SlideShare a Scribd company logo
1 of 6
Download to read offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
__________________________________________________________________________________________ 
Volume: 03 Special Issue: 03 | May-2014 | NCRIET-2014, Available @ http://www.ijret.org 107 
DOUBLE LAYER SECURITY USING VISUAL CRYPTOGRAPHY AND TRANSFORM BASED STEGANOGRAPHY PallaviB1, Vishala I. L2 1M.Tech 4th SEM, DCN Branch, Visvesvaraya Technological University 2Assistant Professor, Dept of ECE, S.J.C Institute of Technology, Chickballapur, India. Abstract With the recent advances in internet computing in our day to day life the need for communication has increased. Privacy in communication is desired when confidential information is shared between two parties. Mainly this project uses transform based steganography (DCT) and visual cryptography for hiding data. The proposed system provides double layer security. First level of security is achieved by using visual cryptography for the information to be transmitted and this is embedded onto images by using steganography. This project is implemented using Matlab software. In this project the expected result is we take 2 color images and for those we apply DCT and for the DCT transformed images LSB is applied with the bits of the shares which we would have got from V.C. Keywords: DCT, shares, Steganography, Visual Cryptography. 
----------------------------------------------------------------------***-------------------------------------------------------------------- 1. INTRODUCTION Since the rise of internet one of the most important factors of important technology is security of Information. Cryptography was created as a technique for securing secrecy of communication and many different methods have been developed to encrypt and decrypt the data. An important subdivision of information Hiding is steganography. Sometimes it‟s not enough to keep contents of message secret but also it‟s necessary to keep existence of message secret. The technique used to implement this is called steganography. It‟s made up of 2 Greek words “stegos” meaning covered and “Grafia” meaning writing. Steganography is the art and science of invisible communication. The technique of steganography requires Cover Object(C), secret message (M), stego key and stego function (Fe). 
Fig - 1: Basic model of Steganographic system 
1.1 Steganography Methods 
There are 3 ways namely 
 Injection - embeds secret message directly in host medium 
 Substitution – normal data is substituted with the secret data. 
 Generation of new files 
1.2 Steganography Techniques The different categories of Steganography techniques are 
 Substitution system techniques 
 Transform domain techniques 
 Spread spectrum technique 
 Distortion techniques 
 Statistical method techniques 
Steganographic techniques can be broadly classified as 
 Spatial domain techniques 
 Transform domain techniques 
 Hybrid domain techniques 
In case of spatial domain technique all manipulations to the cover object and payload are done in time domain. LSB technique is the most popular spatial domain technique. Transform domain techniques are frequency domain techniques. Image is considered in terms of frequency components. DCT is the most commonly used technique. In case of hybrid domain technique image is divided into cells and then spatial or transform domain technique is applied.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
__________________________________________________________________________________________ 
Volume: 03 Special Issue: 03 | May-2014 | NCRIET-2014, Available @ http://www.ijret.org 108 
To illustrate the process of steganography we consider figure given below 
Fig -2: Prisoners problem The classic model for invisible communication was proposed by Simmons as prisoner‟s problem. Alice and Bob are arrested are for some crime and they are thrown in different cells. They want to develop an escape plan but all communication is arbitrated by Wendy. She will not let them communicate through encryption and hence both parties should communicate invisibly – have to set up subliminal channel. 2. VISUAL CRYPTOGRAPHY It was proposed by Naor and Shamir in 1994. It‟s a scheme which encrypts image into shares but does not require any computations to get back the original image and it‟s an encryption technique used to hide images in such a way that decryption can be performed by human visual system if key is used. Here V.C operates on binary inputs and initially V.C was applied to black and white images but now it‟s extended to color and grey scale images. The easiest way to implement visual cryptography is to print two layers on transparencies. 2.1 How Visual Cryptography Works? Mainly visual cryptography operates on binary inputs. Hence natural images must be converted into halftone images using density of dots in order to simulate grey level. Binary data can be displayed as transparent when printed on transparent screen. Each pixel of the image is divided into smaller blocks. There are always same numbers of black and white blocks. If a pixel is divided into 2 parts there is one black and one white block. If a pixel is divided into 4 parts there are 2 white and 2 black blocks. 
Fig- 3: example of visual cryptography 
The basic model of visual cryptography proposed by Naor and Shamir accepts binary image I as secret image which is divided into n number of shares. Each pixel of image is represented by m sub pixels. The resulting structure of shared image is represented by S where S = [Sij], an n x m matrix. 
Any black and white visual cryptography scheme can be described using 2 n x m Boolean matrices (S0 and S1). S0 is used if pixel in the original image is white and S1 is used if pixel in original image is black. The important parameters in visual cryptography schemes are 
 Pixel expansion (m) 
 Contrast (β) 
The formula to compute contrast in different visual cryptography schemes is Β = αm. In V.C white pixel is represented by 0 and black pixel is represented by 1. There are different visual cryptography schemes such 2 out of 2, 2 out of n, n out of n and k out of n V.C Scheme. The most commonly used is 2 out of 2 schemes. For 2 out of 2 VCS S0 and S1 are as follows S0 = 1010 S1 = 1001 The relative difference α and contrast β is ½ and 1 
Fig - 4: construction of (2, 2) VCS There are 2 collections of matrices C0 and C1. To share a white pixel we choose one of the matrix in C0 and to share black pixel we choose one of the matrix in C1. The first row of chosen matrix is used for share S1 and the second row is used for share S2. The disadvantage is that for every pixel encoded from original image into 2 sub pixels and placed on each share – shares have size of s x 2s if secret image is of size s x s. There is a distortion hence we go for 4 sub pixel layout design. Here pixel is expanded into 2 x 2 sub pixels.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
__________________________________________________________________________________________ 
Volume: 03 Special Issue: 03 | May-2014 | NCRIET-2014, Available @ http://www.ijret.org 109 
S0 = 1 0 1 01 0 1 0 S1 = 1 0 0 10 1 1 0 The relative difference α and β is ½ and 2 respectively. 
Fig -5: construction of (2, 2) VCS with 4 sub pixel layout design. There are various visual cryptography schemes such as (2, 2) VCS, (k, n) VCS, halftone VCS, V.C for grey level image and color images. In this project we mainly focused on (2, 2) V.C.S- here both the shares are required to reveal the secret information.If one share gets lost due to some problem the secret information can‟t be revealed. If V.C has to be used for grey level images dithering technique is used and if V.C has to be used for color images additional processing has to be done – R, G, B has to be used for additive model and cyan, magenta, yellow is used for subtractive model and then the normal V.C scheme is used. 3 METHODOLOGY USED A few techniques are there to implement both steganography and visual cryptography. Among them optimal one can be found out by analyzing tools. As mentioned both steganography and visual cryptography have problems. Whenever they are used independently we have only single layer of security which can be easily broken by intruders. If we combine features of both steganography and visual cryptography then we have 2 layers of security. The steganography technique used in this project is DCT. The advantage in visual cryptography is we don‟t need any computation to decrypt the data. 
