Journal of Engineering and Applied Sciences

Year: 2018
Volume: 13
Issue: 8 SI
Page No. 6359 - 6364

An Efficient Method for Encryption and Hiding Any File in Color Image

Authors : Baheja K. Shukur, Zaid Rajih Mohammed and Sawsan Hadi

References

Azzawi, H.M., 2014. A proposed method for encrypting data in image by using cryptography technique and steganography. Mansour J., 22: 95-109.
Direct Link  |  

Bailey, K. and K. Curran, 2006. An evaluation of image based steganography methods. Multimedia Tools Appl., 30: 55-88.
Direct Link  |  

Ganesan, P. and R. Bhavani, 2013. A high secure and robust image steganography using dual wavelet and blending model. J. Comput. Sci., 9: 277-284.

Jawad, A. and A. Fawad, 2013. Efficiency analysis and security evaluation of image encryption schemes. Int. J. Video Image Process. Network Secur., 12: 18-31.

Meena, M.K., S. Kumar and N. Gupta, 2011. Image steganography tool using adaptive encoding approach to maximize image hiding capacity. Intl. J. Soft Comput. Eng. IJSCE., 1: 7-11.

Roy, R. and S. Changder, 2016. Quality evaluation of image steganography techniques: A heuristics based approach. Intl. J. Secur. Appl., 10: 179-196.
Direct Link  |  

Sravanthi, G.S., B.S. Devi, S.M. Riyazoddin and M.J. Reddy, 2012. A spatial domain image steganography technique based on plane bit substitution method. Global J. Comput. Sci. Technol. Graphics Vision, 12: 1-8.
Direct Link  |  

Tiwari, N., M. Sandilya and M. Chawla, 2014. Spatial domain image steganography based on security and randomization. Intl. J. Adv. Comput. Sci. Appl., 5: 156-159.
Direct Link  |  

Tomar, G., 2012. Effect of noise on hidden data. Intl. J. Comput. Sci. Commun. Networks, 2: 12-15.
Direct Link  |  

Usha, B.A., N.K. Srinath, S.M. D’souza and K.N. Sangeetha, 2014. Image and audio embedding technique in image steganography using neural networks. Intl. J. Adv. Res. Comput. Commun. Eng., 3: 7720-7725.

Varnan, C.S., A. Jagan, J. Kaur, D. Jyoti and D.S. Rao, 2011. Image quality assessment techniques on spatial domain. Int. J. Comput. Sci. Technol., 2: 177-184.

Venkatraman, S., A. Abraham and M. Paprzycki, 2004. Significance of steganography on data security. Int. Conf. Inform. Technol., 2: 347-351.
Direct Link  |  

Zhu, C., 2012. A novel image encryption scheme based on improved hyperchaotic sequences. Opt. Commun., 285: 29-37.
CrossRef  |  Direct Link  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved