Secured Data Transmission Using Wavelet Based Steganography and Cryptography by Using AES Algorithm

被引:15
|
作者
Reddy, M. Indra Sena [1 ]
Kumar, A. P. Siva [2 ]
机构
[1] RGM Coll Engn & Technol, Nandyal 518501, AP, India
[2] JNT Univ, Coll Engn, JNTUA, Anantapuram 515002, AP, India
关键词
Steganography; cryptography; watermarking; discrete-wavelet; Encryption; Decryption; LSB SUBSTITUTION;
D O I
10.1016/j.procs.2016.05.177
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Steganography and cryptography methods are used together with wavelets to increase the security of data while transmitting through networks. In discrete wavelet transform, "analysis filter bank "can be used for analyzing image signal by passing through it. This filter bank consists of a low pass and a high pass filter at each decomposition stage. The digital watermarking plays an important role in embedding information into a digital image signal, for verification and identity of its owners. In this paper the embedded information is applied as text. Before embedding the text in image, text is encrypted using Advanced Encryption Standard (AES) algorithm. The text can be a sentence or a key with alphabetic words having the length of 8 characters. Using Least Significant Bit (LSB) method, the encrypted text is embedded into the "LL sub-band wavelet decomposed image". The inverse wavelet transform is applied and the resultant image is transmitted to the receiver. Now at the receiver's end, the image transformed using wavelet and encrypted text is extracted by using LSB method. The paper also shows how the AES algorithm is used in decryption of result. (C) 2016 The Authors. Published by Elsevier B.V.
引用
收藏
页码:62 / 69
页数:8
相关论文
共 50 条
  • [1] Steganography using wavelet transform for secured data transmission
    Srinivasu L.N.
    Veeramani V.
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2023, 14 (07) : 9509 - 9527
  • [2] AN EFFICIENT STEGANOGRAPHY ALGORITHM USING VISUAL CRYPTOGRAPHY AND AES ENCRYPTION
    Andi, Velumurugan
    Edeswaran, Logashanmugam
    [J]. IIOAB JOURNAL, 2016, 7 (10) : 22 - 25
  • [3] Secured Transmission of Sensitive Images of Skin Diseases Using Steganography and Cryptography
    Hossain, Kunal
    Jana, Susovan
    Mukherjee, Saswati
    Parekh, Ranjan
    [J]. 2017 IEEE CALCUTTA CONFERENCE (CALCON), 2017, : 95 - 99
  • [4] A Detailed Review Based on Secure Data Transmission Using Cryptography and Steganography
    Varghese, Fredy
    Sasikala, P.
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2023, 129 (04) : 2291 - 2318
  • [5] A Detailed Review Based on Secure Data Transmission Using Cryptography and Steganography
    Fredy Varghese
    P. Sasikala
    [J]. Wireless Personal Communications, 2023, 129 : 2291 - 2318
  • [6] A safe and secured iris template using steganography and cryptography
    Oluwakemi Christiana Abikoye
    Umar Abdulraheem Ojo
    Joseph Bamidele Awotunde
    Roseline Oluwaseun Ogundokun
    [J]. Multimedia Tools and Applications, 2020, 79 : 23483 - 23506
  • [7] A safe and secured iris template using steganography and cryptography
    Abikoye, Oluwakemi Christiana
    Ojo, Umar Abdulraheem
    Awotunde, Joseph Bamidele
    Ogundokun, Roseline Oluwaseun
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (31-32) : 23483 - 23506
  • [8] A Secured Representation of Data Hiding in Wavelet Transform Domain using Video Steganography
    Ramalingam, Mritha
    Isa, Nor
    [J]. INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2016, 13 (6A) : 826 - 834
  • [9] Digital Image Steganography Using Modified LSB and AES Cryptography
    Panwar, Subhash
    Kumar, Mukesh
    Sharma, Sakshi
    [J]. 4TH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS AND CONNECTED TECHNOLOGIES (ICIOTCT), 2019: INTERNET OF THINGS AND CONNECTED TECHNOLOGIES, 2020, 1122 : 366 - 375
  • [10] SECURE AND HIDDEN TEXT USING AES CRYPTOGRAPHY AND LSB STEGANOGRAPHY
    Abood, May Hattim
    Taha, Zahraa Khudhair
    [J]. JOURNAL OF ENGINEERING SCIENCE AND TECHNOLOGY, 2019, 14 (03) : 1434 - 1450