Provided by:
International Journal of Computer Science and Mobile Computing (IJCSMC)
Topic:
Security
Format:
PDF
In this paper, the authors propose method for image encryption and decryption, data embedding and data extraction. The content owner first encrypts image by BB equation and chaos algorithm, then the data is encrypted using data hiding key and embedded into LSB bit of specific pixels. With an encrypted image containing additional data, if a receiver has the data-hiding key, the data can be extracted without revealing original image. If the receiver has the encryption key, the original image can be extracted without disturbing data embedded.