Skip to main content

Secure Data Concealing Using Diamond Encoding Method

  • Conference paper
  • First Online:
International Conference on Computer Networks and Communication Technologies

Part of the book series: Lecture Notes on Data Engineering and Communications Technologies ((LNDECT,volume 15))

  • 1876 Accesses

Abstract

In recent years, due to the fastest development in digital data exchange, the security of information becomes highly important for storing the data and its transmission process. The data size of text and image are different. So, for providing security to both text and image involves various methods. Choosing the best method to encrypt and decrypt the data also plays a crucial role. Traditional methods may require more time to encrypt and decrypt. Since the compilation time for one method differs from the other. The proposed model provides security for both text and image by means of embedding encrypted text into an encrypted image, and the same can be decrypted to view the original text and image. The algorithms used in the proposed model are chaotic algorithm for text and AES algorithm is used for image encryption and decryption process. Encrypted text is embedded in encrypted image using diamond encoding data hiding strategy and the same is decrypted to get the original text and image.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Saraf, K.R., Jagtap, V.P., Mishra, A.K.: Text and image encryption decryption using advanced encryption standard. Int. J. Emerg. Trends Technol. Comput. Sci. (IJETTCS) 3(3), 118–126 (2014)

    Google Scholar 

  2. Zhang, Q.: Study on image encryption algorithm based on chaotic theory. In: International Conference on Information Science and Cloud Computing Companion, pp. 635–639 (2013)

    Google Scholar 

  3. Ramineni, V., Loganathan, A., Kalubandi, V.K.P., Vaddi, H.: A novel image encryption algorithm using AES and visual cryptography. In: 2nd International Conference on Next Generation Computing Technologies (NGCT), pp. 808–813 (2016)

    Google Scholar 

  4. Deshmukh, P.: An image encryption and decryption using AES algorithm. Int. J. Sci. Eng. Res. 7(2), 210–213 (2016)

    Google Scholar 

  5. Wang, X.-Y., Gu, S.-X.: New chaotic encryption algorithm based on chaotic sequence and plain text. IET Inf. Secur. 8(3), 213–216 (2013)

    Article  Google Scholar 

  6. Radhadevi, P., Kalpana, P.: Secure image encryption using AES. IJRET Int. J. Res. Eng. Technol. 1(2), 115–117 (2012)

    Article  Google Scholar 

  7. Saleem, A., Trinadh Rao, A., Kumar, K.T.P.S., Chaitanaya, G., Keerthi, B.: An image encryption and decryption using chaos algorithm. IOSR J. Electron. Commun. Eng. (IOSR-JECE) (2015)

    Google Scholar 

  8. Abdalla, T., Al-Maadeed, S., Al-Ali, A.: A new chaos based image encryption and compression algorithm. IOSR J. Electron. Commun. Eng. (IOSR-JECE) 1–11 (2011)

    Google Scholar 

  9. Chao, R.-M., Wu, H.-C., Lee, C.-C., Chu, Y.-P.: A novel image data hiding scheme with diamond encoding. EURASIP J. Inf. Secur. 1–9 (2009)

    Google Scholar 

  10. Kuoa, W.-C., Laia, P.-Y., Wang, C.-C., Wuu, L.-C.: A formula diamond encoding data hiding scheme. J. Inf. Hiding Multimedia Signal Process. 6(6), 1167–1175 (2015)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to A. Christie Aiswarya .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Christie Aiswarya, A., Sriram, A. (2019). Secure Data Concealing Using Diamond Encoding Method. In: Smys, S., Bestak, R., Chen, JZ., Kotuliak, I. (eds) International Conference on Computer Networks and Communication Technologies. Lecture Notes on Data Engineering and Communications Technologies, vol 15. Springer, Singapore. https://doi.org/10.1007/978-981-10-8681-6_79

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-8681-6_79

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-8680-9

  • Online ISBN: 978-981-10-8681-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics