Mody University of Science and Technology Laxmangarh, Sikar, India, Pin
|
|
- Alyson Carpenter
- 5 years ago
- Views:
Transcription
1 Different Visual Cryptographic Schemes and Their Past, Present and Future Aspects Ms. Urvashi Yadav 1, Mr. Nisheeth Saxena 2 1 MTech Student, 2 Assistant Professor, 1,2 Mody University of Science and Technology Laxmangarh, Sikar, India, Pin urvashi.yadav16@gmail.com, 2 nisheethsaxena.fet@modyuniversity.ac.in Abstract: Visual Cryptography is a technique for encrypting an image with the help of encryption algorithms, but for decryption no algorithm is required. Decryption is done only by the human visions. The image is divided into the shares and by placing an appropriate number of shares in right order, decryption can be performed. This technique is used for the visual information such as pictures, texts etc. to be encrypted in such a manner that it can be decrypted only by the human visions, without any help of any decryption algorithms. This paper is the survey for many visual cryptographic algorithms based on the past studies. Keywords: Visual cryptography, Visual cryptography schemes, Meaningful shares, Pixels. 1. INTRODUCTION With the emerging transmitting multimedia data over the internet, the security of the data has given much more importance. As a result, there is a rapid advancement in the different types of Internet technologies, the information can be transmitted all over the world from any place through the Internet. Some data that is to be transmitted online can be more important as the secret image, so before sending the data and trusting the speed of the Internet or its attractive offers, the sender have to be more concern about the security issues. With the growing era of electronic commerce, there is the requirement to solve the issue of information security or safety in today s expanding open network scenario. The encrypting technologies of the standard cryptography are used to make the information much secure or to protect the information security. With these technologies, after encryption, the data turns into the unstable form and then can be retrieved by using a correct key. If the key is wrong, the data cannot be retrieved and the unauthorized access of data cannot be done. So the encrypted data cannot be retrieved without the correct key. Visual cryptography is an emerging cryptographic technology, which was proposed by Naor and Shamir [1] in This technique was based on the human vision for the decryption of the encrypted image. A person who has no knowledge of cryptography can also decrypt the image. It does not need any cryptographic algorithms or other complex calculations. It was also secure, so that no hacker could perceive any idea about the secret image or the cover image. They proposed the scheme named as ( k, n) -threshold visual secret sharing scheme, and also can referred to as visual cryptography (VC) [1]. The main characteristic of this scheme was that the decryption of the secret image can be done with the human vision only without making effort like to solve any complex computation. Their scheme could hide the secret image into n distinct shares that can also be called as n distinct images. The secret image can be reformed by placing or stacking as many as k shares. Each share is the collection of random pixels, in which each share is meaningless if counted Page 127
2 individually. Single share revels nothing if it is not stacked with the other shares. So, one share individually is meaningless. Doing so, the security of the secret image increased, that is, transmitted through Internet. VC technique is a simple technique in which the data D is divided into n shares, after encryption D can be reconstructed from any of the k shares out of n. If k -1shares are stacked together, then it will reveal no information about the data D.it is compulsory to stack total k shares out of n. It can understand with the help of a simple example. Suppose there are 6 thieves having the same account in the bank. The password is divided in such a way that less than 4 thieves cannot be able to access the account, it is compulsory to present 4 thieves at a time to access the account. There are many VC schemes or methods have been proposed after the scheme of Naor and Shamir [1]. The basic scheme takes binary images only as secret images which can be black and white designs. The basic 2 out of 2 scheme of visual cryptography is shown in Fig Later on, researchers work on the colored images. security model. To solve the subject of the basic model leads to the general access structures given by Atenise et al [3], in which an access structure is the identification of all authorized and unauthorized subsets of n shares. The secret image can be decrypt with the subsets of k or more authorized shares but, if the shares are stacking together which is less than the number of authorized shares or if unauthorized shares are stacked then no information or data about the secret image is revealed. This scheme of general access structure for the pixel expansion is much better than the previous ones [1]. 2.2 Visual cryptography for gray level images Earlier the achievements in visual cryptography were restricted to the binary images only which was inadequate in the real time applications. The new technique in visual cryptography for the gray level images with the use of different dithering techniques was proposed by Chang et al [4]. For the conversion of the gray scaled images to the binary images dithering technique is used in place of using gray sub pixels to the shares. Then the existing visual cryptography schemes are applied to create shares. The results of this scheme is average with respect to the relative size and decrypted image quality, if the gray levels counts of the original image reaches to 256. This can be understood with the help of Fig. 2. Figure 1: A Visual Cryptography 2 out of 2 Scheme [2] 2. VISUAL CRYPTOGRAPHY SCHEMES Some of the Visual Cryptography Schemes are as follows [2]: 2.1 Visual cryptography for general access structures When any k shares are used to decode the secret image from ( k, n) Basic model results decrease in Figure 2: Visual cryptography for gray level [4] Page 128
