##plugins.themes.academic_pro.article.main##

Abstract

Presenting a days the information security and information, honesty are the two testing ranges for exploration. This study depicts the idea of distinct reversible information, concealing method that is connected with web security. When it is craved to send the classified/critical/secure data over an unstable and transfer speed obliged channel it is standard to scramble the spread information and after that install the private/essential/secure data into that cover information. With a scrambled picture/video containing extra data, if a beneficiary receives the data covering up key alone, he can extricate the extra information yet the picture substance is obscure to him. On the off chance that the beneficiary has the encryption key, he can unscramble to get merely a picture like the foremost one, notwithstanding the extra information can't be taken. On the off chance that the collector has both the information stowing away key and the encryption key, he can split both the excess information and recoup the first flick with no blunder by misusing the spatial connection in regular picture. In the present technique the information takes cover behind the movies, the interlopers can without much of a stretch procure this data in light of the fact that it is not scrambled. In this paper, we have made up a method to hide information in Encrypted pictures. This paper designs to contribute a review of image steganography and picture encryption, its habits and methods. In the proposed framework we are encoding the information utilizing the Rijndeal calculation which is additionally used by the Military powers. This calculation conceals the information in the picture using the LSB strategy and the picture is again scrambled utilizing the RSA calculation. For this whole encryption prepares the client receives a secret word. After the encoding process is finished the sender transmits the record to the accumulator. The collector can extricate the information only on the off chance that he is sustained during the time spent laughing.

Keywords

Encrypted images LSB technique Rijndeal algorithm Steganography

##plugins.themes.academic_pro.article.details##

How to Cite
Ghassan Faisal Falih ALBaaj. (2022). A Model to Share Hidden Data in Image for Military Access. Texas Journal of Engineering and Technology, 4, 4–9. Retrieved from https://zienjournals.com/index.php/tjet/article/view/701

References

  1. Wu, M., & Liu, B. (2003). Data hiding in image and video. I. Fundamental issues and solutions. Image Processing, IEEE Transactions on, 12(6), 685-695.
  2. Wu, M., Yu, H., & Liu, B. (2003). Data hiding in image and video. II. Designs and applications. Image Processing, IEEE Transactions on, 12(6), 696-705.
  3. Chan, C. K., & Cheng, L. M. (2004). Hiding data in images by simple LSB substitution. Pattern recognition, 37(3), 469-474.
  4. Wu, M., & Liu, B. (2004). Data hiding in binary image for authentication and annotation. Multimedia, IEEE Transactions on, 6(4), 528-538.
  5. Ni, Z., Shi, Y. Q., Ansari, N., & Su, W. (2006). Reversible data hiding. Circuits and Systems for Video Technology, IEEE Transactions on, 16(3), 354-362.
  6. Bender, W., Gruhl, D., Morimoto, N., & Lu, A. (1996). Techniques for data hiding. IBM systems journal, 35(3.4), 313-336.
  7. Zhang, X. (2011). Reversible data hiding in encrypted image. Signal Processing Letters, IEEE, 18(4), 255-258.
  8. Moulin, P., & Mihçak, K. M. (2002). A framework for evaluating the data-hiding capacity of image sources. Image Processing, IEEE Transactions on, 11(9), 1029-1042.
  9. Swanson, M. D., Zhu, B., & Tewfik, A. H. (1996, September). Robust data hiding for images. In Digital Signal Processing Workshop Proceedings, 1996., IEEE (pp. 37-40). IEEE.
  10. Zhang, X. (2012). Separable reversible data hiding in encrypted image. Information Forensics and Security, IEEE Transactions on, 7(2), 826-832.
  11. Tai, W. L., Yeh, C. M., & Chang, C. C. (2009). Reversible data hiding based on histogram modification of pixel differences. Circuits and Systems for Video Technology, IEEE Transactions on, 19(6), 906-910.