evaluation algorithm based on grey relation analysis. In Computational and Information Sciences (ICCIS), 2010 International Conference on, IEEE, 2010 p. 511-514.

. Yun-Peng, Zhang, Liu Wei, Cao Shui-ping, Zhai Zheng-jun, Nie Xuan, and Dai Wei-di. Digital image encryption algorithm based on chaos and improved DES. In Systems, Man and Cybernetics, 2009. SMC 2009. IEEE International Conference on, IEEE, 2009.p. 474-479.

. Shreef, Mohammed A., and Haider K. Hoomod. Image Encryption Using Lagrange-Least Squares Interpolation. (IJACSIT). International Journal of Advanced Computer Science and Information Technology. 2013 2(4).p. 35-55.

. Shah, Jolly, and Vikas Saxena. Performance Study on Image Encryption Schemes. (IJCSI) International Journal of Computer Science. 2011. 8(4).p.349-355.

. Samanta, Sabyasachi, Saurabh Dutta, and Goutam Sanyal. An enhancement of security of image using permutation of RGB-components. In Electronics Computer Technology (ICECT), 2011 3rd International Conference on, vol. 2, IEEE, 2011. p. 404-408.

. Saini, Jaspal Kaur, and Harsh K. Verma. A hybrid approach for image security by combining encryption and steganography. In Image Information Processing (ICIIP), 2013 IEEE Second International Conference on, IEEE, 2013. p. 607-611.

. Kekre, H. B., Tanuja Sarode, and Pallavi Halarnkar. Performance Evaluation of Digital Image Encryption Using Discrete Random Distributions and MOD Operator. IOSR-JCE. IOSR Journal of Computer Engineering. 2014. 16(2).Ver V. p.54-68.

. Dey, Somdip. "SD-AEI: An advanced encryption technique for images." InDigital Information Processing and Communications (ICDIPC), 2012 Second International Conference on, pp. 68-73. IEEE, 2012.

Downloads

Published

2014-06-30

How to Cite

Kekre, H. B., Sarode, T., & Halarnkar, P. (2014). A Novel Framework for Information Hiding and Image Encryption using Least Significant Bit Techniques. European Journal of Applied Sciences, 2(3), 10–25. https://doi.org/10.14738/aivp.23.265