Innovative Hybrid Technique to Hide Encrypted Messages Inside 3D Images Using DWT 🌐

Discover a cutting-edge method combining cryptography and steganography to securely embed encrypted text within 3D images through Discrete Wavelet Transform, enhancing data privacy for online communications.

Innovative Hybrid Technique to Hide Encrypted Messages Inside 3D Images Using DWT 🌐
VERILOG COURSE TEAM-MATLAB PROJECT
208 views β€’ Jun 8, 2020
Innovative Hybrid Technique to Hide Encrypted Messages Inside 3D Images Using DWT 🌐

About this video

The businesses in various fields use the online communication application to gather their data and information with local and global sources. The gathered data may sensitive such as financial and business development information. The hackers or online thieves try to steal valuable data i.e. credit card numbers. The organizations looking for secure online channels in order to transfer their data efficiently and avoid the data thieving. One of the most applicable methods that developed to secure the online transferred data is cryptography which transfers the original data or information to the encrypted formulation. Cryptography still has many drawbacks such as stole and decrypts the original texts using an automatic decryption counter. The main aim of this research is to improve the cryptography securing level using the supportive method which is Steganography. Steganography is the process of hiding the data or information in media files such as video, images, and audio files. The design combines cryptography and steganography to guarantee significantly increased security. Symmetric key Advanced Encryption Standard (AES) and Asymmetric key Rivest Shamir Adleman (RSA) are inhibited in transform domain of cover (carrier) image and performed separately. Discrete Wavelet Transform (DWT) on the cover image is performed with an extra layer of security that has been presented by applying alpha-factor on the AES/ RSA encoded message. The design has mainly 4 processes,
β€’ Encryption
β€’ Embedding
β€’ Decryption
β€’ De-Embedding

Finally, performance measures i.e Structural similarity index (SSIM), PSNR, MSE, Encryption Time, Decryption Time, Execution time are calculated in order to check for the visual quality of the stego image.

Reference Paper-1: Hybrid cryptography and steganography method to embed encrypted text message within image
Author’s Name: Khider Nassif Jassim, Ahmed Khudhur Nsaif and, Asama Kuder Nseaf
Source: IOP Publishing
Year: 2019

Reference Paper-2: A Study on Combined Cryptography and Steganography
Author’s Name: Vishnu S Babu and Prof. Helen K J
Source: IJRSCSE
Year: 2015

Request source code for academic purpose, fill REQUEST FORM below or contact +91 7904568456 by WhatsApp, fee applicable.
http://www.verilogcourseteam.com/request-form

Like our Facebook Page:https://www.facebook.com/VerilogCourseTeam/

Subscribe:https://www.youtube.com/verilogcourseteamelectricalprojects

Subscribe:https://www.youtube.com/verilogcourseteammatlabproject

Subscribe:https://www.youtube.com/verilogcourseteam

Tags and Topics

Browse our collection to discover more content in these categories.

Video Information

Views

208

Likes

3

Duration

20:09

Published

Jun 8, 2020

Related Trending Topics

LIVE TRENDS

Related trending topics. Click any trend to explore more videos.