This document summarizes a research paper that proposes a novel approach for securing data by combining steganography and extended visual cryptography. It involves three main steps: 1) Hidden data is embedded into a cover image using a text embedding algorithm. 2) The cover image is then encrypted into two shares using a visual cryptography technique called VIP synchronization and error diffusion. 3) To extract the hidden data, the shares are combined and the extraction algorithm retrieves the text from the pixel values. The approach generates meaningful shares that look like random noise images. It analyzes the results by calculating the PSNR and MSE values between the original cover images and generated shares.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Data Hiding and Retrieval using Visual CryptographyAM Publications
Nath et al. developed several methods for hiding data in a cover file using different steganography
methods. In some methods Nath et al. first applied encryption method before hiding into the cover file. For security
reasons the secret message is encrypted first before inserting into the cover file. To make the system more complex the
authors used some random insertion of bits so that even if the intruders can extract the bits from cover file but they
cannot reconstruct the original secret message. In the present work the authors applied different data hiding
algorithm based on visual cryptography. Visual Cryptography is now a days a very popular method for hiding any
secret message inside multiple shares. Initially people were trying to hide some secret message which is simply B/W in
two shares. But slowly the researchers started to hide any color image (may be text or image or any object) in two or
more shares. In the present work the authors tried to hide any color message/image in two or more shares. The
interesting part of the present method is that from one share it impossible to create the second share or to extract the
hidden secret message from one share without having the other share(s). The present method may be used for
reconstructing password or any kind of important message or image. The present method may be applied in forensic
department or in defense for sending some confidential message
A (2, N) VISUAL CRYPTOGRAPHIC TECHNIQUE FOR BANKING APPLICATIONSIJNSA Journal
In this paper a novel (2, n) visual cryptographic scheme has been proposed which may be useful in banking operations in the “either or survivor” mode where n is the number of generated shares, from which n-1 is the number of account holders in an account and one share should be kept to the bank authority. In this technique one account holder should stack his/her share with the share of the bank authority and the secret image for user authentication will be revealed. In this technique two consecutive pixels are taken as the one time input for the share generation process. This technique generates shares with less space overhead compared to existing techniques and may provide better security. It is also easy to implement like other techniques of visual cryptography.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Protecting the data in a safe and secure way which does not impede the access of an authorized authority is an immensely difficult and very interesting research problem. image cryptography is a special type of encryption technique to obscure image-based secret information which can be decrypted by Human Visual System. Communication is the process of transmitting information from source to destination. The exchanging information should not be stolen by unauthorized parties like hackers while sending or receiving via channel. To avoid this stealing of the information visual cryptography techniques are used. This paper proposes a novel method for key generation by using nearest prime pixels. Further 2’s complement and logical operations are performed to generate decrypted image. The final decrypted image is generated by representing pixels in matrix form and data is retrieved in column wise.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Data Hiding and Retrieval using Visual CryptographyAM Publications
Nath et al. developed several methods for hiding data in a cover file using different steganography
methods. In some methods Nath et al. first applied encryption method before hiding into the cover file. For security
reasons the secret message is encrypted first before inserting into the cover file. To make the system more complex the
authors used some random insertion of bits so that even if the intruders can extract the bits from cover file but they
cannot reconstruct the original secret message. In the present work the authors applied different data hiding
algorithm based on visual cryptography. Visual Cryptography is now a days a very popular method for hiding any
secret message inside multiple shares. Initially people were trying to hide some secret message which is simply B/W in
two shares. But slowly the researchers started to hide any color image (may be text or image or any object) in two or
more shares. In the present work the authors tried to hide any color message/image in two or more shares. The
interesting part of the present method is that from one share it impossible to create the second share or to extract the
hidden secret message from one share without having the other share(s). The present method may be used for
reconstructing password or any kind of important message or image. The present method may be applied in forensic
department or in defense for sending some confidential message
A (2, N) VISUAL CRYPTOGRAPHIC TECHNIQUE FOR BANKING APPLICATIONSIJNSA Journal
In this paper a novel (2, n) visual cryptographic scheme has been proposed which may be useful in banking operations in the “either or survivor” mode where n is the number of generated shares, from which n-1 is the number of account holders in an account and one share should be kept to the bank authority. In this technique one account holder should stack his/her share with the share of the bank authority and the secret image for user authentication will be revealed. In this technique two consecutive pixels are taken as the one time input for the share generation process. This technique generates shares with less space overhead compared to existing techniques and may provide better security. It is also easy to implement like other techniques of visual cryptography.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Protecting the data in a safe and secure way which does not impede the access of an authorized authority is an immensely difficult and very interesting research problem. image cryptography is a special type of encryption technique to obscure image-based secret information which can be decrypted by Human Visual System. Communication is the process of transmitting information from source to destination. The exchanging information should not be stolen by unauthorized parties like hackers while sending or receiving via channel. To avoid this stealing of the information visual cryptography techniques are used. This paper proposes a novel method for key generation by using nearest prime pixels. Further 2’s complement and logical operations are performed to generate decrypted image. The final decrypted image is generated by representing pixels in matrix form and data is retrieved in column wise.
