首页    期刊浏览 2024年12月02日 星期一
登录注册

文章基本信息

  • 标题:Image Security System using Encryption and Steganography
  • 本地全文:下载
  • 作者:Pooja Rani ; Apoorva Arora
  • 期刊名称:International Journal of Innovative Research in Science, Engineering and Technology
  • 印刷版ISSN:2347-6710
  • 电子版ISSN:2319-8753
  • 出版年度:2015
  • 卷号:4
  • 期号:6
  • 页码:3860
  • DOI:10.15680/IJIRSET.2015.0406008
  • 出版社:S&S Publications
  • 摘要:The image security on internet transfers is the concern of the hour as the breaching attacks into theimage databases are rising every year. The hackers take advantage of the stolen personal and important images to fulfilltheir dangerous and unethical intentions. The image data theft can be used to defame a person on the internet by postingthe illegal and unacceptable images of that person (internet user). Hence the images transfers have to be secure toensure the privacy of the user’s image data. In this research, a number of image security systems have been studied toevaluate the research gap. Majority of the existing image security systems are not up to date to protect against the latestbreaching attacks. So, we have proposed an effective and robust image security framework particularly designed for theimages. The proposed has been designed and implemented using MATLAB. In this research, a hybrid image securityframework has been proposed to overcome the problem stated earlier, which will be implemented by combiningvarious techniques together to achieve the image security goal. The techniques included in the combination would beimage compression, cryptography and steganography. DWT compression has been used, because it is a strongercompression algorithm. The steganographed image would be compressed to reduce its size. Blowfish encryptionalgorithm would be used for the encryption purposes. It offers maximum throughput (faster) and also energy efficient.Compressed image would be encrypted to enhance the image security. Real image will be hidden into another image. Acluster based steganographic technique will be used. Real image and face image would be analyzed, and the real imagewould be embedded in those areas of face image, where color schemes of the real image and face image would be mostsimilar. Kmeans or Hierarchical clustering would be used as a clustering technique. An all new comparative analysistechnique would be applied to make the comparison between real image and base image on the basis of color patterns.
  • 关键词:Transfers Image Security; Image compression; Image steganography; Image encryption; image.
国家哲学社会科学文献中心版权所有