3 2.3 Recursive threshold visual cryptography Abhishek et al [5] proposed a new approach for the recursive threshold visual cryptography removes the problem of inefficiency in terms of the number of bits of image per bit of shares. This scheme hides short secrets in shares of the images of larger sizes which can be double at each step. Network load found very less while make use of recursive threshold visual cryptography into network applications. Fig 3 shows the regeneration of smaller images from the shares. while [6] forms the extended visual cryptography scheme appropriate for natural images. Figure 4: Basic idea for proposed system [6] 2.5 Halftone visual cryptography The shares were of poor quality that was generated in [6] and the suspicion of data encryption increases, again. To increase the quality of the meaningful shares Zhou et al [7] proposed a new technique based on halftone visual cryptography. In halftone visual ' P ', which is cryptography as shown in Fig 5, a pixel secret as well as binary, is encoded into an array of 'n share, mentioned to Q sub pixels in each ' 1 Q 2 as halftone cells. Visually satisfying halftone shares can get by the use of halftone cells of proper size. This method helps in maintaining the security and the contrast. Figure 3: Regeneration of smaller images from the shares [5] 2.4 Extended visual cryptography for natural images There were limitations in all of the visual cryptographic algorithms which hold the objectives of the VC. There were the random patterns which carries no visual information, lifting the doubt of data encryption. Then extended visual cryptography for natural images has been proposed by Nakajima et al [6], which define meaningful shares of binary images as shown in Fig 4. It helps in reducing the suspect of the cryptanalyst from an individual shares. Only binary images was handled by the earlier researches, Figure 5: Halftone visual cryptography scheme (2 out of 2) [8] 2.6 Visual cryptography for colored images The quality of the decoded binary images was degraded by the new researches in visual cryptography which makes it inappropriate for the Page 129
4 security of colored images. Then a new approach is proposed for the colored images in visual cryptography by Liu et al [9]. They proposed three new approaches as given below: 1. In the first approach, the colors from the secret image of the shares prints with the same method that is used in basic model. Larger pixel expansion method was used which degrades the quality of the decrypted colored image. 2. In the second approach, color image is converted into the black and white images on the basis of three color channels; they are red, green, blue or equivalent to cyan, magenta and yellow. Then black and white VCS are applied to each color channels. This decreases the pixel expansion but the quality of the decoded image is reduced due to halftone process. 3. In the third approach, the pixel of the color image is represented in the binary format and at the bit-level, the secret image encrypts. This approach gives better quality of the image but requires a decoding device to decode the image. Based on the above mentioned approaches when applied on an image give results as shown properly in Fig. 6. contrast, when the quality of the image is not only an issue but quite rare. The quality of the original image degrades by the use of digital half-toning techniques. The quality degrades due to its intrinsic lossy nature and to recover the original image from half-toning stage is nearly impossible. A new encoding method is proposed by Jin et al [10] that enable transforming the gray scale and color images into monochrome images without any information loss. By integrating the new technique of encoding into visual cryptography scheme results in exact recovery of the gray scale or the color image. 2.8 Regional incrementing visual cryptography In traditional VC schemes, all the pixels are shared in the secret image by the use of a single encoding rule. This sharing strategy disclose either the whole image or no image, therefore it limits to have the same secret properties in an image. So, a new technique of sharing the secrets in multiple secrecy level in an image has been proposed by Wang et al [11] known as Region Incrementing Visual Cryptography. This scheme has ' n' level. An image 'S' has been appointed to numerous areas connected with secret levels, and encodes shares with the following features: (a) No secrets from 'S' can be obtained to the shares. (b) Any t( 2 t n 1) shares can used to show ( t 1) levels of secrets. (c) Users are unknown of the number and locations of not so far revealed secrets. (d) If all of the ( n 1) shares are available together then all the secrets in 'S' can be revealed. The results of the RIVC scheme that applies on an image are shown in Fig 7. Figure 6: Experimental results for colored images [9] 2.7 Progressive visual cryptography In the traditional schemes for the color visual cryptography, VCS comes in light due to loss of Page 130
5 Jagdeep et al [14] proposed an approach to secure the image shares by the use of watermarking techniques. The shares can be made invisible by hiding them into the host images and authentication is provided for the shares. This can be done with the use of digital watermarking. Discrete Cosine Transform (DCT) is used to embed the shares into the host image. This produces a less distorted image as compared to the original. This scheme makes the share more secure, meaningful and robust against attacks like blurring, motion blurring and sharpening etc. These different attacks on the image are shown in Fig 8. Figure 7: Results of RIVC Scheme [11] 2.9 Segment based visual cryptography All the visual cryptography schemes discussed above is based on the pixels of the input image. The main drawback of the pixel oriented visual cryptography is loss in the decoded image which is directly related to the pixel expansion. Borchert et al [12] proposed a new approach based on the small segments which encrypts the