Previously the methodology used for encrypting information is steganography or cryptography but in this project we used both – First the information which is to be transmitted is encrypted using visual cryptography and this is embedded onto images using steganography. 
4 ANALYSIS OF THE PROJECT This project is analyzed in terms of DCT transform and V.C. DCT coefficients are used for JPEG compression. We have 1 D DCT and 2 D DCT. 2 D DCT is used. Image compression using DCT is done in the following way 
 Image is broken to smaller blocks of pixels 
 DCT is applied to each block. 
 Each block is compressed through quantization and quantization matrix is entropy encoded. 
 The array of blocks that constitute the image is stored in reduced amount of space. 
c (i, j) is the intensity of pixel in row i and column j and C (u, v) is DCT coefficients. 5 IMPLEMENTATION OF THE PROJECT 
User will send an image and that image with the help of visual cryptography is broken down into 2 shares. We have used (2, 2) V.C.S – in that image is broken down into 2 shares such that no information can be reconstructed without any single
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
__________________________________________________________________________________________ 
Volume: 03 Special Issue: 03 | May-2014 | NCRIET-2014, Available @ http://www.ijret.org 110 
share. The shares are printed in transparencies and the decryption process is performed by stacking the 2 shares. Steganography hiding phase is nothing but here we consider cover image which is split into 3 components – R, G, B. we consider individual shares (bit streams) and they are hidden using bit and, bit or operation. After we complete hiding process for all the pixels present in R, G, B we merge them to get stego image. 
Digital images are mainly of two types (i) 24 bit images and (ii) 8 bit images. In 24 bit images we can embed three bits of information in each pixel .In 8 bit images one bit of information can be hidden. Least significant 3 bits are cleared in the red and green bytes and 2 bits from the blue byte. This can be done by using bit and with 248 which has 3„0‟ in its last 3 least significant bit. This we will do for both red and green bytes. And in the blue byte we bit and with 252 which has 2 „0‟s in its least significant bits. And then we bit or the bits of the text on to these emptied bits Suppose the original 3 pixels are: (11101010 11101000 11001011) Consider binary representation of 74 = 01001010 The first byte 11101010 is converted to 11101000 by using bit and with 248 (11111000). First bit is 1 so the third last bit is left disturbed. Second bit is 1 bit or it to the emptied byte. Third bit is 0 and the emptied bit is kept as such. The same way the last three bits in green byte and last two bits in the blue bit are placed and again filled in the target image called the stego image. 
5.1 Conceptual Design of Project 
5.2 Block Diagram of DCT based Steganography 
The proposed method is used to hide secret object (text, image) into a cover image. DCT transforms image from spatial domain to frequency domain. We convert secret object into binary form and hides the bits chosen in middle and high frequency coefficients.DCT decomposes signal into low, middle and high frequency coefficients. The secret image is hidden in high and middle frequency regions but not in lower region because human visual system is more sensible to modifications that may occur in lower frequency band. 
Fig - 6: Block diagram of DCT Steg Encoding process
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
__________________________________________________________________________________________ 
Volume: 03 Special Issue: 03 | May-2014 | NCRIET-2014, Available @ http://www.ijret.org 111 
Fig- 7: Block diagram of DCT Steg Decoding process 6. RESULTS Coding is done using Matlab and results are shown below. Mainly image is of size M X N (M rows and N columns). Images of formats like – tiff, jpeg, png are available. In Matlabrgb and indexed image is converted to grey scale image. RGB image does not have color image and we check for map variable in case of indexed image (2D).After the code is executed we run the program and there are 5 different modes. If we don‟t specify any mode (mode 0 fixed Thresholding is considered). There are 5 different modes namely 
 Fixed Thresholding 
 Random noise Thresholding 
 Ordered dithering 
 Error diffusion by Floyd and Steinberg 
 Error diffusion by sticky 
Thresholding is an important approach to image segmentation. We assume that image falls in the range of 0 to 255. Pixels of the digital image are processed. And we compare grey scale value of pixel to threshold (128). If pixel value is greater than threshold it‟s black else it‟s white. Whenever color depth needs to be reduced we go for dithering. Dither is a form of noise used to minimize error. There are 3 methods for dithering 
 Add noise to image 
 Use dithering matrix 
 Diffuse error to neighboring pixels 
In coding part we have used dithering matrix method. 
Error diffusion is a technique in which quantization residual is distributed to neighboring pixels that are not yet processed. In case of error diffusion by Floyd and Steinberg error is distributed to neighboring pixels but in case of error diffusion by sticky – output tends to be clean and sharp. 
Fig8: output for fixed Thresholding of autumn.tif The above figure shows the output for mode 0 (fixed Thresholding for image autumn.tif).In Matlab after running our program whenever we type Halftonedemofinal (3) we get output for ordered dithering of image autumn.tif which is shown in figure 8. 
Fig8: output for ordered dithering of autumn.tif
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
__________________________________________________________________________________________ 
Volume: 03 Special Issue: 03 | May-2014 | NCRIET-2014, Available @ http://www.ijret.org 112 
The above figure shows output of steganography application. We can type input one or two in Matlab window. We need to type input message and it appears and also the size is displayed. For decoding the input message is shifted by 2 letters and the output (notepad version is created) 7. CONCLUSIONS In this project we are going to hide the information by combining the features of both steganography and visual cryptography. The proposed system is used to overcome the difficulties faced in existing system and it has several advantages like 2 levels of security, requires computation time for single level of hiding and the proposed system can be used in applications like payment gateways, military, navy, business settlement contracts. REFERENCES [1].J.B.Krenn, “Steganography and Steganalysis” 2004. [2].Dr.EktaWalia, “Analysis of LSB and DCT Based Steganography”, Vol 10, Issue1. [3]. Digital image processing by Gonzalez and woods. [4].Deshpande Neete, “Implementation of LSB steganography and its evaluation for various bits”. [5].Zhi Zhou, “halftone visual cryptography”, IEEE transactions on Image processing, August 2006. [6].George, saad, “image hiding using magnitude modulation on DCT coefficients”. Journal of applied Computer Sciences 2010 [7].Chandramati, Ramesh, “Overview of Various cryptography schemes,” 2010 [8]. Websites like Google, Wikipedia.

