Open Access Open Access  Restricted Access Subscription Access

Cryptography Based Technique For Security Of Data Using Image Processing

Harshita Mall, M.P.S. Chawla


The developments observed in technology and networking has posed serious threats to obtain secured data communication. This has generated an interest amongst computer security researchers to overcome the serious threats for secured data transmission. To protect the data or information against unauthorised access, two important techniques are available i.e. cryptography and steganography. This paper deals with the combination of both the above mentioned techniques, so as to increase the level of security over an open channel like internet. At transmitter side of communication channel, cryptography is done i.e. converting the actual data into cipher text and after conversion of data the steganography is done i.e. embedding the cipher text into a cover image. At receiver side, the recovery process is reverse of the embedding process and decryption of data is also done to reform the actual data. The encryption and decryption process is done by AES method and the embedding and extracting process is done using DWT method on cover image. The proposed method is quite easy and user-friendly and therefore, difficult for the intruder to access the secret message. The proposed technique is evaluated on the basis of PSNR and SSIM values. 

Full Text:



TahaJassim, RaedAbd-Alhameed and Hussain Al-Ahmad, “A New Robust and Fragile Watermarking Scheme for Images Captured by Mobile Phone Cameras”, IEEE International Advanced Computing Conference, 2013

AnjanaJoshy and Neenu Suresh, “A Dual Security Approach for Image Watermarking using AES and DWT”, International Journal of Digital Application & Contemporary research, Vol. 3, Issue 1, August 2014

[Module 8 – Network Security, Cryptography (NPTEL) Version 2 CSE IIT, Kharagpur

A. Joseph Raphael and Dr. V. Sundaram, “Cryptography and Steganography – A Survey”, International Journal of Computer Technology and Applications, Vol. 2 (3), pp. 626-630

U. Rizwan and H. Faheem Ahmed, “A New Approach in Steganography using different Algorithms and Applying Randomization Concept”, International Journal of Advanced Research in Computer and Communication Engineering Vol. 1, Issue 9, November 2012

T. Morkel, J.H.P. Eloff and M.S. Olivier, “An Overview of Image Steganography”, Information and Computer Security Architecture (ICSA) Research Group

Douglas Selent, “Advanced Encryption Standard” RivierAcadamic Journal, Vol. 6, No. 2, 2010

Mehdi Hussain and MureedHussain, “A Survey of Image Steganography Techniques”, International Journal of Advanced Science and Technology, Vol. 54, May, 2013

Barnali Gupta Banik and Samir K. Bandyopadhyay, “A DWT Method for Image Steganography”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 3, Issue 6, June 2013

MukeshGarg and A.P. GurudevJangra, “An Overview of Different Type of Data Hiding Scheme in Image using Steganographic Techniques”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 4, Issue 1, January 2014

R.Nivedhitha and Dr.T.Meyyappan, “Image Security Using Steganography And Cryptographic Techniques”, International Journal of Engineering Trends and Technology, Vol. 3, Issue 3, 2012

AartiMehndiratta, “Data Hiding System Using Cryptography & Steganography: A Comprehensive Modern Investigation”, International Research Journal of Engineering and Technology (IRJET), Vol. 2, Issue 1, Apr-2015

Shikha and VidhuKiranDutt, “Steganography: The Art of Hiding Text in Image using Matlab”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 4, Issue 9, September 2014

Dipalee Gupta and Siddhartha Choubey, “Discrete Wavelet Transform for Image Processing”, International Journal of Emerging Technology and Advanced Engineering, Vol. 4, Issue 3, March 2015


  • There are currently no refbacks.