Details

An Efficient Cryptographic Technique Using RC4 and Pixel Shuffling Algorithms

Jyothi B K

4th Semester, M.Tech. Department of Computer Science and Engineering, , Jawarharlal Nehru National College of Engineering, Shivamogga, Karnataka, India

Ganavi M

Department of Computer Science & Engineering, Jawarharlal Nehru National College of Engineering, Shivamogga, Karnataka, India

23-29

Vol: 9, Issue: 2, 2019

Receiving Date: 2019-02-15 Acceptance Date:

2019-04-04

Publication Date:

2019-04-21

Download PDF

Abstract

The objective of the present project work is to use a new technique for image steganography in a color cover images,RC4 and pixel shuffling is used for secret message encryption and hides the secret image in the carrier images using HASH LSB. In order to get the true image back at the receiver RC4 and Pixel Shuffling decryption technique has been used. Experimental results have shown that the proposed technique performs better and provides high rate of modification and embedding capacity.

Keywords: RC4; pixel; shuffling; Hash-LSB; image steganography

References

  1. Kester. Q, (January 2013), A cryptographic Image Encryption technique based on the RGB PIXEL shuffling A cryptographic Image Encryption technique based on the RGB PIXEL shuffling; International Journal of Advanced Research in Computer Engineering & Technology, vol. 2,no.2 pp.848-854.
  2. N. Agarwal and Agarwal. P, (August 2013); An Efficient Shuffling Technique on RGB Pixels for Image Encryption; MIT International Journal of Computer Science & Information Technology, vol. 3, no. 2, pp. 77–81.
  3. Saptarini, Y. Sir, (December 2013), Digital Color Image Encryption Using RC4 Stream Cipher and Chaotic Logistic Map, Information Systems International Conference, pp. 2–4.
  4. Abdullah, (June 2016), New Approaches to Encrypt and Decrypt Data in Image using Cryptography and Steganography Algorithm, International Journal of Computer Applications, vol. 143, no. 4, pp. 11–17.
  5. Rosziati and Kuan. (2011), Steganography Algorithm to Hide Secret Message inside an Image. Computer Technology and Application, Vol. 2: 102-108.
  6. Sahute.P, S. Waghamare, Patil, (March 2015), Secure Messaging Using Image Stegnography, International Journal of Modern Trends in Engineering and Research,vol.2,no.3, pp. 598–608.
  7. K. Hamdnaalla, A. Wahaballa, and O. Wahballa, (August 2013), Digital Image Confidentiality Depends upon Arnold Transformation and RC4 Algorithms, International Journal of Video & Image Processing and Network Security, vol.13, no. 04.
  8. Koushik, (April 2012), Hash Based Least Significant bit technique for video steganography, Int. Journal of Security Privacy and Trust Management, Vol 1, No 2.
  9. Manjula and Ajit, (February 2015), Hash Based Least Significant bit (2-3-3) Image steganography in spatial domain, Int. Journal of security and Trust Management vol 4, No1.
  10. Khan Jamil Sajjad, (June 2015), Secure image steganography using cryptography and image transposition. University Journal of Research.
  11. Shivani, Jyotsna, Kumar and Amit, (2017), Multiple layer Text Security using variable block size cryptography and Image steganography, Computational Intelligence and Communication Technology, IEEE 2017.
  12. Aishwarya and Hema, (March-April 2017), Strength of steganography and cryptography, Int. Journal of Advanced Research in Computer Science, Vol 8, No. 3.
Back

Disclaimer: All papers published in IJRST will be indexed on Google Search Engine as per their policy.

We are one of the best in the field of watches and we take care of the needs of our customers and produce replica watches of very good quality as per their demands.