Seminar Topics & Project Ideas On Computer Science Electronics Electrical Mechanical Engineering Civil MBA Medicine Nursing Science Physics Mathematics Chemistry ppt pdf doc presentation downloads and Abstract

Full Version: A RSA- DWT Based Visual Cryptographic Steganogrphy Technique
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
A RSA- DWT Based Visual Cryptographic Steganogrphy Technique


[attachment=31171]

INTRODUCTION

In this information era, either a public network or private network, one requires a tool that can allow communicating over these channels and as well providing the security and robustness of the hiding data. Encryption and steganography are the preferred techniques for protecting the transmitted data. In Cryptography, the data is encrypted so that it cannot be understood by anyone else. The encrypted data is unreadable but is not hidden from the eavesdroppers. Though the purpose of cryptography is to protect the data (or information) from unwanted attackers, it does not ensure covertness on the channel. The commonly used encryption schemes include DES (Data Encryption Standard) [1], AES (Advanced Encryption Standard) [2] and RSA [3].



BACKGROUND OF CRYPTOGRPHY

In cryptography, the message is scrambled to make it
meaningless and unintelligible unless the decryption key is
available. It makes no attempt to disguise or hide the encoded
message. Basically, cryptography offers the ability of
transmitting information between persons in a way that
prevents a third party from reading it. Cryptography can also
provide authentication for verifying the identity of someone
or something. There are several ways of classifying
cryptographic algorithms.


EXPERIMENTAL RESULTS

Since the visual detection of stego images is depending on the nature of the image [15] so, varieties of image categories are utilized in the experiments. The experimental image data set consists of 100 JPEG images, which were taken by digital camera. We focused on short messages with length of 3000 bits because they are the most challenging to detect [15].



CONCLUSION
In this paper we used a mixed approach cryptography and steganography is used for data security. By using RSA encryption, ASCII codes corresponding to characters of plain text are converted into 16 bits encrypted codes. Hence it becomes difficult to get original text without knowing decryption keys. Then cipher data is hided into cover image. Average PSNR value of 56 is obtained for 100 images using proposed method. The obtained experimental results indicate that, the proposed method is a good and acceptable scheme for data security. Furthermore, by embedding information in the least significant bits of the DWT domain, the hidden message resides in more robust areas, spread across the entire stego image, and provides better resistance against statistical attacks than other techniques. The future work may focus on the improvement and further development in this technique.