smallest unit i.e. pixel. The benefit of this scheme based on segment over pixel is to make easy for the human eye to identify the symbols. The encoded messages contains numbers fundamentally manages only binary images Visual Cryptography in images using steganography Khalil et al [13] propose a new approach to make the security better with the use of steganography. To hide the messages in image the existing methods is merge with the steganalysis technique. By using this, the level of secrecy and security becomes high with the limitations of course. Two methods has been propose, the first was all about combining two techniques together i.e. steganography and cryptography, if cryptanalysis is not used to retrieve the text from the secret image then it will be harder to retrieve the message again. The second method relies only on steganography, no use of cryptographic techniques Visual cryptographic technique to secure image shares Shares can be generated from the image with the help of visual cryptographic techniques. But it is more important to secure the generated image shares. Figure 8: Images after different attacks (a) blur, (b) motion blur, (c) sharpening [14] 3. APPLICATIONS Visual Cryptography Schemes are able to decode the hidden images based on human visual systems, without any help of any cryptographic algorithm. This property can be used in many cryptographic encryption applications. This section includes some applications of Visual Cryptography Schemes such as E-voting system, Financial documents and its copyright protections [15]. a. Electronic Balloting System In the present age, mostly computer systems are used to manage the voting. The voters are expected to trust the voting machines for their invaluable vote that their votes are recorded correctly without any invoice from the machine. This problem can be solved by generating an invoice or a receipt to ensure the voters that their votes are counted. Nevertheless, this could wrongly impact on the voters, which creates coercion or vote selling problems. To solve this muddle, Chaum [16] proposed a Secret-Ballot Receipts which Page 131
6 is based on (2, 2) threshold binary VCS. It generates an encrypted receipt to each and every voter which let them to confirm the election outcome-even if all the election computers and records were compromised. A double layer receipt that prints voter s voting decision will be received by you, at the polling station. Then you will be asked to present one layer to the poll operator who will destroy it instantly with paper shredder and the other one layer will become unreadable. The serial number will be provided on the receipt which you can later check on the election Website to ensure that your vote is not altered or deleted. It will generate a posted receipt that will look similar as the previous one. No software is required to verify this; just simply print the receipt and inlay it with the original receipt. There are two plus points of this system. First, if an election system is failed then the receipt that is not posted can be used as physical evidence. Second, guarantee of the votes is given to the voters that are recorded correctly at the polling booth. Nobody can decode it without knowing the secret keys with the help of any decryption algorithm, but this can be done only after surrendering of a layer of the receipt. Third, if the election systems are compromised, there is limited number of ways that the system could alter the voting. b. Encrypting Financial documents Transmission of confidential documents over the internet can be done with the VCS principle. This kind of system is proposed by Hawkes et al [17] which is named as VCRPT. VCRYPT can encode the image with the specified ( k, n) VCS. Each of the encoded n shares sent to the receiver with the help of s or Ftp. The decoding of the VCRYPT needs bitwise OR operation on all shares in the stored directory that requires no effort of cryptographic calculation. No attacker which can intercepts into the m of n shares where m k will not gain any data or information about the financial documents. Besides, it is not possible to change the contents of the documents until all shares are stopped, changed and re-introduce over the network. As we all know, financial documents consists of a lot of digits, hence, after implementing VCS, we expect that the greying effect will block us from acknowledge the fuzzy digits in decoded documents. This problem can be solved with the post altering method, proposed by the VCRYPT, to return the decoded image exactly to its original form. It calculates each set of m sub-pixels in contrast to the encoding threshold and in result; it shows the last pixel as black, if the number of the black sub-pixels is greater than the threshold, otherwise the last pixel will be white. 4. CONCLUSION This paper is the survey of the visual cryptographic schemes, which gives us a basic idea about the visual cryptography. This paper provides an on the spot glimpses of past and current research trends in the field of visual cryptography. This paper will also give a future direction to the current researchers in the same field. REFERENCES [1] M. Naor, A. Shamir, in: A. De Santis (Ed.), Visual Cryptography, Advances in Cryptology: Eurpocrypt 94, Lecture Notes in Computer Science, Vol. 950, Springer, Berlin, 1995, pp [2] Chandramathi S., Ramesh Kumar R., Suresh R. and Harish S., An overview of visual cryptography, International Journal of Computational Intelligence Techniques, ISSN: & E-ISSN: Volume 1, Issue 1, PP-32-37, [3] G.Ateniese, C.Blundo, A.DeSantis, D.R.S tinson, Visual cryptography for general access structures, Proc.ICALP96, Springer, Berlin, 1996, pp [4] Chang-Chou Lin, Wen-Hsiang Tsai, Visual cryptography for gray-level images by dithering techniques, Pattern Recognition Letters, v.24 n.1-3. [5] Abhishek Parakh, Subhash Kak: A Recursive Threshold Visual Cryptography Scheme CoRR abs/ : (2009). [6] Nakajima, M. and Yamaguchi, Y., Extended visual cryptography for natural images, Journal of WSCG. v10 i Page 132
