Autonomous Data hiding in an Encrypted Image using KM-DH Algorithm
S.Janani1, M.Shalini2, K.Parkavi3, A.Chandrasekar4
1S.Janani,Computer Science and Engineering, St. Joseph’s College Of Engineering, Chennai, India.
2M.Shalini, Computer Science and Engineering, St. Joseph’s College Of Engineering, Chennai, India.
3K.Parkavi, Computer Science and Engineering, St. Joseph’s College Of Engineering, Chennai, India.
4A.Chandrasekar, Computer Science and Engineering, St. Joseph’s College Of Engineering, Chennai, India.
Manuscript received on November 15, 2019. | Revised Manuscript received on 24 November, 2019. | Manuscript published on December 10, 2019. | PP: 4950-4952 | Volume-9 Issue-2, December 2019. | Retrieval Number: A4524119119/2019©BEIESP | DOI: 10.35940/ijitee.A4524.129219
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: K Means Clustering (KM) based data hiding algorithm (KM-DH) is to perform cluster operation which means split pixels into chunks from already encrypted image. Under Consideration of splitted pixels find place to allocate information Authenticated person encrypt the image pixels with their key to prepare envelope image then flow goes by grouping the pixels to stuff the already encrypted image of lowest bits to generate place to allocate data using K means Clustering methods with the help of secret key it form split up matrix.In Receiver side after getting the encrypted data they can withdraw data and image separately without overlapping each other using data and image encryption key.At the same time receiver can also get both the image and data without any bug by dimensional link.
Keywords: KM-DH Algorithm, Encryption, Secret key
Scope of the Article: Algorithm Engineering