Separable reversible encrypted data hiding in encrypted image using AES Algorithm and Lossy technique
The field steganography is very much popular technique for sending secrete message and lots of research are going in it. To overcome the limitation of previous work we proposed separable and reversible encrypted data hiding in encrypted image using AES Algorithm and Lossy technique as solution. In t...
Saved in:
| Published in | 2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering (PRIME) pp. 312 - 316 |
|---|---|
| Main Authors | , , , |
| Format | Conference Proceeding |
| Language | English |
| Published |
IEEE
01.02.2013
|
| Subjects | |
| Online Access | Get full text |
| ISBN | 1467358436 9781467358439 |
| DOI | 10.1109/ICPRIME.2013.6496492 |
Cover
| Abstract | The field steganography is very much popular technique for sending secrete message and lots of research are going in it. To overcome the limitation of previous work we proposed separable and reversible encrypted data hiding in encrypted image using AES Algorithm and Lossy technique as solution. In this sender encrypt data and image separately using AES algorithm, hides encrypted data in encrypted image using LSB technique, system auto generate the all 3 respective keys. Sender sends the file through existing mail system. Receiver can perform operation as per respective keys like if he has only data hiding and image decryption key then he can only get the image in original form or if he have data hiding and data decryption key then he can get original data, system also provides protection for auto generated keys and system auto generate mail if user fail to perform any operation. |
|---|---|
| AbstractList | The field steganography is very much popular technique for sending secrete message and lots of research are going in it. To overcome the limitation of previous work we proposed separable and reversible encrypted data hiding in encrypted image using AES Algorithm and Lossy technique as solution. In this sender encrypt data and image separately using AES algorithm, hides encrypted data in encrypted image using LSB technique, system auto generate the all 3 respective keys. Sender sends the file through existing mail system. Receiver can perform operation as per respective keys like if he has only data hiding and image decryption key then he can only get the image in original form or if he have data hiding and data decryption key then he can get original data, system also provides protection for auto generated keys and system auto generate mail if user fail to perform any operation. |
| Author | Patil, M. Kandhare, Akash Kadam, P. Nawale, Mangesh |
| Author_xml | – sequence: 1 givenname: P. surname: Kadam fullname: Kadam, P. email: paragkadam1991@gmail.com – sequence: 2 givenname: Mangesh surname: Nawale fullname: Nawale, Mangesh email: nawale.mangesh@gmail.com – sequence: 3 givenname: Akash surname: Kandhare fullname: Kandhare, Akash email: aakash9373@gmail.com – sequence: 4 givenname: M. surname: Patil fullname: Patil, M. email: mukeshpa34@gmail.com |
| BookMark | eNpNkNFKAzEQRSMqaGu_QB_yA7smO5vs5rGUqoWKYvteks2kjbTpmmyF_r1bLCgMzL0c5nKZAbkK-4CEPHCWc87U42zy_jF7neYF45DLUvVTXJABL2UFoi5FcflnQN6QUUqfjLH-VtYCbgkusNVRmy3SiN8Ykz9JDE08th1aanWn6cZbH9bUh3_A7_Qa6SGdwHi6oOPteh99t9lRHSyd71M60g6bTfBfB7wj105vE47Oe0iWT9Pl5CWbvz3PJuN55hXrMluYpi9pTenA2Uo6U9uqFFwBVJo5zixoA8Y5AQZsowqopZBWCQWuljXAkNz_xnpEXLWx7xiPq_NX4Ae8ZVn7 |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IL CBEJK RIE RIL |
| DOI | 10.1109/ICPRIME.2013.6496492 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| EISBN | 1467358452 9781467358446 1467358444 9781467358453 |
| EndPage | 316 |
| ExternalDocumentID | 6496492 |