7 [7] Zhi Zhou, Gonzalo R. Arce and Giovanni Di Crescenzo, Halftone Visual Cryptography, IEEE Transactios On Image Processing, Vol. 15, No. 8, August [8] Yuanfeng Liu, Zhongmin Wang, Halftone Visual Cryptography with Color Shares, IEEE International Conference on Granular Computing, [9] Liu F., Wu C.K., Lin X.J., Colour visual cryptography schemes, IEEE, Information Security, IET (Volume:2, Issue: 4), December [10] Jin, D., Yan, W. and Kankanhalli, M.S., Progressive color visual cryptography. J. Electron. Imaging. v14 i3. [11] Wang, R.Z., Ran-Zan, Region Incrementing Visual Cryptography, SPLetters(16), No. 8, August 2009, pp [12] Bernd Borchert, Klaus Reinhardt: Abh or- und manipulation ssichere Verschl usselung f ur Online Accounts. Patent application, [13] Jim Cai, A Short Survey On Visual Cryptography Schemes. [14] Khalil Challita and Hikmat Farhat, Combining Steganography and Cryptography: New Directions, International Journal on New Computer Architectures and Their Applications (IJNCAA) 1(1): The Society of Digital Information and Wireless Communications, [15] Jagdeep Verma, Dr.Vineeta Khemchandani, A Visual Cryptographic Technique to Secure Image Shares, Vol. 2, Issue 1, Jan-Feb [16] D Chaum, Secret-ballot receipts: True voter-veriable elections, IEEE Security and Privacy, [17] W. Hawkes, A. Yasinsac, C. Cline, An Application of Visual Cryptography to Financial Documents, Florida State University (2000). Page 133
Visual Cryptography Scheme with Authentication Using Shamir Andmk Reddy Techniques
International Refereed Journal of Engineering and Science (IRJES) ISSN (Online) 2319-183X, (Print) 2319-1821 Volume 5, Issue 5 (May 2016), PP.07-14 Visual Cryptography Scheme with Authentication Using
More informationA Novel Model for Encryption of Telugu Text Using Visual Cryptography Scheme
A Novel Model for Encryption of Telugu Text Using Visual Cryptography Scheme G. Lakshmeeswari *, D. Rajya Lakshmi, Y. Srinivas, and G. Hima Bindu GIT, GITAM University, Visakhapatnam, Andhra Pradesh {lak_pr,rdavuluri}@yahoo.com,
More informationIMPROVED ALGORITHM FOR VISUAL CRYPTOGRAPHY USING REGION INCREMENTATION
Int. J. Engg. Res. & Sci. & Tech. 24 Priyanka Agrawal and Vijay Kumar Sharma, 24 Research Paper ISSN 239-599 www.ijerst.com Vol. 3, No. 4, November 24 24 IJERST. All Rights Reserved IMPROVED ALGORITHM
More informationA NovelQR-Code Authentication Protocol Using Visual Cryptography for Secure Communications
I J C T A, 9(2) 2016, pp. 967-974 International Science Press A NovelQR-Code Authentication Protocol Using Visual Cryptography for Secure Communications A. John Blesswin 1, A. Genitha 2 and G. Selvamary
More informationA NOVEL SECURED BOOLEAN BASED SECRET IMAGE SHARING SCHEME
VOL 13, NO 13, JULY 2018 ISSN 1819-6608 2006-2018 Asian Research Publishing Network (ARPN) All rights reserved wwwarpnjournalscom A NOVEL SECURED BOOLEAN BASED SECRET IMAGE SHARING SCHEME Javvaji V K Ratnam
More informationVisual Secret Sharing Scheme using Grayscale Images
Visual Secret Sharing Scheme using Grayscale Images Sandeep Katta Department of Computer Science, Oklahoma State University Stillwater, OK 74078 ABSTRACT: Pixel expansion and the quality of the reconstructed
More informationA Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and MAC Techniques
Bashar S. Mahdi Alia K. Abdul Hassan Department of Computer Science, University of Technology, Baghdad, Iraq A Novel Secure Digital Watermark Generation from Public Share by Using Visual Cryptography and
More informationVisual Cryptography Scheme for Colored Image using XOR with Random Key Generation
www.ijecs.in International Journal Of Engineering And Computer Science ISSN: 2319-7242 Volume 5 Issue 4 April 2016, Page No. 16282-16287 Visual Cryptography Scheme for Colored Image using XOR with Random
More informationDesign and Performance Evaluation of Boolean based Secret Image Sharing Scheme
Design and Performance Evaluation of Boolean based Secret Image Sharing Scheme Javvaji V.K. Ratnam 1, T. Sreenivasulu Reddy 2 and P. Ramana Reddy 3 1 Research Scholar, Faculty of Electronics and Communication
More informationCheating Prevention Schemes for Visual Cryptography
Cheating Prevention Schemes for Visual Cryptography Biltta P George Computer Science and Engineering Adi Shankara Institute of Engineering and Technology Kalady, India Deepika M P Computer Science and
More informationUse of Visual Cryptography and Neural Networks to Enhance Security in Image Steganography
Use of Visual Cryptography and Neural Networks to Enhance Security in Image Steganography K.S.Seethalakshmi (Department of Computer Science and Engineering, RVCE / VTU, INDIA) ABSTRACT : As a result of
More informationSecret Image Sharing Scheme Based on a Boolean Operation
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 14, No 2 Sofia 2014 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.2478/cait-2014-0023 Secret Image Sharing Scheme Based
More informationINTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET)
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 6367(Print), ISSN 0976 6367(Print) ISSN 0976 6375(Online)
More informationImplementation of IRIS recognition for Securing Online Payment
2015 IJSRSET Volume 1 Issue 1 Print ISSN : 2395-1990 Online ISSN : 2394-4099 Themed Section: Engineering and Technology Implementation of IRIS recognition for Securing Online Payment B. KrishnaKumar 1,
More informationMeaningful Shadows for Image Secret Sharing with Steganography and Authentication Techniques
Journal of Information Hiding and Multimedia Signal Processing 2014 ISSN 2073-4212 Ubiquitous International Volume 5, Number 3, July 2014 Meaningful Shadows for Image Secret Sharing with Steganography
More informationRecursive Information Hiding in Visual Cryptography
Proceedings of 2nd Annual Conference on Theoretical and Applied Computer Science, November 2010, Stillwater, OK 20 Recursive Information Hiding in Visual Cryptography Sandeep Katta Computer Science Department
More informationDigital Image Steganography Techniques: Case Study. Karnataka, India.
ISSN: 2320 8791 (Impact Factor: 1.479) Digital Image Steganography Techniques: Case Study Santosh Kumar.S 1, Archana.M 2 1 Department of Electronicsand Communication Engineering, Sri Venkateshwara College
