Academic Journals Database
Disseminating quality controlled scientific knowledge

Two Phase Clandestain Image Encryption

Author(s): V Hemanth | R Praveen Kumar

Journal: Advanced Computing : an International Journal
ISSN 2229-726X

Volume: 4;
Issue: 1;
Start page: 35;
Date: 2013;
VIEW PDF   PDF DOWNLOAD PDF   Download PDF Original page

In today’s internet world is full of data steals and hackers. So, there is a essential to design a system that assists the internet users to interchange their secret and private data safely across the web. Informationhiding process in a Steganography system starts by identifying medium’s redundant bits. The encryptionprocess creates a stego medium by replacing these redundant bits with data from the hidden message. So, we propose a method for encrypting the image, which has two phases. In the first phase, Perform Circular Shift Operations on the image pixels and the number of rotations have been calculated based on the length of the password. In the second phase, the first phase has undergone some bitwise operationswith a carriage image, by doing this; breaking of the cipher text is difficult.
RPA Switzerland

Robotic Process Automation Switzerland


Tango Rapperswil
Tango Rapperswil