More Related Content

What's hot

Visual Cryptography for biometric privacy
Visual Cryptography for biometric privacyVisual Cryptography for biometric privacy
Visual Cryptography for biometric privacywaseem ahmad
 
A comparatively study on visual cryptography
A comparatively study on visual cryptographyA comparatively study on visual cryptography
A comparatively study on visual cryptographyeSAT Journals
 
A CHAOTIC CONFUSION-DIFFUSION IMAGE ENCRYPTION BASED ON HENON MAP
A CHAOTIC CONFUSION-DIFFUSION IMAGE ENCRYPTION BASED ON HENON MAPA CHAOTIC CONFUSION-DIFFUSION IMAGE ENCRYPTION BASED ON HENON MAP
A CHAOTIC CONFUSION-DIFFUSION IMAGE ENCRYPTION BASED ON HENON MAPIJNSA Journal
 
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...idescitation
 
Secured data hiding by using extended visual
Secured data hiding by using extended visualSecured data hiding by using extended visual
Secured data hiding by using extended visualeSAT Publishing House
 
Secured data hiding by using extended visual cryptography
Secured data hiding by using extended visual cryptographySecured data hiding by using extended visual cryptography
Secured data hiding by using extended visual cryptographyeSAT Journals
 
IMPACT OF ERROR FILTERS ON SHARES IN HALFTONE VISUAL CRYPTOGRAPHY
IMPACT OF ERROR FILTERS ON SHARES IN HALFTONE VISUAL CRYPTOGRAPHYIMPACT OF ERROR FILTERS ON SHARES IN HALFTONE VISUAL CRYPTOGRAPHY
IMPACT OF ERROR FILTERS ON SHARES IN HALFTONE VISUAL CRYPTOGRAPHYcscpconf
 
Visual cryptography for color images
Visual cryptography for color imagesVisual cryptography for color images
Visual cryptography for color imagesIIT Delhi
 
Data Hiding and Retrieval using Visual Cryptography
Data Hiding and Retrieval using Visual CryptographyData Hiding and Retrieval using Visual Cryptography
Data Hiding and Retrieval using Visual CryptographyAM Publications
 
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDSHYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDSIJNSA Journal
 
11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature maps11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature mapsAlexander Decker
 
Ax31139148
Ax31139148Ax31139148
Ax31139148IJMER
 

What's hot (19)

Visual Cryptography for biometric privacy
Visual Cryptography for biometric privacyVisual Cryptography for biometric privacy
Visual Cryptography for biometric privacy
 
A comparatively study on visual cryptography
A comparatively study on visual cryptographyA comparatively study on visual cryptography
A comparatively study on visual cryptography
 
A CHAOTIC CONFUSION-DIFFUSION IMAGE ENCRYPTION BASED ON HENON MAP
A CHAOTIC CONFUSION-DIFFUSION IMAGE ENCRYPTION BASED ON HENON MAPA CHAOTIC CONFUSION-DIFFUSION IMAGE ENCRYPTION BASED ON HENON MAP
A CHAOTIC CONFUSION-DIFFUSION IMAGE ENCRYPTION BASED ON HENON MAP
 
Vc pred
Vc predVc pred
Vc pred
 
F42022628
F42022628F42022628
F42022628
 
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
 
Secured data hiding by using extended visual
Secured data hiding by using extended visualSecured data hiding by using extended visual
Secured data hiding by using extended visual
 
Secured data hiding by using extended visual cryptography
Secured data hiding by using extended visual cryptographySecured data hiding by using extended visual cryptography
Secured data hiding by using extended visual cryptography
 
