High Impact Factor : 4.396 icon | Submit Manuscript Online icon |

Secure Image Sharing using Visual Cryptography, Watermarking Technique and AES Algorithm

Author(s):

Sayali Prashant Dumbre , Sharadchandra Pawar College of Engineering, Dumbarwadi, Pune; Butte Dhananjay B., Sharadchandra Pawar College of Engineering, Dumbarwadi, Pune; Borude Prakash B., Sharadchandra Pawar College of Engineering, Dumbarwadi, Pune; Prof. Khatal Sunil S., Sharadchandra Pawar College of Engineering, Dumbarwadi, Pune

Keywords:

Visual Cryptography, AES Algorithm, Digital Watermarking, Data Security

Abstract

Secure communication is important in current world ,when we communicate and sharing information between two or more users then secure the communication is main challenge. Currently data security is very important over the network as well as electronic devices . currently we using many algorithms and cyber security techniques to improve the cyber and network security to protect high confidential information and data .In this paper mainly focusing on the image security over the network using visual cryptography and digital watermarking techniques. In this paper we selecting one image and apply encryption followed by digital watermarking. Here we first select highly confidential images like architectures , blueprint , design etc. ,after that we storing it on to cloud . after uploading of image is done on to cloud then we apply visual cryptography techniques for divide the images into multiple part known as shares. After that we encrypting each share individually using advanced encryption standard algorithm. When its done then apply digital watermarking for hiding the images using another image to each shares ,then the images are send to the second user . when encrypted image are send to second user at that time first check the user are right or wrong using watermarking technique and cryptography techniques ,if user are right user then first remove the watermarking ,then decrypting the each share and then original images are seen to the second user . If the user are not right person then the encrypted image are seen to that person.

Other Details

Paper ID: IJSRDV8I40632
Published in: Volume : 8, Issue : 4
Publication Date: 01/07/2020
Page(s): 424-426

Article Preview

Download Article