Published in International Journal of Advanced Research in Electronics, Communication & Instrumentation Engineering and Development
ISSN: 2347 -7210 Impact Factor:1.9 Volume:2 Issue:2 Year: 26 June,2014 Pages:29-34
Steganography and Cryptography are two popular way of sending information in a secret way. The secret information to be transmitted is first encrypted into unreadable information using cryptography technique which is performed using chaotic algorithm.Next the encrypted information is covered with an image is known as stego-image.Finally the stego-image can be transmitted without revealing the secret information by the process called steganography which is performed by using APPM.Thus by using this two method we can achieve a secure communication.
Scrambling encryption, adaptive arithmetic coding, mapping, assembler, encrypting data, embedding, extraction and decryption.
[1] N. K.Pareek, Vinod Patidar ,K.K.Sud, (2006),"Image encryption using chaotic logistic map" ,IEEE Transactions on image and vision computing, vol. 24, no. 9, pp. 926-934. [2] RakeshS,AjitkumarA,Kallar,Shadakshari B.C AnnappaB, (20 12) "Image encryption using block based uniform scrambling and chaotic logistic mapping "International Journal on Cryptography and Information Security (IJCIS),VoI.2, No.1.pp-49-57. [3] C.K.Chan and L. M. Cheng, (2004), "Hiding data in images by simple LSB substitution," Pattern Recognit., vol. 37, no. 3, pp. 469-474, 2004. [4] Xinpeng Zhang and Shuozhong Wang , (2006)"Efficient steganographic embedding by exploiting modification direction" IEEE Commun. Lett., vol. 10, no. 11,pp. 781-783, Nov. [5] Andrew Ker, (2005) "steganalysis of LSB matching in grayscale images" IEEE signal processing letters , vol. 12, no. 6, pp. 441-444, Jun. [6] R.M.Chao, H.C.Wu, C.C.Lee and Y.P.Chu (2009)" A novel image data hiding scheme with diamond encoding" EURASIPJ.Inf.Security,DOI.0.1155/2009/658047, Article I D 658047. [7] Wien Hong and Tung-Shou ehen , (2012), "A noval data embedding method using adaptive pixel pair matching "IEEE transactions on IEEE transactions on information forensics and security, vol. 7, NmblingO.l,February.