Secure message exchange using text to image encoding

  • Authors

    • Swastik Barik
    • J Manikanta Sai
    • Ch Prasannanjaneyulu Reddy
    • P Kalyan Chakravarthy
    2018-04-18
    https://doi.org/10.14419/ijet.v7i2.20.11739
  • Text to image encryption, grayscale image, RGB image.
  • The work focuses mainly on data security problems while transferring data through a network, using text-to-image encryption. This         approach creates an image out of the textual data using steganography, which allows the sender and the intended recipient to hide their confidential data while transmitting through the network. First, binary representations of the text data are made, then the binary data is used to create an image by using it as pixel intensities. This image is then merged with a colour image to obtain the final encrypted image. The main objective of the work is to demonstrate an encryption scheme that is reliable and easy to implement.

     

     

  • References

    1. [1] Rahulkrishna PK, Eshwari R, Shree Harsha NJ, Divyashree E & Gururaj C, “Enhanced Network Security Using Text to Image Encodingâ€, International Conference on Smart Sensors and Systems (IC-SSS), (2015).

      [2] Stallings W, Cryptography and Network Security Principles and Practice, 5th Ed, Prentice Hall Publishers, (2011).

      [3] Gonzalez RL & Woods RE, Digital Image Processing, 3rd Ed., Prentice Hall Publishers, (2006).

      [4] Paul AJ & Nair LR, “Matrix based Substitution and Diffusion Procedure for Fast Image Encryptionâ€, International Journal of Computer Applications, Vol.80, No.3, (2013).

      [5] Vidhu S & Dutt K, “Steganography: The Art of Hiding Text in Image using Matlabâ€, International Journal of Advanced Research in Computer Science and Software Engineering, Vol.4, No.9, (2014).

      [6] Younes MAB & Jantan A, “A new steganography approach for images encryption exchange by using the least significant bit insertionâ€, International Journal of Computer Science and Network Security, Vol.8, No.6, (2008), pp.247-257.

      [7] EL-Emam. NN, “Embedding a Large Amount of Information Using High Secure Neural Based Steganography Algorithmâ€, International Journal of Computer, Electrical, Automation, Control and Information Engineering, Vol.2, No: 11, (2008), pp.3806- 3817.

      [8] Kumar A & Sharma R, “A Secure Image Steganography Based on RSA Algorithm and Hash-LSB Techniqueâ€, International Journal of Advanced Research in Computer Science and Software Engineering, Vol.3, No.7, (2013), pp.363-372.

      [9] Johnson NF & Jajodia S, “Exploring Steganography: Seeing the Unseenâ€, IEEE Computer, Vol.31, No.2, (1998), pp.26-34.

      [10] Thangadurai K, “An analysis of LSB based image steganography techniquesâ€, IEEE International Conference Computer, Computer Communication and Informatics (ICCCI), (2014), pp.1-4

      [11] Walia E, Jain P & Navdeep N, “An Analysis of LSB & DCT based Steganographyâ€, Global Journal of Computer Science and Technology, Vol.10, No.1, (2010), pp.4-8.

      [12] Kavitha KK, Koshti A & Dunghav P, “Steganography using least significant bit algorithmâ€, International Journal of Engineering Research and Applications, Vol.2, No.3, (2012), pp.338-341.

      [13] http://searchsecurity.techtarget.com/

      [14] http://sites.google.com/site/learnimagej/image-processing/what-is-a-digital-image/

      [15] http://www.wikipedia.org/

  • Downloads

  • How to Cite

    Barik, S., Manikanta Sai, J., Prasannanjaneyulu Reddy, C., & Kalyan Chakravarthy, P. (2018). Secure message exchange using text to image encoding. International Journal of Engineering & Technology, 7(2.20), 30-32. https://doi.org/10.14419/ijet.v7i2.20.11739