Security Using Image Processing
International Journal of Managing Information Technology (IJMIT) ISSN: 0975-5586 (Online); 0975-5926 (Print) http://airccse.org/journal/ijmit/ijmit.html Article: Security Using Image Processing Authors Jyotika Kapur and Akshay. J. Baregar, K.J. Somaiya College Of Engineering, India Abstract Using image stitching and image steganography security can be provided to any image which has to be sent over the network or transferred using any electronic mode. There is a message and a secret image that has to be sent. The secret image is divided into parts.The first phase is the Encrypting Phase, which deals with the process of converting the actual secret message into ciphertext using the AES algorithm. In the second phase which is the Embedding Phase, the cipher text is embedded into any part of the secret image that is to be sent. Third phase is the Hiding Phase, where steganography is performed on the output image of Embedding Phase and other parts of the image whe...