Bioscience Biotechnology Research Communications

An International  Peer Reviewed Refereed Open Access Journal

P-ISSN: 0974-6455 E-ISSN: 2321-4007

Bioscience Biotechnology Research Communications

An Open Access International Journal

Y Manjula1* and K B Shivakumar2

1Department of Electronics & Communication Engineering, Sri Siddhartha Institute of Technology, Tumakuru, Karnataka, India.

2Department of Electronics and Telecommunication Engineering, Sri Siddhartha Institute of Technology, Tumakuru, Karnataka, India

Corresponding author email: manjulayerva@ssit.edu.in

Article Publishing History

Received: 28/11/2020

Accepted After Revision: 25/01/2021

ABSTRACT:

In information technology environment most of the organizations are depending largely on digital services by cloud computing for data base resource management. This needs the transmission of sensitive data to the database servers present in cloud .Therefore the primary concern is for secure data transfer and control access. The proposed method mainly focus on secure network communication of image data base. The secret image is first encrypted in to a meaningful Mosaic encrypted image using fragmented tiles and selected target image. Applying the Color transform to mosaic encrypted image improves the quality of Mosaic image look like Target image. Discrete wavelet transform is then applied to this Mosaic encrypted image to decompose the image in to approximate and information components. The information components are then encrypted by using Chaos based encryption algorithm.

The chaos Encrypted image along with approximate components combined and combined image is then hidden in a cover image by using Improved LSB-mapping Steganographic technique. The Mosaic encrypted image is meaningful cipher which camouflage the intruder and secondly the chaos encryption algorithm produces a cipher which gives good amount of confusion and diffusion. Also two bits of double encrypted cipher image is hidden in each pixel of cover image. The proposed algorithm is a combination of both cryptographic and steganography techniques becomes a comprehensive approach to critical data protection from discovering and monitoring.

KEYWORDS:

Chaos Encryption, Fragmented Mosaic Images, Lsb –Mapping.

Download this article as:

Copy the following to cite this article:


Copy the following to cite this URL: