z-logo
open-access-imgOpen Access
Autonomous Data hiding in an Encrypted Image using KM-DH Algorithm
Author(s) -
S. Janani,
M Shalini,
K. Parkavi,
A. Chandrasekar
Publication year - 2019
Publication title -
international journal of innovative technology and exploring engineering
Language(s) - English
Resource type - Journals
ISSN - 2278-3075
DOI - 10.35940/ijitee.a4524.129219
Subject(s) - encryption , pixel , key (lock) , image (mathematics) , computer science , cluster analysis , information hiding , envelope (radar) , algorithm , artificial intelligence , computer vision , computer security , telecommunications , radar
K Means Clustering (KM) based data hiding algorithm (KM-DH) is to perform cluster operation which means split pixels into chunks from already encrypted image. Under Consideration of splitted pixels find place to allocate information Authenticated person encrypt the image pixels with their key to prepare envelope image then flow goes by grouping the pixels to stuff the already encrypted image of lowest bits to generate place to allocate data using K means Clustering methods with the help of secret key it form split up matrix.In Receiver side after getting the encrypted data they can withdraw data and image separately without overlapping each other using data and image encryption key.At the same time receiver can also get both the image and data without any bug by dimensional link.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here