Authors :
Anmol Pant; Sarvesh Kaushik
Volume/Issue :
Volume 7 - 2022, Issue 1 - January
Google Scholar :
http://bitly.ws/gu88
Scribd :
https://bit.ly/3tPHLTI
DOI :
https://doi.org/10.5281/zenodo.5890463
Abstract :
Information hiding has been on an ascent
lately. New steganography strategies have evolved to
make our data more secure and thereby enhance privacy.
With the development of information technology, images
have now become the center of network information
transmission and has replaced text. But as images are
now being increasingly used, there has also been an
evolution in image information theft technology. To keep
pace with the progressing theft technology, we must look
for more efficient encryption procedures so as to further
enhance our security prospects.
The 4 out of 8 code image encryption techniques
deploys transporter or carrier picture creation for
encryption. Here the carrier image is made with the help
of alphanumeric key phrase that is associated with each
image. Each alphanumeric key will have its own unique
8-character bit value created by cutting edge 4 out of 8
code. This recently delivered carrier image is added with
the actual image that we want to hide, to get the encoded
picture. The opposite technique results the decoded
picture. So as to further improve the protection from
cyber assaults we even incorporate a cryptographic
function which gives authenticity and security to the
secret key produced which is to be given to the receiver so
as to decode the encrypted image.
Keywords :
Amended 4 out of 8 code, carrier image, image encryption, file management system, cipher image, cryptography
Information hiding has been on an ascent
lately. New steganography strategies have evolved to
make our data more secure and thereby enhance privacy.
With the development of information technology, images
have now become the center of network information
transmission and has replaced text. But as images are
now being increasingly used, there has also been an
evolution in image information theft technology. To keep
pace with the progressing theft technology, we must look
for more efficient encryption procedures so as to further
enhance our security prospects.
The 4 out of 8 code image encryption techniques
deploys transporter or carrier picture creation for
encryption. Here the carrier image is made with the help
of alphanumeric key phrase that is associated with each
image. Each alphanumeric key will have its own unique
8-character bit value created by cutting edge 4 out of 8
code. This recently delivered carrier image is added with
the actual image that we want to hide, to get the encoded
picture. The opposite technique results the decoded
picture. So as to further improve the protection from
cyber assaults we even incorporate a cryptographic
function which gives authenticity and security to the
secret key produced which is to be given to the receiver so
as to decode the encrypted image.
Keywords :
Amended 4 out of 8 code, carrier image, image encryption, file management system, cipher image, cryptography