More informationHighly Secure Invertible Data Embedding Scheme Using Histogram Shifting Method
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 8 August, 2014 Page No. 7932-7937 Highly Secure Invertible Data Embedding Scheme Using Histogram Shifting
More informationThe Comparative Study on Visual Cryptography and Random Grid Cryptography
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 12, Issue 2 (May. - Jun. 2013), PP 04-14 The Comparative Study on Visual Cryptography and Random Grid Cryptography
More informationAN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS
AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS G Prakash 1,TVS Gowtham Prasad 2, T.Ravi Kumar Naidu 3 1MTech(DECS) student, Department of ECE, sree vidyanikethan
More informationUser-Friendly Sharing System using Polynomials with Different Primes in Two Images
User-Friendly Sharing System using Polynomials with Different Primes in Two Images Hung P. Vo Department of Engineering and Technology, Tra Vinh University, No. 16 National Road 53, Tra Vinh City, Tra
More informationData Hiding on Text Using Big-5 Code
Data Hiding on Text Using Big-5 Code Jun-Chou Chuang 1 and Yu-Chen Hu 2 1 Department of Computer Science and Communication Engineering Providence University 200 Chung-Chi Rd., Shalu, Taichung 43301, Republic
More informationSECURED TRANSMISSION OF BIOMETRIC CONTENT USING VISUAL CRYPTOGRAPHY
Volume 119 No. 15 2018, 1557-1564 ISSN: 1314-3395 (on-line version) url: http://www.acadpubl.eu/hub/ http://www.acadpubl.eu/hub/ SECURED TRANSMISSION OF BIOMETRIC CONTENT USING VISUAL CRYPTOGRAPHY S. EsaiPuvanesh
More informationVisual Cryptography of Animated GIF Image Based on XOR Operation
2017 International Conference on dvanced Computing and pplications Visual Cryptography of nimated GIF Image Based on XOR Operation Rinaldi Munir School of Electrical Engineering and Informatics Institut
More informationA BTC-COMPRESSED DOMAIN INFORMATION HIDING METHOD BASED ON HISTOGRAM MODIFICATION AND VISUAL CRYPTOGRAPHY. Hang-Yu Fan and Zhe-Ming Lu
International Journal of Innovative Computing, Information and Control ICIC International c 2016 ISSN 1349-4198 Volume 12, Number 2, April 2016 pp. 395 405 A BTC-COMPRESSED DOMAIN INFORMATION HIDING METHOD
More informationA Reversible Data Hiding Scheme for BTC- Compressed Images
IJACSA International Journal of Advanced Computer Science and Applications, A Reversible Data Hiding Scheme for BTC- Compressed Images Ching-Chiuan Lin Shih-Chieh Chen Department of Multimedia and Game
More informationSECRETLY CONCEALING MESSAGE USING ADVANCED IMAGE PROCESSING
International Journal of Engineering Research ISSN: 2348-4039 & Management Technology May-2017 Volume- 4, Issue-3 Email: editor@ijermt.org www.ijermt.org SECRETLY CONCEALING MESSAGE USING ADVANCED IMAGE
More informationBit Adjusting Image Steganography in Blue Channel using AES and Secured Hash Function
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 6.017 IJCSMC,
More informationSteganography using MATLAB
ABHIYANTRIKI Steganography using MATLAB An International Journal of Engineering & Technology (A Peer Reviewed & Indexed Journal) Vol. 3, No. 5 (May, 2016) http://www.aijet.in/ eissn: 2394-627X Srikant
More informationA New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4
IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 08, 2014 ISSN (online): 2321-0613 A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam
More informationImage Encryption Using Arnold s Cat Map and Logistic Map for Secure Transmission
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 6, June 2015, pg.194
More informationKeywords Stegnography, stego-image, Diamond Encoding, DCT,stego-frame and stego video. BLOCK DIAGRAM
Volume 6, Issue 1, January 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Information
More informationAbstract. Keywords: Genetic Algorithm, Mean Square Error, Peak Signal to noise Ratio, Image fidelity. 1. Introduction
A Report on Genetic Algorithm based Steganography for Image Authentication by Amrita Khamrui Enrolled Scholar Department of Computer Science & Engineering, Kalyani University Prof. (Dr.) J K Mandal Professor
More informationNetwork Security Issues and Cryptography
Network Security Issues and Cryptography PriyaTrivedi 1, Sanya Harneja 2 1 Information Technology, Maharishi Dayanand University Farrukhnagar, Gurgaon, Haryana, India 2 Information Technology, Maharishi
More informationThreshold Visual Cryptography Scheme for Color Images with No Pixel Expansion
ISBN 978-952-5726-07-7 (Print), 978-952-5726-08-4 (CD-ROM) Proceedings of the Second Symposium International Computer Science and Computational Technology(ISCSCT 09) Huangshan, P. R. China, 26-28,Dec.
More informationImplementation of Random Byte Hiding algorithm in Video Steganography
Implementation of Random Byte Hiding algorithm in Video Steganography S.Aswath 1, K.Akshara 2, P.Pavithra 2, D.S.Abinaya 2 Asssisant Professor 1, Student 2 (IV Year) Department of Electronics and Communication
More informationA Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach
www.ijcsi.org 402 A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach Gunjan Nehru 1, Puja Dhar 2 1 Department of Information Technology, IEC-Group of Institutions
More informationEnhanced LSB Based Audio Steganography
Enhanced LSB Based Audio Steganography Prof.Dighe Mohit dighe.mohit@gmail.com Miss. Kavade Priyanka kavade.priyanka@gmail.com Mr. Raje Lakhan lakhan2030@gmail.com Miss.Harale prajakta harale.prajakta15@gmail.com
More informationSurvey paper - Audio-Video Steganography Using Anti Forensics Technique
Survey paper - Audio-Video Steganography Using Anti Forensics Technique Ms. V.Sarangpure 1 ; Mrs. R. B. Talmale 2 ;Ms. M. Domke 3 1 Final Year M. Tech (CSE), Tulsiramji Gaikwad Patil College of Engineering
More informationRecursive Visual Secret Sharing Scheme using Fingerprint. Authentication
Recursive Visual Secret Sharing Scheme using Fingerprint Authentication Mayura Kinikar Viraj Thakur Sandesh Sonawane Department of Computer Engineering MAE, Alandi,Pune-411006 University of PUNE,INDIA.
