Loading

A Model for Encryption of Images into Audio file – Pseudo Steganography
Apoorv Goyal1, Suma Sree Thota2, Sumaiya Thaseen3
1Apoorv Goyal, School of Electronics Engineering, Vellore Institute of Technology, Vellore, India.
2Suma Sree Thota, School of Computer Science and Engineering, Vellore Institute of Technology, Vellore, India.
3Sumaiya Thaseen I, School of Information Technology and Engineering, Vellore Institute of Technology, Vellore, India.

Manuscript received on 05 April 2019 | Revised Manuscript received on 10 May 2019 | Manuscript published on 30 May 2019 | PP: 1901-1905 | Volume-8 Issue-1, May 2019 | Retrieval Number: A1401058119/19©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: This paper aims to put forth a novel approach for the secure encryption of images. The technique makes use of superimposition of images along with signal processing techniques to achieve the proposed goal. Two keys are used for this purpose, one is a QR code generated using the mobile number of the sender and the other is a signal generated using a private value. Both the keys are used at different stages of encrypting the image. This encryption scheme follows a pixel wise encryption rather than bitwise or byte wise encryption. This way of encrypting images can be used in chat applications where end-to-end encryption is a necessity. The results obtained are convincing and show that this technique can provide robustness and security for the transfer of images. Further, the results obtained using images of different sizes as well as different keys are compared and plotted.
Index Terms: Convolution, Image Encryption, Signal Processing, Superimposition.

Scope of the Article: Encryption Methods and Tools