Engineering Research Publication
In this paper, data is embedded in encrypted image which is additional information in the form of either text or image for the applications such as military, medical images, deductive agencies and bank information sharing. This embedded data and original image can be separately recovered using two separate keys without any loss. There are two phases in this scheme. Firstly content owner encrypts the original image without compressing it using encryption key which is generated by blowfish algorithm then the one who wants to embed or hide the data may be service provider or data hider hides the data using data hiding key provided data can be text or image.