Visual Cryptography
Visual CryptographyVisual Cryptography
Visual Cryptography
 
Visual cryptography
Visual cryptographyVisual cryptography
Visual cryptography
 
Visual Cryptography
Visual CryptographyVisual Cryptography
Visual Cryptography
 
IMPACT OF ERROR FILTERS ON SHARES IN HALFTONE VISUAL CRYPTOGRAPHY
IMPACT OF ERROR FILTERS ON SHARES IN HALFTONE VISUAL CRYPTOGRAPHYIMPACT OF ERROR FILTERS ON SHARES IN HALFTONE VISUAL CRYPTOGRAPHY
IMPACT OF ERROR FILTERS ON SHARES IN HALFTONE VISUAL CRYPTOGRAPHY
 
Visual cryptography for color images
Visual cryptography for color imagesVisual cryptography for color images
Visual cryptography for color images
 
Data Hiding and Retrieval using Visual Cryptography
Data Hiding and Retrieval using Visual CryptographyData Hiding and Retrieval using Visual Cryptography
Data Hiding and Retrieval using Visual Cryptography
 
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDSHYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
 
Ew4301904907
Ew4301904907Ew4301904907
Ew4301904907
 
11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature maps11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature maps
 
Ax31139148
Ax31139148Ax31139148
Ax31139148
 
50120130405004 2
50120130405004 250120130405004 2
50120130405004 2
 

Viewers also liked

novel Approach For Data Hiding by integrating Steganography and Extended Visu...
novel Approach For Data Hiding by integrating Steganography and Extended Visu...novel Approach For Data Hiding by integrating Steganography and Extended Visu...
novel Approach For Data Hiding by integrating Steganography and Extended Visu...swapnalithakur7
 
Secure payment systems
Secure payment systemsSecure payment systems
Secure payment systemsAbdulaziz Mohd
 
steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...Aparna Nk
 
Online paymentusingsteganographt&Visualcryptography
Online paymentusingsteganographt&VisualcryptographyOnline paymentusingsteganographt&Visualcryptography
Online paymentusingsteganographt&VisualcryptographyNagarjuna mahanti
 
Steganography using visual cryptography: Report
Steganography using visual cryptography: ReportSteganography using visual cryptography: Report
Steganography using visual cryptography: ReportAparna Nk
 
steganography using visual cryptography_report
steganography using visual cryptography_reportsteganography using visual cryptography_report
steganography using visual cryptography_reportSaurabh Nambiar
 
Steganography using visual cryptography
Steganography using visual cryptographySteganography using visual cryptography
Steganography using visual cryptographySaurabh Nambiar
 
Comparative analysis of dynamic programming
Comparative analysis of dynamic programmingComparative analysis of dynamic programming
Comparative analysis of dynamic programmingeSAT Publishing House
 
A continuous time adc and digital signal processing system for smart dust and...
A continuous time adc and digital signal processing system for smart dust and...A continuous time adc and digital signal processing system for smart dust and...
A continuous time adc and digital signal processing system for smart dust and...eSAT Publishing House
 
Gsm based automatic lpg ordering system with leakage alert
Gsm based automatic lpg ordering system with leakage alertGsm based automatic lpg ordering system with leakage alert
Gsm based automatic lpg ordering system with leakage alerteSAT Publishing House
 
A study on qos aware routing in wireless mesh network
A study on qos aware routing in wireless mesh networkA study on qos aware routing in wireless mesh network
A study on qos aware routing in wireless mesh networkeSAT Publishing House
 
New electromagnetic force sensor measuring the density of liquids
New electromagnetic force sensor measuring the density of liquidsNew electromagnetic force sensor measuring the density of liquids
New electromagnetic force sensor measuring the density of liquidseSAT Publishing House
 
Relative superior mandelbrot sets and relative
Relative superior mandelbrot sets and relativeRelative superior mandelbrot sets and relative
Relative superior mandelbrot sets and relativeeSAT Publishing House
 
Power balancing optimal selective forwarding
Power balancing optimal selective forwardingPower balancing optimal selective forwarding
Power balancing optimal selective forwardingeSAT Publishing House
 
Study and comparative analysis of resonat frequency for microsrtip fractal an...
Study and comparative analysis of resonat frequency for microsrtip fractal an...Study and comparative analysis of resonat frequency for microsrtip fractal an...
Study and comparative analysis of resonat frequency for microsrtip fractal an...eSAT Publishing House
 
Evaluation of 6 noded quareter point element for crack analysis by analytical...
Evaluation of 6 noded quareter point element for crack analysis by analytical...Evaluation of 6 noded quareter point element for crack analysis by analytical...
Evaluation of 6 noded quareter point element for crack analysis by analytical...eSAT Publishing House
 
Contribution to the valorization of moroccan wood in industry of laminated wo...
Contribution to the valorization of moroccan wood in industry of laminated wo...Contribution to the valorization of moroccan wood in industry of laminated wo...
Contribution to the valorization of moroccan wood in industry of laminated wo...eSAT Publishing House
 
Passive control of structures using sliding isolators at intermediate floor l...
Passive control of structures using sliding isolators at intermediate floor l...Passive control of structures using sliding isolators at intermediate floor l...
Passive control of structures using sliding isolators at intermediate floor l...eSAT Publishing House
 
Improved method for pattern discovery in text mining
Improved method for pattern discovery in text miningImproved method for pattern discovery in text mining
Improved method for pattern discovery in text miningeSAT Publishing House
 
Variance rover system web analytics tool using data
Variance rover system web analytics tool using dataVariance rover system web analytics tool using data
Variance rover system web analytics tool using dataeSAT Publishing House
 

Viewers also liked (20)

novel Approach For Data Hiding by integrating Steganography and Extended Visu...
novel Approach For Data Hiding by integrating Steganography and Extended Visu...novel Approach For Data Hiding by integrating Steganography and Extended Visu...
novel Approach For Data Hiding by integrating Steganography and Extended Visu...
 
