Separable reversible encrypted data hiding in encrypted image using AES Algorithm and Lossy technique

The field steganography is very much popular technique for sending secrete message and lots of research are going in it. To overcome the limitation of previous work we proposed separable and reversible encrypted data hiding in encrypted image using AES Algorithm and Lossy technique as solution. In t...

Full description

Saved in:
Bibliographic Details
Published in2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering (PRIME) pp. 312 - 316
Main Authors Kadam, P., Nawale, Mangesh, Kandhare, Akash, Patil, M.
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.02.2013
Subjects
Online AccessGet full text
ISBN1467358436
9781467358439
DOI10.1109/ICPRIME.2013.6496492

Cover

Abstract The field steganography is very much popular technique for sending secrete message and lots of research are going in it. To overcome the limitation of previous work we proposed separable and reversible encrypted data hiding in encrypted image using AES Algorithm and Lossy technique as solution. In this sender encrypt data and image separately using AES algorithm, hides encrypted data in encrypted image using LSB technique, system auto generate the all 3 respective keys. Sender sends the file through existing mail system. Receiver can perform operation as per respective keys like if he has only data hiding and image decryption key then he can only get the image in original form or if he have data hiding and data decryption key then he can get original data, system also provides protection for auto generated keys and system auto generate mail if user fail to perform any operation.
AbstractList The field steganography is very much popular technique for sending secrete message and lots of research are going in it. To overcome the limitation of previous work we proposed separable and reversible encrypted data hiding in encrypted image using AES Algorithm and Lossy technique as solution. In this sender encrypt data and image separately using AES algorithm, hides encrypted data in encrypted image using LSB technique, system auto generate the all 3 respective keys. Sender sends the file through existing mail system. Receiver can perform operation as per respective keys like if he has only data hiding and image decryption key then he can only get the image in original form or if he have data hiding and data decryption key then he can get original data, system also provides protection for auto generated keys and system auto generate mail if user fail to perform any operation.
Author Patil, M.
Kandhare, Akash
Kadam, P.
Nawale, Mangesh
Author_xml – sequence: 1
  givenname: P.
  surname: Kadam
  fullname: Kadam, P.
  email: paragkadam1991@gmail.com
– sequence: 2
  givenname: Mangesh
  surname: Nawale
  fullname: Nawale, Mangesh
  email: nawale.mangesh@gmail.com
– sequence: 3
  givenname: Akash
  surname: Kandhare
  fullname: Kandhare, Akash
  email: aakash9373@gmail.com
– sequence: 4
  givenname: M.
  surname: Patil
  fullname: Patil, M.
  email: mukeshpa34@gmail.com
BookMark eNpNkNFKAzEQRSMqaGu_QB_yA7smO5vs5rGUqoWKYvteks2kjbTpmmyF_r1bLCgMzL0c5nKZAbkK-4CEPHCWc87U42zy_jF7neYF45DLUvVTXJABL2UFoi5FcflnQN6QUUqfjLH-VtYCbgkusNVRmy3SiN8Ykz9JDE08th1aanWn6cZbH9bUh3_A7_Qa6SGdwHi6oOPteh99t9lRHSyd71M60g6bTfBfB7wj105vE47Oe0iWT9Pl5CWbvz3PJuN55hXrMluYpi9pTenA2Uo6U9uqFFwBVJo5zixoA8Y5AQZsowqopZBWCQWuljXAkNz_xnpEXLWx7xiPq_NX4Ae8ZVn7
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/ICPRIME.2013.6496492
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 1467358452
