Secure message exchange using text to image encoding

  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract

    The work focuses mainly on data security problems while transferring data through a network, using text-to-image encryption. This         approach creates an image out of the textual data using steganography, which allows the sender and the intended recipient to hide their confidential data while transmitting through the network. First, binary representations of the text data are made, then the binary data is used to create an image by using it as pixel intensities. This image is then merged with a colour image to obtain the final encrypted image. The main objective of the work is to demonstrate an encryption scheme that is reliable and easy to implement.



  • Keywords

    Text to image encryption, grayscale image, RGB image.

  • References

      [1] Rahulkrishna PK, Eshwari R, Shree Harsha NJ, Divyashree E & Gururaj C, “Enhanced Network Security Using Text to Image Encoding”, International Conference on Smart Sensors and Systems (IC-SSS), (2015).

      [2] Stallings W, Cryptography and Network Security Principles and Practice, 5th Ed, Prentice Hall Publishers, (2011).

      [3] Gonzalez RL & Woods RE, Digital Image Processing, 3rd Ed., Prentice Hall Publishers, (2006).

      [4] Paul AJ & Nair LR, “Matrix based Substitution and Diffusion Procedure for Fast Image Encryption”, International Journal of Computer Applications, Vol.80, No.3, (2013).

      [5] Vidhu S & Dutt K, “Steganography: The Art of Hiding Text in Image using Matlab”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol.4, No.9, (2014).

      [6] Younes MAB & Jantan A, “A new steganography approach for images encryption exchange by using the least significant bit insertion”, International Journal of Computer Science and Network Security, Vol.8, No.6, (2008), pp.247-257.

      [7] EL-Emam. NN, “Embedding a Large Amount of Information Using High Secure Neural Based Steganography Algorithm”, International Journal of Computer, Electrical, Automation, Control and Information Engineering, Vol.2, No: 11, (2008), pp.3806- 3817.

      [8] Kumar A & Sharma R, “A Secure Image Steganography Based on RSA Algorithm and Hash-LSB Technique”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol.3, No.7, (2013), pp.363-372.

      [9] Johnson NF & Jajodia S, “Exploring Steganography: Seeing the Unseen”, IEEE Computer, Vol.31, No.2, (1998), pp.26-34.

      [10] Thangadurai K, “An analysis of LSB based image steganography techniques”, IEEE International Conference Computer, Computer Communication and Informatics (ICCCI), (2014), pp.1-4

      [11] Walia E, Jain P & Navdeep N, “An Analysis of LSB & DCT based Steganography”, Global Journal of Computer Science and Technology, Vol.10, No.1, (2010), pp.4-8.

      [12] Kavitha KK, Koshti A & Dunghav P, “Steganography using least significant bit algorithm”, International Journal of Engineering Research and Applications, Vol.2, No.3, (2012), pp.338-341.







Article ID: 11739
DOI: 10.14419/ijet.v7i2.20.11739

Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.