Review on Encrypted Image with Hidden Data Using AES Algorithm

Review on Encrypted Image with Hidden Data Using AES Algorithm ( Vol-3,Issue-2,March - April 2018 )

Author: Tarun Goyal, Ms. Shazia Haque

Keyword: Steganography, Encryption, Decryption, AES algorithm.

Abstract: Steganography is the art of hiding the fact where communication is taking place, by hiding information in other information. Steganography becomes more important as more people join the cyberspace revolution. . In contrast to cryptography, it is not to keep others from knowing the hidden information but it is to keep others from thinking that the information even exists. Steganography include an array of secret communication methods that hide the message from being seen or discovered. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the internet. For hiding secret information in images, there exists a large variety of steganography techniques some are more complex than others and all of them have respective strong and weak points. Different applications may require absolute invisibility of the secret information, while others require a large secret message to be hidden. This project report intends to give an overview of image steganography, its uses and techniques. In addition to this our project also adds security to both the data hidden and the image that carries the information. Security is provided by Encrypting the data that is sent in the image and again encrypting the image that carries the information using AES algorithm. This encryption of the data and image thus provides double security layer.


[1] Radhika D.Bajaj, Dr. U.M. Gokhale “Design and Simulation of AES Algorithm for Cryptography”, International Journal of Engineering Science and Computing, Volume 6, Issue 6, June 2016.
[2] Radhika D.Bajaj, Dr. U.M. Gokhale “AES ALGORITHM FOR ENCRYPTION” International Journal of Latest Research in Engineering and Technology, Volume 2, Issue 5, May 2016.
[3] Himanshu Gupta “Twin Key Implementation in AES”, IOSR Journal of Computer Engineering, Volume 16, Issue 5, Sept 2014.
[4] Dr. R. Prema “AES Algorithm Based Secure Data Transmission for Wireless Sensor Networks”, International Journal of Applied Engineering Research, Volume 11, 2016.
[5] Muthulakshmi P, Shathvi K, Aarthi M, Seethalakshmi V “Encrypted image with hidden data using AES algorithm”,International Journal of Science, Engineering and Technology, Volume 5, Issue 4, April 2016.

Cite this Article: Show All (MLA | APA | Chicago | Harvard | IEEE | Bibtex)

Total View: 288 Downloads: 0 Page No: 14-17