Secure payment systems
Secure payment systemsSecure payment systems
Secure payment systems
 
steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...
 
Online paymentusingsteganographt&Visualcryptography
Online paymentusingsteganographt&VisualcryptographyOnline paymentusingsteganographt&Visualcryptography
Online paymentusingsteganographt&Visualcryptography
 
Steganography using visual cryptography: Report
Steganography using visual cryptography: ReportSteganography using visual cryptography: Report
Steganography using visual cryptography: Report
 
steganography using visual cryptography_report
steganography using visual cryptography_reportsteganography using visual cryptography_report
steganography using visual cryptography_report
 
Steganography using visual cryptography
Steganography using visual cryptographySteganography using visual cryptography
Steganography using visual cryptography
 
Comparative analysis of dynamic programming
Comparative analysis of dynamic programmingComparative analysis of dynamic programming
Comparative analysis of dynamic programming
 
A continuous time adc and digital signal processing system for smart dust and...
A continuous time adc and digital signal processing system for smart dust and...A continuous time adc and digital signal processing system for smart dust and...
A continuous time adc and digital signal processing system for smart dust and...
 
Gsm based automatic lpg ordering system with leakage alert
Gsm based automatic lpg ordering system with leakage alertGsm based automatic lpg ordering system with leakage alert
Gsm based automatic lpg ordering system with leakage alert
 
A study on qos aware routing in wireless mesh network
A study on qos aware routing in wireless mesh networkA study on qos aware routing in wireless mesh network
A study on qos aware routing in wireless mesh network
 
New electromagnetic force sensor measuring the density of liquids
New electromagnetic force sensor measuring the density of liquidsNew electromagnetic force sensor measuring the density of liquids
New electromagnetic force sensor measuring the density of liquids
 
Relative superior mandelbrot sets and relative
Relative superior mandelbrot sets and relativeRelative superior mandelbrot sets and relative
Relative superior mandelbrot sets and relative
 
Power balancing optimal selective forwarding
Power balancing optimal selective forwardingPower balancing optimal selective forwarding
Power balancing optimal selective forwarding
 
Study and comparative analysis of resonat frequency for microsrtip fractal an...
Study and comparative analysis of resonat frequency for microsrtip fractal an...Study and comparative analysis of resonat frequency for microsrtip fractal an...
Study and comparative analysis of resonat frequency for microsrtip fractal an...
 
Evaluation of 6 noded quareter point element for crack analysis by analytical...
Evaluation of 6 noded quareter point element for crack analysis by analytical...Evaluation of 6 noded quareter point element for crack analysis by analytical...
Evaluation of 6 noded quareter point element for crack analysis by analytical...
 
Contribution to the valorization of moroccan wood in industry of laminated wo...
Contribution to the valorization of moroccan wood in industry of laminated wo...Contribution to the valorization of moroccan wood in industry of laminated wo...
Contribution to the valorization of moroccan wood in industry of laminated wo...
 
Passive control of structures using sliding isolators at intermediate floor l...
Passive control of structures using sliding isolators at intermediate floor l...Passive control of structures using sliding isolators at intermediate floor l...
Passive control of structures using sliding isolators at intermediate floor l...
 
Improved method for pattern discovery in text mining
Improved method for pattern discovery in text miningImproved method for pattern discovery in text mining
Improved method for pattern discovery in text mining
 
Variance rover system web analytics tool using data
Variance rover system web analytics tool using dataVariance rover system web analytics tool using data
Variance rover system web analytics tool using data
 

Similar to Double layer security using visual cryptography and transform based steganography

A comparatively study on visual cryptography
A comparatively study on visual cryptographyA comparatively study on visual cryptography
A comparatively study on visual cryptographyeSAT Publishing House
 
A novel cryptographic technique that emphasis visual quality and efficieny by...
A novel cryptographic technique that emphasis visual quality and efficieny by...A novel cryptographic technique that emphasis visual quality and efficieny by...
A novel cryptographic technique that emphasis visual quality and efficieny by...eSAT Journals
 
A Survey on Visual Cryptography Schemes
A Survey on Visual Cryptography Schemes  A Survey on Visual Cryptography Schemes
A Survey on Visual Cryptography Schemes AmAl C
 
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDSHYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDSIJNSA Journal
 
Image steganography techniques
Image steganography techniquesImage steganography techniques
Image steganography techniquesRashmi Tank
 
Paper id 25201475
Paper id 25201475Paper id 25201475
Paper id 25201475IJRAT
 
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...ijma
 
IRJET- Machine Learning Application for Data Security
IRJET- Machine Learning Application for Data SecurityIRJET- Machine Learning Application for Data Security
IRJET- Machine Learning Application for Data SecurityIRJET Journal
 
A new approach to analyze visual secret sharing schemes for biometric authent...
A new approach to analyze visual secret sharing schemes for biometric authent...A new approach to analyze visual secret sharing schemes for biometric authent...
A new approach to analyze visual secret sharing schemes for biometric authent...ijfcstjournal
 
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...Editor IJMTER
 
Greyscale image authentication and repairing
Greyscale image authentication and repairingGreyscale image authentication and repairing
Greyscale image authentication and repairingeSAT Publishing House
 