More informationSTEGANOGRAPHY: THE ART OF COVERT COMMUNICATION
Journal homepage: www.mjret.in STEGANOGRAPHY: THE ART OF COVERT COMMUNICATION Sudhanshi Sharma 1, Umesh Kumar 2 Computer Engineering, Govt. Mahila Engineering College, Ajmer, India 1 sudhanshisharma91@gmail.com,
More informationVisual Secret Sharing Scheme with Autostereogram*
Visual Secret Sharing Scheme with Autostereogram* Feng Yi, Daoshun Wang** and Yiqi Dai Department of Computer Science and Technology, Tsinghua University, Beijing, 100084, China Abstract. Visual secret
More informationVARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS
VARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS Anita Pradhan Department of CSE, Sri Sivani College of Engineering, Srikakulam, Andhra Pradesh, India anita.pradhan15@gmail.com
More informationRobust DWT Based Technique for Digital Watermarking
Robust DWT Based Technique for Digital Watermarking Mamta Jain Department of Electronics & Communication Institute of Engineering & Technology Alwar er.mamtajain@gmail.com Abstract Hiding the information
More informationImplementation of ContourLet Transform For Copyright Protection of Color Images
Implementation of ContourLet Transform For Copyright Protection of Color Images * S.janardhanaRao,** Dr K.Rameshbabu Abstract In this paper, a watermarking algorithm that uses the wavelet transform with
More informationInformation Cloaking Technique with Tree Based Similarity
Information Cloaking Technique with Tree Based Similarity C.Bharathipriya [1], K.Lakshminarayanan [2] 1 Final Year, Computer Science and Engineering, Mailam Engineering College, 2 Assistant Professor,
More informationLSB Based Audio Steganography Using Pattern Matching
ISSN: 359-0040 Vol 2 Issue, November - 205 LSB Based Audio Steganography Using Pattern Matching Mr Ratul Choudhury Student, Dept of Computer Sc & Engg Dept University of Calcutta Kolkata, India ratulchowdhury@iemcalcom
More informationInternational Journal of Computer Engineering and Applications,
International Journal of Computer Engineering and Applications, Volume XII, Issue I, Jan. 18, www.ijcea.com ISSN 2321-3469 SECURING TEXT DATA BY HIDING IN AN IMAGE USING AES CRYPTOGRAPHY AND LSB STEGANOGRAPHY
More informationWatermarking Using Bit Plane Complexity Segmentation and Artificial Neural Network Rashmeet Kaur Chawla 1, Sunil Kumar Muttoo 2
International Journal of Scientific Research and Management (IJSRM) Volume 5 Issue 06 Pages 5378-5385 2017 Website: www.ijsrm.in ISSN (e): 2321-3418 Index Copernicus value (2015): 57.47 DOI: 10.18535/ijsrm/v5i6.04
More informationHiding of Random Permutated Encrypted Text using LSB Steganography with Random Pixels Generator
Hiding of Random Permutated Encrypted Text using LSB Steganography with Random Pixels Generator Noor Kareem Jumaa Department of Computer Technology Engineering Al-Mansour University College, Iraq ABSTRACT
More informationDIGITAL STEGANOGRAPHY 1 DIGITAL STEGANOGRAPHY
DIGITAL STEGANOGRAPHY 1 DIGITAL STEGANOGRAPHY DIGITAL STEGANOGRAPHY 2 Abstract Steganography derives from a Greek word and means covered writing. It is a sector of computer information security. Cryptography
More informationImage Processing and Watermark
IJCST Vo l. 7, Is s u e 1, Ja n - Ma r c h 2016 ISSN : 0976-8491 (Online) ISSN : 2229-4333 (Print) Image Processing and Watermark 1 Dr. Amit Verma, 2 Navdeep Kaur Gill 1,2 Dept. Computer Science and Engineering,
More informationA NOVEL CRYPTOGRAPHICAL SCHEME FOR MOBILE AD-HOC NETWORK SECURITY
IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 03, 2014 ISSN (online): 2321-0613 A NOVEL CRYPTOGRAPHICAL SCHEME FOR MOBILE AD-HOC NETWORK SECURITY Surbhi Tahanguria 1
More informationSECURITY PROTECTION OF SOFTWARE PROGRAMS BY INFORMATION SHARING AND AUTHENTICATION TECHNIQUES USING INVISIBLE ASCII CONTROL CODES*
SECURITY PROTECTION OF SOFTWARE PROGRAMS BY INFORMATION SHARING AND AUTHENTICATION TECHNIQUES USING INVISIBLE ASCII CONTROL CODES* 1, 3 I-Shi Lee( 李義溪 ), 1, 2, Wen-Hsiang Tsai ( 蔡文祥 ) 1 Department of Computer
More informationA Modified Approach for Kerberos Authentication Protocol with Secret Image by using Visual Cryptography
A Modified Approach for Kerberos Authentication Protocol with Secret Image by using Visual Cryptography Ashok Kumar J 1, and Gopinath Ganapathy 2 1,2 School of Computer Science, Engineering and Applications
More informationA Novel Spatial Domain Invisible Watermarking Technique Using Canny Edge Detector
A Novel Spatial Domain Invisible Watermarking Technique Using Canny Edge Detector 1 Vardaini M.Tech, Department of Rayat Institute of Engineering and information Technology, Railmajra 2 Anudeep Goraya
More informationPERFORMANCE ANALYSIS OF IMAGE SECURITY BASED ON ENCRYPTED HYBRID COMPRESSION
American Journal of Applied Sciences 11 (7): 1128-1134, 2014 ISSN: 1546-9239 2014 Ramkumar and Raglend, This open access article is distributed under a Creative Commons Attribution (CC-BY) 3.0 license
More informationDIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS
DIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS Murat Furat Mustafa Oral e-mail: mfurat@cu.edu.tr e-mail: moral@mku.edu.tr Cukurova University, Faculty of Engineering,
More informationA Novel Approach for Hiding Encrypted Data in Image, Audio and Video using Steganography
A Novel Approach for Hiding Encrypted Data in Image, Audio and Video using Steganography V. Lokeswara Reddy Associate Professor, Department of CSE, K.S.R.M. College of Engg., Kadapa, Y.S.R. Dist., A.P.(INDIA)
More informationWatermarking Moble Phone Color Images With Error Correction Codes
IOSR Journal of Electronics & Communication Engineering (IOSR-JECE) ISSN(e) : 2278-1684 ISSN(p) : 2320-334X, PP 05-09 www.iosrjournals.org Watermarking Moble Phone Color Images With Error Correction Codes
More informationA compact Aggregate key Cryptosystem for Data Sharing in Cloud Storage systems.
