Enhancing Image Security by Employing Blowfish Algorithm Further Embedding Text and Stitching the RGB Components of a Host Image
Deepanshu Agarwal1, Pravesh Panwar2, Purva Vyas3, T.B. Patil4, S.D.Joshi5
1Deepanshu Agarwal, Department of Information Technology, Bharati Vidyapeeth Deemed to be University College of Engineering, Pune (Maharashtra), India.
2Pravesh Panwar, Department of Information Technology, Bharati Vidyapeeth Deemed to be University College of Engineering, Pune (Maharashtra), India.
3Purva Vyas, Department of Information Technology, Bharati Vidyapeeth Deemed to be University College of Engineering, Pune (Maharashtra), India.
4T. B. Patil, Department of Information Technology, Bharati Vidyapeeth Deemed to be University College of Engineering, Pune (Maharashtra), India.
5S. D. Joshi, Department of Computer Engineering, Bharati Vidyapeeth (Deemed to be University) College of Engineering, Pune (Maharashtra), India.
Manuscript received on 20 October 2019 | Revised Manuscript received on 25 October 2019 | Manuscript Published on 02 November 2019 | PP: 3801-3808 | Volume-8 Issue-2S11 September 2019 | Retrieval Number: B14990982S1119/2019©BEIESP | DOI: 10.35940/ijrte.B1499.0982S1119
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: ‘Privacy, privacy everywhere but not a safety method to implement it’: a harsh reality of today’s world. With the precipitation of more data (2 x 1019 bits of data is created in every 86400 seconds) in computer networks, involvement of meta-data in the form of images is essential. To keep data safe and secure in order to inculcate privacy, to eradicate any kind of eavesdropping, and to maintain confidentiality, integrity and availability of it, certain security measures are needed to make in account for. So in order to make it available, we required a technique through which we can securely transfer any kind of data over a network. In practise the information security can be achieved either by using Cryptography or Steganography. The process described in this paper is not a mediocre it is more scrupulous towards the security because it involves image encryption, steganography and image stitching. Initially we are encrypting an image using Blowfish algorithm then we are embedding the secret text into this encrypted image by modifying the least significant bit (LSB) of the image by our data. Moreover, to enhance the privacy and security we are stitching the above resultant image with the red, green and blue (RGB) components of a host image and thereby producing an image more secure than the one which the existing systems can form for data transmission.
Keywords: Blowfish Algorithm, Data Embedding, Feistel Network, Image Stitching, Steganography, Twofish Algorithm.
Scope of the Article: Image Security