Greyscale image authentication and repairing
Greyscale image authentication and repairingGreyscale image authentication and repairing
Greyscale image authentication and repairingeSAT Journals
 
MEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMES
MEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMESMEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMES
MEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMESijiert bestjournal
 
A novel steganographic technique based on lsb dct approach by Mohit Goel
A novel steganographic technique based on lsb dct approach  by Mohit GoelA novel steganographic technique based on lsb dct approach  by Mohit Goel
A novel steganographic technique based on lsb dct approach by Mohit GoelMohit Goel
 
A NEW VISUAL CRYPTOGRAPHY TECHNIQUE FOR COLOR IMAGES
A NEW VISUAL CRYPTOGRAPHY TECHNIQUE FOR COLOR IMAGESA NEW VISUAL CRYPTOGRAPHY TECHNIQUE FOR COLOR IMAGES
A NEW VISUAL CRYPTOGRAPHY TECHNIQUE FOR COLOR IMAGESIJTET Journal
 
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...IRJET Journal
 
Proposed aes for image steganography in different medias
Proposed aes for image steganography in different mediasProposed aes for image steganography in different medias
Proposed aes for image steganography in different mediaseSAT Journals
 

Similar to Double layer security using visual cryptography and transform based steganography (20)

A comparatively study on visual cryptography
A comparatively study on visual cryptographyA comparatively study on visual cryptography
A comparatively study on visual cryptography
 
A novel cryptographic technique that emphasis visual quality and efficieny by...
A novel cryptographic technique that emphasis visual quality and efficieny by...A novel cryptographic technique that emphasis visual quality and efficieny by...
A novel cryptographic technique that emphasis visual quality and efficieny by...
 
J017335863
J017335863J017335863
J017335863
 
Fx3610771081
Fx3610771081Fx3610771081
Fx3610771081
 
A Survey on Visual Cryptography Schemes
A Survey on Visual Cryptography Schemes  A Survey on Visual Cryptography Schemes
A Survey on Visual Cryptography Schemes
 
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDSHYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
 
Image Steganography Techniques
Image Steganography TechniquesImage Steganography Techniques
Image Steganography Techniques
 
Image steganography techniques
Image steganography techniquesImage steganography techniques
Image steganography techniques
 
Paper id 25201475
Paper id 25201475Paper id 25201475
Paper id 25201475
 
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
 
IRJET- Machine Learning Application for Data Security
IRJET- Machine Learning Application for Data SecurityIRJET- Machine Learning Application for Data Security
IRJET- Machine Learning Application for Data Security
 
A new approach to analyze visual secret sharing schemes for biometric authent...
A new approach to analyze visual secret sharing schemes for biometric authent...A new approach to analyze visual secret sharing schemes for biometric authent...
A new approach to analyze visual secret sharing schemes for biometric authent...
 
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...
 
Greyscale image authentication and repairing
Greyscale image authentication and repairingGreyscale image authentication and repairing
Greyscale image authentication and repairing
 
Greyscale image authentication and repairing
Greyscale image authentication and repairingGreyscale image authentication and repairing
Greyscale image authentication and repairing
 
MEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMES
MEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMESMEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMES
MEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMES
 
A novel steganographic technique based on lsb dct approach by Mohit Goel
A novel steganographic technique based on lsb dct approach  by Mohit GoelA novel steganographic technique based on lsb dct approach  by Mohit Goel
A novel steganographic technique based on lsb dct approach by Mohit Goel
 
A NEW VISUAL CRYPTOGRAPHY TECHNIQUE FOR COLOR IMAGES
A NEW VISUAL CRYPTOGRAPHY TECHNIQUE FOR COLOR IMAGESA NEW VISUAL CRYPTOGRAPHY TECHNIQUE FOR COLOR IMAGES
A NEW VISUAL CRYPTOGRAPHY TECHNIQUE FOR COLOR IMAGES
 
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
 
Proposed aes for image steganography in different medias
Proposed aes for image steganography in different mediasProposed aes for image steganography in different medias
Proposed aes for image steganography in different medias
 

More from eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnameSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnameSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaeSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingeSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a revieweSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard managementeSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallseSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaeSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structureseSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingseSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...eSAT Publishing House
 

More from eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 

Recently uploaded

Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 

Recently uploaded (20)

Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 

Double layer security using visual cryptography and transform based steganography

