Open Access Open Access  Restricted Access Subscription or Fee Access

Secure Image Transmission and Enhancing Digital Images Using Photopark – A Software Tool

K. Anuradha, V. Shrividhya

Abstract


In this paper, we have developed a software tool “Photopark” to enhance images and to provide security. The software developed provides filtering tools, volume adjustment, image resizing, converting and all other features provided by an image editing tool. Apart from the features provided by an image editing tool, PHOTOPARK provides image security for both text and images. When the image transmission is considered scrambling of images is done which provides the security. In the proposed paper the images are transmitted efficiently by the Feistal Cipher Algorithm where the image is broken in to equal parts and the text transmission is implemented through the text transmission algorithm. The software provides excellent security and has many desired cryptographic qualities. The encrypted information is hidden within the pixels of an unassuming cover image by slightly modifying the gray levels of the carrier image. The resulting innocent-looking picture can then be transmitted electronically without arousing suspicion, and will have the security of both the hidden message plus the encryption of the message.

Keywords


Cryptography, Encryption, Feistel Cipher Algorithm, Filtering Tools, Text Transmission Algorithm

Full Text:

PDF

References


Digital Image Processing (2nd & 3rd Edition) by Rafael C. Gonzalez and Richard E. Woods

Disappearing Cryptography, Second Edition -Information Hiding: Steganography and Watermarking by Peter Wayner.

Information Hiding Techniques for Steganography and Digital Watermarking by Stefan Katzenbeisser.

Hiding in Plain Sight: Steganography and the Art of Covert Communication by Eric Cole

Investigator's Guide to Steganography by Gregory Kipper

Information Hiding: Steganography and Watermarking – Attacks and Countermeasures (Advances in Information Security, Volume (Advances in Information Security) by Neil F. Johnson

Image Processing in C: Analyzing and Enhancing Digital Images by Dwayne Philips.

Practical Algorithms for Image Analysis: Descriptions, Examples, and Code by Michael Seul, Lawrence O'Gorman, and Michael J. Sammon

Digital Image Processing Algorithms and Applications by Ioannis

Digital Image Processing: Principles and Applications by Gregory A. Baxes.

William Stallings, “ Cryptography and Network Security: Principles & Practices”, Third edition, 2003,

Feistel, H., Notz W. and Smith. J. “Some cryptographic Techniques for machine to machine data communications “, Proceedings of the IEEE, Vol. 63, No. 11, pp 1545 – 1554, Nov 1975




DOI: http://dx.doi.org/10.36039/AA052010003

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.