CFP last date
20 May 2024
Reseach Article

GUI based Approach for Data Encryption and Decryption on MATLAB Platform

by Shweta Joshi, Rekha Mehra
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 181 - Number 16
Year of Publication: 2018
Authors: Shweta Joshi, Rekha Mehra
10.5120/ijca2018917758

Shweta Joshi, Rekha Mehra . GUI based Approach for Data Encryption and Decryption on MATLAB Platform. International Journal of Computer Applications. 181, 16 ( Sep 2018), 14-18. DOI=10.5120/ijca2018917758

@article{ 10.5120/ijca2018917758,
author = { Shweta Joshi, Rekha Mehra },
title = { GUI based Approach for Data Encryption and Decryption on MATLAB Platform },
journal = { International Journal of Computer Applications },
issue_date = { Sep 2018 },
volume = { 181 },
number = { 16 },
month = { Sep },
year = { 2018 },
issn = { 0975-8887 },
pages = { 14-18 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume181/number16/29905-2018917758/ },
doi = { 10.5120/ijca2018917758 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:06:08.542793+05:30
%A Shweta Joshi
%A Rekha Mehra
%T GUI based Approach for Data Encryption and Decryption on MATLAB Platform
%J International Journal of Computer Applications
%@ 0975-8887
%V 181
%N 16
%P 14-18
%D 2018
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In the era of digital technology, image (data) security has been a very vital concept for its practical applications. With the use of ‘Steganography’ a technique of hiding a special(secret) data (message) in any cover object while communicating between the transmitter and receiver, security of secret data always has been a critical factor since fast times. In this message work, a Hash – LSB based embedding of the encrypted text. RSA encryption is performed to provide further enhanced security data. Decryption of image steganography is done using RSA decryption algorithm, which helps to commute another cycle of security process implementation. Image steganography has been implemented using an Hash-LSB encoding and decoding RSA message or file encryption and decryption and chaotic used an image encryption decryption algorithm.

References
  1. Anil Kumar, Rohini Sharma, “A Secure Image Steganography Based on RSA Algorithm and Hash-LSB Technique”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 3, Issue No. 7, July 2013
  2. Aishwary Kulshreshta , Ankur Goyal“Image Steganography Using Dynamic LSB with Choatic Algorithm” International Journal of Computer & Organization Trends, Vol 3 Issue No 7, August 2013.
  3. Mamta Juneja, Parvinder Singh Sandhu, “Designing of Robust Image Steganography Technique Based on LSB Insertion and Encryption”, International Conference on Advances in Recent Technologies in Communication and Computing, Pages No. 302 – 305, 27-28 Oct., 2009.
  4. Swati Tiwari, R. P. Mahajan, “A Secure Image Based Steganographic Model Using RSA Algorithm and LSB Insertion”, International Journal of Electronics Communication and Computer Engineering (IJECCE), Vol. 3, Issue No. 1, 2012.
  5. N. F. Johnson, S. Jajodia, "Steganography: seeing the unseen”, IEEE Computer, Vol. 31, Issue No. 2, Pages No. 26 - 34, Feb., 1998.
  6. Wien Hong, Tung-Shou Chen, “A Novel Data Embedding Method Using Adaptive Pixel Pair Matching”, IEEE Transactions on Information Forensics and Security, Vol. 7, Issue No. 1, Pages No. 176 - 184, Feb., 2012.
  7. Komal Patel, Sumit Utareja, Hitesh Gupta“Information Hiding using Least Significant Bit Steganography and Choatic Algorithm” International Journal of Computer Applications, Vol. 63, Issue No.13, February 2013.
  8. R. Chandramouli, N. Memon, “Analysis of LSB based image Steganography techniques”, International Conference on Image Processing, Vol. 3, Pages No. 1019 – 1022, 07 Oct 2001-10 Oct, 2001.
  9. Weiqi Luo, Fangjun Huang, Jiwu Huang, “Edge Adaptive image Steganography Based on LSB Matching Revisited”, IEEE Transactions on Information Forensics and Security, Vol. 5, Issue No. 2, Pages No. 201 – 214, June, 2010.
  10. Ross J. Anderson, Fabien A. P. Petitcolas, “On the Limits of Steganography”, IEEE Journal on Selected Areas in Communications, Vol. 16, Issue No. 4, Pages No. 474 – 481, May, 1998.
  11. Min-Wen Chao, Chao-hung Lin, Cheng-Wei Yu, Tong- Yee Lee, “A High Capacity 3D Steganography Algorithm”, IEEE Transactions on Visualization and Computer Graphics,Vol. 15, Issue No. 2, Pages No. 274– 284, March- April, 2009.
  12. Nicholas Hopper, Luis von Ahn, John Langford, “Provably Secure Steganography”, IEEE Transactions on Computers, Vol. 58, Issue No. 5, Pages No. 662 – 676, May, 2009.
Index Terms

Computer Science
Information Sciences

Keywords

Cryptography Hash LSB encoding RSA Encryption RSA Decryption Steganography.