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 03 | May-2014 | NCRIET-2014, Available @ http://www.ijret.org 107 DOUBLE LAYER SECURITY USING VISUAL CRYPTOGRAPHY AND TRANSFORM BASED STEGANOGRAPHY PallaviB1, Vishala I. L2 1M.Tech 4th SEM, DCN Branch, Visvesvaraya Technological University 2Assistant Professor, Dept of ECE, S.J.C Institute of Technology, Chickballapur, India. Abstract With the recent advances in internet computing in our day to day life the need for communication has increased. Privacy in communication is desired when confidential information is shared between two parties. Mainly this project uses transform based steganography (DCT) and visual cryptography for hiding data. The proposed system provides double layer security. First level of security is achieved by using visual cryptography for the information to be transmitted and this is embedded onto images by using steganography. This project is implemented using Matlab software. In this project the expected result is we take 2 color images and for those we apply DCT and for the DCT transformed images LSB is applied with the bits of the shares which we would have got from V.C. Keywords: DCT, shares, Steganography, Visual Cryptography. ----------------------------------------------------------------------***-------------------------------------------------------------------- 1. INTRODUCTION Since the rise of internet one of the most important factors of important technology is security of Information. Cryptography was created as a technique for securing secrecy of communication and many different methods have been developed to encrypt and decrypt the data. An important subdivision of information Hiding is steganography. Sometimes it‟s not enough to keep contents of message secret but also it‟s necessary to keep existence of message secret. The technique used to implement this is called steganography. It‟s made up of 2 Greek words “stegos” meaning covered and “Grafia” meaning writing. Steganography is the art and science of invisible communication. The technique of steganography requires Cover Object(C), secret message (M), stego key and stego function (Fe). Fig - 1: Basic model of Steganographic system 1.1 Steganography Methods There are 3 ways namely  Injection - embeds secret message directly in host medium  Substitution – normal data is substituted with the secret data.  Generation of new files 1.2 Steganography Techniques The different categories of Steganography techniques are  Substitution system techniques  Transform domain techniques  Spread spectrum technique  Distortion techniques  Statistical method techniques Steganographic techniques can be broadly classified as  Spatial domain techniques  Transform domain techniques  Hybrid domain techniques In case of spatial domain technique all manipulations to the cover object and payload are done in time domain. LSB technique is the most popular spatial domain technique. Transform domain techniques are frequency domain techniques. Image is considered in terms of frequency components. DCT is the most commonly used technique. In case of hybrid domain technique image is divided into cells and then spatial or transform domain technique is applied.
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 03 | May-2014 | NCRIET-2014, Available @ http://www.ijret.org 108 To illustrate the process of steganography we consider figure given below Fig -2: Prisoners problem The classic model for invisible communication was proposed by Simmons as prisoner‟s problem. Alice and Bob are arrested are for some crime and they are thrown in different cells. They want to develop an escape plan but all communication is arbitrated by Wendy. She will not let them communicate through encryption and hence both parties should communicate invisibly – have to set up subliminal channel. 2. VISUAL CRYPTOGRAPHY It was proposed by Naor and Shamir in 1994. It‟s a scheme which encrypts image into shares but does not require any computations to get back the original image and it‟s an encryption technique used to hide images in such a way that decryption can be performed by human visual system if key is used. Here V.C operates on binary inputs and initially V.C was applied to black and white images but now it‟s extended to color and grey scale images. The easiest way to implement visual cryptography is to print two layers on transparencies. 2.1 How Visual Cryptography Works? Mainly visual cryptography operates on binary inputs. Hence natural images must be converted into halftone images using density of dots in order to simulate grey level. Binary data can be displayed as transparent when printed on transparent screen. Each pixel of the image is divided into smaller blocks. There are always same numbers of black and white blocks. If a pixel is divided into 2 parts there is one black and one white block. If a pixel is divided into 4 parts there are 2 white and 2 black blocks. Fig- 3: example of visual cryptography The basic model of visual cryptography proposed by Naor and Shamir accepts binary image I as secret image which is divided into n number of shares. Each pixel of image is represented by m sub pixels. The resulting structure of shared image is represented by S where S = [Sij], an n x m matrix. Any black and white visual cryptography scheme can be described using 2 n x m Boolean matrices (S0 and S1). S0 is used if pixel in the original image is white and S1 is used if pixel in original image is black. The important parameters in visual cryptography schemes are  Pixel expansion (m)  Contrast (β) The formula to compute contrast in different visual cryptography schemes is Β = αm. In V.C white pixel is represented by 0 and black pixel is represented by 1. There are different visual cryptography schemes such 2 out of 2, 2 out of n, n out of n and k out of n V.C Scheme. The most commonly used is 2 out of 2 schemes. For 2 out of 2 VCS S0 and S1 are as follows S0 = 1010 S1 = 1001 The relative difference α and contrast β is ½ and 1 Fig - 4: construction of (2, 2) VCS There are 2 collections of matrices C0 and C1. To share a white pixel we choose one of the matrix in C0 and to share black pixel we choose one of the matrix in C1. The first row of chosen matrix is used for share S1 and the second row is used for share S2. The disadvantage is that for every pixel encoded from original image into 2 sub pixels and placed on each share – shares have size of s x 2s if secret image is of size s x s. There is a distortion hence we go for 4 sub pixel layout design. Here pixel is expanded into 2 x 2 sub pixels.