| Genre | orig-research |
| GroupedDBID | 6IE 6IF 6IK 6IL 6IN AAJGR AAWTH ADFMO ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK IEGSK IERZE OCL RIE RIL |
| ID | FETCH-LOGICAL-i90t-d2bc436db4f3fd76fb8d74519337a0f10d3ab3bff53b3dc9238656d9593f86833 |
| IEDL.DBID | RIE |
| ISBN | 1467358436 9781467358439 |
| IngestDate | Wed Aug 27 03:16:33 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | false |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-i90t-d2bc436db4f3fd76fb8d74519337a0f10d3ab3bff53b3dc9238656d9593f86833 |
| PageCount | 5 |
| ParticipantIDs | ieee_primary_6496492 |
| PublicationCentury | 2000 |
| PublicationDate | 2013-Feb. |
| PublicationDateYYYYMMDD | 2013-02-01 |
| PublicationDate_xml | – month: 02 year: 2013 text: 2013-Feb. |
| PublicationDecade | 2010 |
| PublicationTitle | 2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering (PRIME) |
| PublicationTitleAbbrev | ICPRIME |
| PublicationYear | 2013 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| SSID | ssj0001106853 |
| Score | 1.5285302 |
| Snippet | The field steganography is very much popular technique for sending secrete message and lots of research are going in it. To overcome the limitation of previous... |
| SourceID | ieee |
| SourceType | Publisher |
| StartPage | 312 |
| SubjectTerms | AES algorithm Algorithm design and analysis Ciphers data hiding and extraction Educational institutions Encryption Image and data encryption Memory management Receivers |
| Title | Separable reversible encrypted data hiding in encrypted image using AES Algorithm and Lossy technique |
| URI | https://ieeexplore.ieee.org/document/6496492 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PT8IwFG6Qkyc1YPydHjy6sa2jXY-EQMCIIYIJN9KuLSzCIMs44F_v6xigxoPJDt26Ls1L995b933fQ-hRkUAYEjInZpw7Vr_ckUpqRyuhmnEUKFaQxAavtPcePk-akwp6OnBhtNYF-Ey7tln8y1ereGO3yho05HCAwz1hEd1xtY77KfBtA6Gn4G5RRiCuErqXdCrPeUmd8z3e6LeHb_1Bx2K7iFs-90eBlSK-dM_QYD-zHazkw93k0o0_f4k2_nfq56h-ZPLh4SFGXaCKTmtIj7RV_JYLja2AUwZvBTTh3my7hgQUW9Qonid2BE7Sbx3JErwPtlD5GW51Rri1mK2yJJ8vsUgVfoF4u8UHUdg6Gnc743bPKcstOAn3ckcFMgabKRkaYhSjRkaKWfEZQpjwjO8pIiSRxjSJJCqGxDCCXFBZYWMT0YiQS1RNV6m-QtgHNygDTn2lTdhkggs_iI1nhOfD-Di4RjVroel6J6gxLY1z8_flW3QaFDUoLIbkDlXzbKPvIRPI5UOxBL4A4XqxOQ |
| linkProvider | IEEE |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3Pb4IwFG4Wd9hO26LLfq-HHQcCBQpHYzS6iTHTJd5MS1slUzQED-6v3yuibssOSzgUSknzUt57lO_7HkJPgjhMEZcaMQ1DQ-uXG1xwaUjBhBcHjqAFSSzq-51392XsjY_Q854LI6UswGfS1M3iX75Yxmu9VVb33RAOcLjHnuu63patddhRga8bCD4Fe8unBCIr8XeiTuV5WJLnbCusd5uDt27U0uguYpZP_lFipYgw7TMU7ea2BZZ8mOucm_HnL9nG_07-HNUOXD482EepC3Qk0yqSQ6k1v_lcYi3hlMF7AU24N9usIAXFGjeKZ4kegZP0W0eyAP-DNVh-ihutIW7Mp8ssyWcLzFKBexBxN3gvC1tDo3Zr1OwYZcEFIwmt3BAOj8FmgruKKEF9xQNBtfwMIZRZyrYEYZxwpTzCiYghNQwgGxRa2lgFfkDIJaqky1ReIWyDI-RO6NtCKtejLGS2EytLMcuG8bFzjaraQpPVVlJjUhrn5u_Lj-ikM4p6k163_3qLTp2iIoVGlNyhSp6t5T3kBTl_KJbDF1qwtIY |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2013+International+Conference+on+Pattern+Recognition%2C+Informatics+and+Mobile+Engineering+%28PRIME%29&rft.atitle=Separable+reversible+encrypted+data+hiding+in+encrypted+image+using+AES+Algorithm+and+Lossy+technique&rft.au=Kadam%2C+P.&rft.au=Nawale%2C+Mangesh&rft.au=Kandhare%2C+Akash&rft.au=Patil%2C+M.&rft.date=2013-02-01&rft.pub=IEEE&rft.isbn=9781467358439&rft.spage=312&rft.epage=316&rft_id=info:doi/10.1109%2FICPRIME.2013.6496492&rft.externalDocID=6496492 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781467358439/lc.gif&client=summon&freeimage=true |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781467358439/mc.gif&client=summon&freeimage=true |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781467358439/sc.gif&client=summon&freeimage=true |