creating an image using encrypted sensitive words

Reshmi.R.V,

Published in International Journal of Advanced Research in Computer Science Engineering and Information Technology

ISSN: 2321-3337          Impact Factor:1.521         Volume:2         Issue:3         Year: 08 April,2014         Pages:199-207

International Journal of Advanced Research in Computer Science Engineering and Information Technology

Abstract

Data hiding is one of the most better data and communication protection by hiding information into a media carrier technology called as stegnography. The actual information is not maintained in its original format is known as cryptography. In our daily life we are sending message through email, mobiles, social medias etc… But sometimes the unauthorized person (hackers) will easily hack our secret message. Now days it’s very difficult to send a secret message from sender to receiver. To provide the solution to this problem this paper provides a high security for sending the secret message from sender to receiver. This paper shows the method of creating an image using encrypted sensitive words. Mainly two methods are used in this “Stegnography, Cryptography”. This application mainly used in defense, business, etc… for sending secret message more securely.

Kewords

Stegnography Cryptography Encryption

Reference

1) Image Steganography and Steganalysis Using Pixel Mapping Method.International Journal of Engineering Research & Technology(IJERT)Vol. 2 Issue 11, November – 2013. 2) Steganography Algorithm to Hide Secret Message inside an Image. 3) Data Hiding in Video Arup Kumar Bhaumik1, Minkyu Choi2, Rosslin J.Robles3, and Maricel O.Balitanas4 International Journal of Database Theory and ApplicationVol. 2, No. 2, June 2009. 4) A Robust Algorithm for Text Detection in Images Julinda Gllavata1, Ralph Ewerth1 and Bernd Freisleben1,2 1SFB/FK 615, University of Siegen, D-57068 Siegen, Germany 2Dept. of Math. & Computer Science, University of Marburg, D-35032 Marburg, Germany juli, ewerth. 5) Image Steganography using DWT and Blowfish Algorithms 1Mrs.Archana S. Vaidya, 2Pooja N. More., 3Rita K. Fegade., 4Madhuri A.Bhavsar., 5Pooja V. Raut. 1Asst. Prof. Department of Computer Engg.GES’s R. H. Sapat College of Engineering, Management Studies and Research, Nashik (M.S.), INDIA. BIOGRAPHY