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 03 | May-2014 | NCRIET-2014, Available @ http://www.ijret.org 109 S0 = 1 0 1 01 0 1 0 S1 = 1 0 0 10 1 1 0 The relative difference α and β is ½ and 2 respectively. Fig -5: construction of (2, 2) VCS with 4 sub pixel layout design. There are various visual cryptography schemes such as (2, 2) VCS, (k, n) VCS, halftone VCS, V.C for grey level image and color images. In this project we mainly focused on (2, 2) V.C.S- here both the shares are required to reveal the secret information.If one share gets lost due to some problem the secret information can‟t be revealed. If V.C has to be used for grey level images dithering technique is used and if V.C has to be used for color images additional processing has to be done – R, G, B has to be used for additive model and cyan, magenta, yellow is used for subtractive model and then the normal V.C scheme is used. 3 METHODOLOGY USED A few techniques are there to implement both steganography and visual cryptography. Among them optimal one can be found out by analyzing tools. As mentioned both steganography and visual cryptography have problems. Whenever they are used independently we have only single layer of security which can be easily broken by intruders. If we combine features of both steganography and visual cryptography then we have 2 layers of security. The steganography technique used in this project is DCT. The advantage in visual cryptography is we don‟t need any computation to decrypt the data. Previously the methodology used for encrypting information is steganography or cryptography but in this project we used both – First the information which is to be transmitted is encrypted using visual cryptography and this is embedded onto images using steganography. 4 ANALYSIS OF THE PROJECT This project is analyzed in terms of DCT transform and V.C. DCT coefficients are used for JPEG compression. We have 1 D DCT and 2 D DCT. 2 D DCT is used. Image compression using DCT is done in the following way  Image is broken to smaller blocks of pixels  DCT is applied to each block.  Each block is compressed through quantization and quantization matrix is entropy encoded.  The array of blocks that constitute the image is stored in reduced amount of space. c (i, j) is the intensity of pixel in row i and column j and C (u, v) is DCT coefficients. 5 IMPLEMENTATION OF THE PROJECT User will send an image and that image with the help of visual cryptography is broken down into 2 shares. We have used (2, 2) V.C.S – in that image is broken down into 2 shares such that no information can be reconstructed without any single
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 03 | May-2014 | NCRIET-2014, Available @ http://www.ijret.org 110 share. The shares are printed in transparencies and the decryption process is performed by stacking the 2 shares. Steganography hiding phase is nothing but here we consider cover image which is split into 3 components – R, G, B. we consider individual shares (bit streams) and they are hidden using bit and, bit or operation. After we complete hiding process for all the pixels present in R, G, B we merge them to get stego image. Digital images are mainly of two types (i) 24 bit images and (ii) 8 bit images. In 24 bit images we can embed three bits of information in each pixel .In 8 bit images one bit of information can be hidden. Least significant 3 bits are cleared in the red and green bytes and 2 bits from the blue byte. This can be done by using bit and with 248 which has 3„0‟ in its last 3 least significant bit. This we will do for both red and green bytes. And in the blue byte we bit and with 252 which has 2 „0‟s in its least significant bits. And then we bit or the bits of the text on to these emptied bits Suppose the original 3 pixels are: (11101010 11101000 11001011) Consider binary representation of 74 = 01001010 The first byte 11101010 is converted to 11101000 by using bit and with 248 (11111000). First bit is 1 so the third last bit is left disturbed. Second bit is 1 bit or it to the emptied byte. Third bit is 0 and the emptied bit is kept as such. The same way the last three bits in green byte and last two bits in the blue bit are placed and again filled in the target image called the stego image. 5.1 Conceptual Design of Project 5.2 Block Diagram of DCT based Steganography The proposed method is used to hide secret object (text, image) into a cover image. DCT transforms image from spatial domain to frequency domain. We convert secret object into binary form and hides the bits chosen in middle and high frequency coefficients.DCT decomposes signal into low, middle and high frequency coefficients. The secret image is hidden in high and middle frequency regions but not in lower region because human visual system is more sensible to modifications that may occur in lower frequency band. Fig - 6: Block diagram of DCT Steg Encoding process
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 03 | May-2014 | NCRIET-2014, Available @ http://www.ijret.org 111 Fig- 7: Block diagram of DCT Steg Decoding process 6. RESULTS Coding is done using Matlab and results are shown below. Mainly image is of size M X N (M rows and N columns). Images of formats like – tiff, jpeg, png are available. In Matlabrgb and indexed image is converted to grey scale image. RGB image does not have color image and we check for map variable in case of indexed image (2D).After the code is executed we run the program and there are 5 different modes. If we don‟t specify any mode (mode 0 fixed Thresholding is considered). There are 5 different modes namely  Fixed Thresholding  Random noise Thresholding  Ordered dithering  Error diffusion by Floyd and Steinberg  Error diffusion by sticky Thresholding is an important approach to image segmentation. We assume that image falls in the range of 0 to 255. Pixels of the digital image are processed. And we compare grey scale value of pixel to threshold (128). If pixel value is greater than threshold it‟s black else it‟s white. Whenever color depth needs to be reduced we go for dithering. Dither is a form of noise used to minimize error. There are 3 methods for dithering  Add noise to image  Use dithering matrix  Diffuse error to neighboring pixels In coding part we have used dithering matrix method. Error diffusion is a technique in which quantization residual is distributed to neighboring pixels that are not yet processed. In case of error diffusion by Floyd and Steinberg error is distributed to neighboring pixels but in case of error diffusion by sticky – output tends to be clean and sharp. Fig8: output for fixed Thresholding of autumn.tif The above figure shows the output for mode 0 (fixed Thresholding for image autumn.tif).In Matlab after running our program whenever we type Halftonedemofinal (3) we get output for ordered dithering of image autumn.tif which is shown in figure 8. Fig8: output for ordered dithering of autumn.tif
  • 6. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 03 | May-2014 | NCRIET-2014, Available @ http://www.ijret.org 112 The above figure shows output of steganography application. We can type input one or two in Matlab window. We need to type input message and it appears and also the size is displayed. For decoding the input message is shifted by 2 letters and the output (notepad version is created) 7. CONCLUSIONS In this project we are going to hide the information by combining the features of both steganography and visual cryptography. The proposed system is used to overcome the difficulties faced in existing system and it has several advantages like 2 levels of security, requires computation time for single level of hiding and the proposed system can be used in applications like payment gateways, military, navy, business settlement contracts. REFERENCES [1].J.B.Krenn, “Steganography and Steganalysis” 2004. [2].Dr.EktaWalia, “Analysis of LSB and DCT Based Steganography”, Vol 10, Issue1. [3]. Digital image processing by Gonzalez and woods. [4].Deshpande Neete, “Implementation of LSB steganography and its evaluation for various bits”. [5].Zhi Zhou, “halftone visual cryptography”, IEEE transactions on Image processing, August 2006. [6].George, saad, “image hiding using magnitude modulation on DCT coefficients”. Journal of applied Computer Sciences 2010 [7].Chandramati, Ramesh, “Overview of Various cryptography schemes,” 2010 [8]. Websites like Google, Wikipedia.