9781467358446
1467358444
9781467358453
EndPage 316
ExternalDocumentID 6496492
Genre orig-research
GroupedDBID 6IE
6IF
6IK
6IL
6IN
AAJGR
AAWTH
ADFMO
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
IEGSK
IERZE
OCL
RIE
RIL
ID FETCH-LOGICAL-i90t-d2bc436db4f3fd76fb8d74519337a0f10d3ab3bff53b3dc9238656d9593f86833
IEDL.DBID RIE
ISBN 1467358436
9781467358439
IngestDate Wed Aug 27 03:16:33 EDT 2025
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i90t-d2bc436db4f3fd76fb8d74519337a0f10d3ab3bff53b3dc9238656d9593f86833
PageCount 5
ParticipantIDs ieee_primary_6496492
PublicationCentury 2000
PublicationDate 2013-Feb.
PublicationDateYYYYMMDD 2013-02-01
PublicationDate_xml – month: 02
  year: 2013
  text: 2013-Feb.
PublicationDecade 2010
PublicationTitle 2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering (PRIME)
PublicationTitleAbbrev ICPRIME
PublicationYear 2013
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0001106853
Score 1.5285302
Snippet The field steganography is very much popular technique for sending secrete message and lots of research are going in it. To overcome the limitation of previous...
SourceID ieee
SourceType Publisher
StartPage 312
SubjectTerms AES algorithm
Algorithm design and analysis
Ciphers
data hiding and extraction
Educational institutions
Encryption
Image and data encryption
Memory management
Receivers
Title Separable reversible encrypted data hiding in encrypted image using AES Algorithm and Lossy technique
URI https://ieeexplore.ieee.org/document/6496492
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PT8IwFG6Qkyc1YPydHjy6sa2jXY-EQMCIIYIJN9KuLSzCIMs44F_v6xigxoPJDt26Ls1L995b933fQ-hRkUAYEjInZpw7Vr_ckUpqRyuhmnEUKFaQxAavtPcePk-akwp6OnBhtNYF-Ey7tln8y1ereGO3yho05HCAwz1hEd1xtY77KfBtA6Gn4G5RRiCuErqXdCrPeUmd8z3e6LeHb_1Bx2K7iFs-90eBlSK-dM_QYD-zHazkw93k0o0_f4k2_nfq56h-ZPLh4SFGXaCKTmtIj7RV_JYLja2AUwZvBTTh3my7hgQUW9Qonid2BE7Sbx3JErwPtlD5GW51Rri1mK2yJJ8vsUgVfoF4u8UHUdg6Gnc743bPKcstOAn3ckcFMgabKRkaYhSjRkaKWfEZQpjwjO8pIiSRxjSJJCqGxDCCXFBZYWMT0YiQS1RNV6m-QtgHNygDTn2lTdhkggs_iI1nhOfD-Di4RjVroel6J6gxLY1z8_flW3QaFDUoLIbkDlXzbKPvIRPI5UOxBL4A4XqxOQ
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3Pb4IwFG4Wd9hO26LLfq-HHQcCBQpHYzS6iTHTJd5MS1slUzQED-6v3yuibssOSzgUSknzUt57lO_7HkJPgjhMEZcaMQ1DQ-uXG1xwaUjBhBcHjqAFSSzq-51392XsjY_Q854LI6UswGfS1M3iX75Yxmu9VVb33RAOcLjHnuu63patddhRga8bCD4Fe8unBCIr8XeiTuV5WJLnbCusd5uDt27U0uguYpZP_lFipYgw7TMU7ea2BZZ8mOucm_HnL9nG_07-HNUOXD482EepC3Qk0yqSQ6k1v_lcYi3hlMF7AU24N9usIAXFGjeKZ4kegZP0W0eyAP-DNVh-ihutIW7Mp8ssyWcLzFKBexBxN3gvC1tDo3Zr1OwYZcEFIwmt3BAOj8FmgruKKEF9xQNBtfwMIZRZyrYEYZxwpTzCiYghNQwgGxRa2lgFfkDIJaqky1ReIWyDI-RO6NtCKtejLGS2EytLMcuG8bFzjaraQpPVVlJjUhrn5u_Lj-ikM4p6k163_3qLTp2iIoVGlNyhSp6t5T3kBTl_KJbDF1qwtIY
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2013+International+Conference+on+Pattern+Recognition%2C+Informatics+and+Mobile+Engineering+%28PRIME%29&rft.atitle=Separable+reversible+encrypted+data+hiding+in+encrypted+image+using+AES+Algorithm+and+Lossy+technique&rft.au=Kadam%2C+P.&rft.au=Nawale%2C+Mangesh&rft.au=Kandhare%2C+Akash&rft.au=Patil%2C+M.&rft.date=2013-02-01&rft.pub=IEEE&rft.isbn=9781467358439&rft.spage=312&rft.epage=316&rft_id=info:doi/10.1109%2FICPRIME.2013.6496492&rft.externalDocID=6496492
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781467358439/lc.gif&client=summon&freeimage=true
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781467358439/mc.gif&client=summon&freeimage=true
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781467358439/sc.gif&client=summon&freeimage=true