scholarly journals Confidential Encrypted Data Hiding and Retrieval Using QR Authentication System

Author(s):  
S. Dey ◽  
A. Nath ◽  
S. Agarwal
2010 ◽  
Vol 7 (3) ◽  
pp. 199-208
Author(s):  
Amera Badran ◽  
Abdulsattar Khidhir ◽  
laheeb Ibrahim

2014 ◽  
Vol 86 (8) ◽  
pp. 23-26 ◽  
Author(s):  
Ghada TH.Talee ◽  
Melad J. Jelmeran ◽  
Saja J. Mohammad

2020 ◽  
Vol 15 (2) ◽  
pp. 124-135 ◽  
Author(s):  
Sonal Ayyappan ◽  
C. Lakshmi ◽  
Varun Menon

Background: Recent advances in medical associated technologies have drastically increased the amount of electronic medical records collected, stored and transferred through the network. Considering the significance and level of sensitivity of the collected medical data, the security of the transmitted data has become a very vital and challenging task for researchers. The protection of these medical images with embedded data is usually guaranteed using encryption or data hiding techniques. Conventional techniques that employ encryption or data hiding are often insecure and also time-consuming during transmission through the network. Materials and Methods: A method combining encryption and data hiding together can result in compression of data that reduces the transmission time and increases the security level. Reversible data hiding in images can reestablish the cover image after extracting the hidden embedded data exclusive of alterations. Here a new reversible crypto-watermarking system is proposed using cryptographic algorithms that encrypts and hides an Electronic Patient Record (EPR) into an image corresponding to that patient using Rhombus Prediction Scheme. It embeds a big amount of encrypted data into an image with hardly noticeable modification using spatial pixel manipulations based on prediction errors. The marked image is hashed using SHA-256 algorithm. Results and Conclusion: Hashing and cryptography increases the robustness and guarantees authenticity with integrity. The proposed method results in improved safety with a lower transmission time than the existing methods.


Today, digital communication has become an integral part of everyday life. Many applications are based on the Internet and communications must be made in secret. This is especially important when confidential information needs to be exchanged. As a result, the security of information transmitted over public channels is a fundamental problem, and as a result, the confidentiality and integrity of the data is essential to protect against unauthorized access and use. This caused the information concealment area to become unstable. Encryption and steganography are two of the most common methods you can use to ensure safety. With encryption, the data is converted to another form of gibberish and the encrypted data is transmitted. In Steganography, the image is transferred to the image, which is embedded in the image without affecting the quality of the image.This article suggests a new way to embed data into images and edit data using common virtual built-in technologies


2013 ◽  
Vol 79 (5) ◽  
pp. 6-10 ◽  
Author(s):  
Rekha D.Kalambe ◽  
Rakesh Pandit ◽  
Sachin Patel

2014 ◽  
Vol 16 (1) ◽  
pp. 71-82
Author(s):  
Biby Bino Varghese ◽  
◽  
Rosna P. Haroon
Keyword(s):  

K Means Clustering (KM) based data hiding algorithm (KM-DH) is to perform cluster operation which means split pixels into chunks from already encrypted image. Under Consideration of splitted pixels find place to allocate information Authenticated person encrypt the image pixels with their key to prepare envelope image then flow goes by grouping the pixels to stuff the already encrypted image of lowest bits to generate place to allocate data using K means Clustering methods with the help of secret key it form split up matrix.In Receiver side after getting the encrypted data they can withdraw data and image separately without overlapping each other using data and image encryption key.At the same time receiver can also get both the image and data without any bug by dimensional link.


Sign in / Sign up

Export Citation Format

Share Document