A compact Aggregate key Cryptosystem for Data Sharing in Cloud Storage systems. G Swetha M.Tech Student Dr.N.Chandra Sekhar Reddy Professor & HoD U V N Rajesh Assistant Professor Abstract Cryptography
More informationSECURITY SYSTEM FOR DATA USING STEGANOGRAPHY AND CRYPTOGRAPHY (SSDSC)
SECURITY SYSTEM FOR DATA USING STEGANOGRAPHY AND CRYPTOGRAPHY (SSDSC) Ayman Wazwaz 1, Khalil Abu-haltam 2, Sawan Atawneh 2, Areej Idaes 2, Dalal Salem 2 1 Electrical Engineering Department, Palestine Polytechnic
More informationResearch Article Improvements in Geometry-Based Secret Image Sharing Approach with Steganography
Hindawi Publishing Corporation Mathematical Problems in Engineering Volume 2009, Article ID 187874, 11 pages doi:10.1155/2009/187874 Research Article Improvements in Geometry-Based Secret Image Sharing
More informationA Novel Information Security Scheme using Cryptic Steganography
A Novel Information Security Scheme using Cryptic Steganography B.RAJA RAO Associate Professor, E.C.E Dept raja_rao_b@ yahoo.com P.ANIL KUMAR Assistant Professor, I.T Dept anilkumar_pallikonda@yahoo.co.in
More informationFeature Based Watermarking Algorithm by Adopting Arnold Transform
Feature Based Watermarking Algorithm by Adopting Arnold Transform S.S. Sujatha 1 and M. Mohamed Sathik 2 1 Assistant Professor in Computer Science, S.T. Hindu College, Nagercoil, Tamilnadu, India 2 Associate
More informationChapter 2 Various Problems in Visual Cryptography
Chapter 2 Various Problems in Visual Cryptography 2.1 Alignment Problems Pixel expansion is an important parameter for Visual Cryptography Schemes (VCS) [11, 25, 32, 33]. However, most research in the
More informationImplementation of Security in Cloud Systems Based using Encryption and Steganography
Implementation of Security in Cloud Systems Based using Encryption and Steganography 1 A.Mahesh Babu, 2 G.A. Ramachandra, 3 M.Suresh Babu 1,2 Department of Computer Science & Technology, Sri Krishnadevaraya
More informationEfficient & Secure Data Hiding Using Secret Reference Matrix
Efficient & Secure Data Hiding Using Secret Reference Matrix Laxman Tawade 1, Rajshree Mahajan 2, Chandan Kulthe 3 1 Department of Electronic and Telecommunication Engineering, Pune University, India 2,3
More informationA Data Hiding Model for Image Steganography Using Primes: Towards Data Security
International Journal of Computational Engineering & Management, Vol. 15 Issue 3, May 2012 www..org 1 A Data Hiding Model for Image Steganography Using Primes: Towards Data Security Mamatha.T Assistant
More informationReview On Secrete Sharing Scheme for Color Image Steganography
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 5 (2014), pp. 485-490 International Research Publications House http://www. irphouse.com /ijict.htm Review
More informationRandom Traversing Based Reversible Data Hiding Technique Using PE and LSB
Random Traversing Based Reversible Data Hiding Technique Using PE and LSB Rhythm Katira #1, Prof. V. Thanikaiselvan *2 # ECE Department, VIT University Vellore, Tamil-Nadu, India 1 rhythm.katira2009@vit.ac.in
More informationAN OPTIMIZED TEXT STEGANOGRAPHY APPROACH USING DIFFERENTLY SPELT ENGLISH WORDS
Volume 118 No. 16 2018, 653-666 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu AN OPTIMIZED TEXT STEGANOGRAPHY APPROACH USING DIFFERENTLY SPELT ENGLISH
More information(2, n)-visual Cryptographic Schemes For Color Images With Low Pixel Expansion
(2, n)-visual Cryptographic Schemes For Color Images With Low Pixel Expansion Bhaswar B. Bhattacharya, Abhishek Chakrabortty, Shirshendu Ganguly, Shyamalendu Sinha Indian Statistical Institute, Kolkata
More informationAudio Contents Protection using Invisible Frequency Band Hiding Based on Mel Feature Space Detection: A Review
Journal Science ISSN: 39-7157, ISSN: 39-7157, 1 015 015 Audio Contents Protection using Invisible Frequency Band Hiding Based on Mel Feature Space Detection: A Review Shefali Rani1, Yogesh Kumar 1 (M.Tech
More informationA Formula Diamond Encoding Data Hiding Scheme
Journal of Information Hiding and Multimedia Signal Processing c 2015 ISSN 2073-4212 Ubiquitous International Volume 6, Number 6, November 2015 A Formula Diamond Encoding Data Hiding Scheme Wen-Chung Kuo
More information2.1 Basic Cryptography Concepts
ENEE739B Fall 2005 Part 2 Secure Media Communications 2.1 Basic Cryptography Concepts Min Wu Electrical and Computer Engineering University of Maryland, College Park Outline: Basic Security/Crypto Concepts
More informationPRIVACY PRESERVING RANKED MULTI KEYWORD SEARCH FOR MULTIPLE DATA OWNERS. SRM University, Kattankulathur, Chennai, IN.
Volume 115 No. 6 2017, 585-589 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu PRIVACY PRESERVING RANKED MULTI KEYWORD SEARCH FOR MULTIPLE DATA OWNERS
More informationReversible Data Hiding in Colour Images using AES Data Encryption System
Reversible Data Hiding in Colour Images using AES Data Encryption System M. Prem Anand 1, Y. Karthikeyan 2 1 Assistant Professor 2 M.E Student 1,2 Department of Electronics & Communication Engineering,
More informationEnhanced ECC algorithm over Public Key Cryptography
Enhanced ECC algorithm over Public Key Cryptography 1 2 Miss PrastavanaP P, Mrs. Suraiya PraveenP 1. Student of Jamia Hamdard University, Delhi 2. Assistant Professor in Computer Science Department Abstract
More informationPROTECTION OF PASSWORD USING TEXT STEGANOGRAPHY AND THRESHOLD SECRET SHARING SCHEME
Volume 118 No. 18 2018, 2127-2132 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu PROTECTION OF PASSWORD USING TEXT STEGANOGRAPHY AND THRESHOLD SECRET
More informationCHAPTER 6. LSB based data hiding with double Encryption. 6.1 Introduction
CHAPTER 6 LSB based data hiding with double Encryption 6.1 Introduction In image steganography, the amount of secret data that can be embedded depends on the method and the cover-image as capacity limitation
More informationFusion of Digital Signature & Fingerprint Watermarking using Bit plane slicing
RESEARCH ARTICLE OPEN ACCESS Fusion of Digital Signature & Fingerprint Watermarking using Bit plane slicing Sonali V.Satonkar, Dr.seema Kawathekar Dept. of Computer Science &Information Tehnology Dr.Babasaheb
More informationAdvanced Steganographic Technique Based on Extended Visual Cryptography Scheme
Advanced Steganographic Technique Based on Extended Visual Cryptography Scheme Harshal S. Tekade 1, Prof. Baisa L. Gunjal 2 1 (Amrutvahini College of Engineering,Computer Department,Savitribai Phule Pune
More informationData Hiding in Video
Data Hiding in Video J. J. Chae and B. S. Manjunath Department of Electrical and Computer Engineering University of California, Santa Barbara, CA 9316-956 Email: chaejj, manj@iplab.ece.ucsb.edu Abstract
More informationCPSC 467: Cryptography and Computer Security
CPSC 467: Cryptography and Computer Michael J. Fischer Lecture 4 September 11, 2017 CPSC 467, Lecture 4 1/23 Analyzing Confidentiality of Cryptosystems Secret ballot elections Information protection Adversaries
More informationDigital Watermarking with Copyright Authentication for Image Communication
Digital Watermarking with Copyright Authentication for Image Communication Keta Raval Dept. of Electronics and Communication Patel Institute of Engineering and Science RGPV, Bhopal, M.P., India ketaraval@yahoo.com
More informationRandom Image Embedded in Videos using LSB Insertion Algorithm
Random Image Embedded in Videos using LSB Insertion Algorithm K.Parvathi Divya 1, K.Mahesh 2 Research Scholar 1, * Associate Professor 2 Department of Computer Science and Engg, Alagappa university, Karaikudi.
More informationJeff Hinson CS525, Spring 2010
DIGITAL WATERMARKING Jeff Hinson CS525, Spring 2010 Outline Introduction Challenges Algorithms / Methods Detection Existing Programs Lessons Learned / Conclusion Questions Jeff Hinson CS525 Slide #1 Introduction
More informationSecure Encryption Using Armstrong Number,Color Code ASCII and Prime Number
Advances in Wireless and Mobile Communications. ISSN 0973-6972 Volume 10, Number 6 (2017), pp. 1257-1265 Research India Publications http://www.ripublication.com Secure Encryption Using Armstrong Number,Color
More informationA New Approach to Compressed Image Steganography Using Wavelet Transform
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 5, Ver. III (Sep. Oct. 2015), PP 53-59 www.iosrjournals.org A New Approach to Compressed Image Steganography
More informationSecured Watermarking in DCT Domain using CRT and Complexity Analysis
Secured Watermarking in DCT Domain using CRT and Complexity Analysis Varun Kumar Department of Electronics & Communication Engg Om Institute of Technology and Management, HISAR-125001, INDIA Kuldeep Bhardwaj
More informationA New hybrid method in watermarking using DCT and AES
International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 10, Issue 11 (November 2014), PP.64-69 A New hybrid method in watermarking using
More informationHybrid Stegnography using ImagesVaried PVD+ LSB Detection Program
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 5 May 2015, Page No. 12086-12090 Hybrid Stegnography using ImagesVaried PVD+ LSB Detection Program Shruti
More informationA Secure Image Communication Scheme based on combination of Compression, Cryptography and Steganography
A Secure Image Communication Scheme based on combination of Compression, Cryptography and Steganography Bhavya Ahuja 1, S. K. Muttoo 2, Deepika Aggarwal 3 ABSTRACT In this paper we propose a new technique
More informationVol. 1, Issue VIII, Sep ISSN
Enhancing the Security of Image Encryption Algorithms by Adding Timestamp Lini Abraham 1, Neenu Daniel 2 1 M.Tech Student (CSE), Mahatma Gandhi University Viswajyothi College of Engineering and Technology,
More informationLeast Significant Bit (LSB) and Discrete Cosine Transform (DCT) based Steganography
Least Significant Bit (LSB) and Discrete Cosine Transform (DCT) based Steganography Smruti Ranjan Gouda (Dept. Of computer Science & Engineering, Asst. Professor, Gandhi Group of institutions, Berhampur,
More informationISSN: Page 320
A NEW METHOD FOR ENCRYPTION USING FUZZY SET THEORY Dr.S.S.Dhenakaran, M.Sc., M.Phil., Ph.D, Associate Professor Dept of Computer Science & Engg Alagappa University Karaikudi N.Kavinilavu Research Scholar
More informationSecret Sharing in Audio Steganography
Secret Sharing in Audio Steganography Ka Fai Peter Chan Defence, Peace, Safety & Security (DPSS) Council for Scientific and Industrial Research Pretoria, South Africa kchan@csir.co.za Abstract This paper
More informationAn Efficient Self-Embedding Watermarking Scheme for Colour Image Tamper Detection and Recovery
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 1, January 2015,
More informationText Hiding In Multimedia By Huffman Encoding Algorithm Using Steganography
Text Hiding In Multimedia By Huffman Encoding Algorithm Using Steganography Madhavi V.Kale 1, Prof. Swati A.Patil 2 PG Student, Dept. Of CSE., G.H.Raisoni Institute Of Engineering And Management,Jalgaon
More information