Chaos Image Encryption using Pixel shuffling cscpconf
The advent of wireless communications, both inside and outside the home-office environment
has led to an increased demand for effective encryption systems. The beauty of encryption
technology comes out in more pronounced way when there is no absolute relation between
cipher and original data and it is possible to rebuild the original image in much easier way. As
chaotic systems are known to be more random and non-predictable, they can be made utilized in
achieving the encryption. The transposition technology of encryption systems requires scrambleness
behaviour in order to achieve the encryption of the data. This scrambleness behaviour can
be derived from the randomness property of chaos which can be better utilized in the techniques
like transposition system. In wireless communication systems, bandwidth utilization is an important
criterion. In order to use encryption system in wireless communication; key space plays an
important role for the efficient utilization of the bandwidth. In this paper we present a chaosbased
encryption algorithm for images. This algorithm is based on pixel scrambling where in the
randomness of the chaos is made utilized to scramble the position of the data. The position of the
data is scrambled in the order of randomness of the elements obtained from the chaotic map and
again rearranged back to their original position in decryption process. The same algoritm is
tested with two different maps and performance analysis is done to select best suited map for encription.
Performance analysis of transformation and bogdonov chaotic substitution base...IJECEIAES
In this article, a combined Pseudo Hadamard transformation and modified Bogdonav chaotic generator based image encryption technique is proposed. Pixel position transformation is performed using Pseudo Hadamard transformation and pixel value variation is made using Bogdonav chaotic substitution. Bogdonav chaotic generator produces random sequences and it is observed that very less correlation between the adjacent elements in the sequence. The cipher image obtained from the transformation stage is subjected for substitution using Bogdonav chaotic sequence to break correlation between adjacent pixels. The cipher image is subjected for various security tests under noisy conditions and very high degree of similarity is observed after deciphering process between original and decrypted images.
Double layer security using visual cryptography and transform based steganogr...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Visual Cryptography is a special encryption technique that encrypts the secret image into n
number of shares to hide information in images in such a way that it can be decrypted by the
human visual system. It is imperceptible to reveal the secret information unless a certain
number of shares (k) or more are superimposed. Simple visual cryptography is very insecure.
Variable length key based visual cryptography for color image uses a variable length Symmetric
Key based Visual Cryptographic Scheme for color images where a secret key is used to encrypt
the image and division of the encrypted image is done using Random Number. Unless the secret
key, the original image will not be decrypted. Here secret key ensures the security of image.
This paper describes the overall process of above scheme. Encryption process encrypts the
Original Image using variable length Symmetric Key, gives encrypted image. Share generation
process divides the encrypted image into n number of shares using random number. Decryption process stacks k number of shares out of n to reconstruct encrypted image and uses the same key for decryption.
A new fangled symmetric block cipher using zig-zag scan patternseSAT Journals
Abstract In today’s world of Information Technology, information storage and distribution is very important. To secure the data in the network, one need to protect the data using cipher algorithms. This paper presents a novel symmetric block cipher which ciphers data using zig-zag scan patterns. The input data is divided into manageable size of blocks. Each block of data is taken as an input and produces the corresponding cipher text. The data is arranged in a corresponding matrix of manageable size using the zig-zag scan pattern. Then again it is divided into number of 2x2 sub matrices. Cipher text can be retrieved from each 2x2 sub matrix by reading column wise. The Cipher is tested with time complexity, frequency analysis, and with homogeneity testing. Keywords: Symmetric Ciphers, block Ciphers, Cryptography, Zig-Zag Scan Patterns, DES
A CHAOTIC CONFUSION-DIFFUSION IMAGE ENCRYPTION BASED ON HENON MAPIJNSA Journal
This paper suggests chaotic confusion-diffusion image encryption based on the Henon map. The proposed chaotic confusion-diffusion image encryption utilizes image confusion and pixel diffusion in two levels. In the first level, the plainimage is scrambled by a modified Henon map for n rounds. In the second level, the scrambled image is diffused using Henon chaotic map. Comparison between the logistic map and modified Henon map is established to investigate the effectiveness of the suggested chaotic confusion-diffusion image encryption scheme. Experimental results showed that the suggested chaotic confusion-diffusion image encryption scheme can successfully encrypt/decrypt images using the same secret keys. Simulation results confirmed that the ciphered images have good entropy information and low correlation between coefficients. Besides the distribution of the gray values in the ciphered image has random-like behavior.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Image Steganography Based On Non Linear Chaotic AlgorithmIJARIDEA Journal
Abstract— Late inquires about of picture steganography have been progressively in light of clamorous frameworks, yet the disadvantages of little key space and powerless security in one-dimensional disorderly cryptosystems are self-evident. This paper presents steganography with nonlinear riotous calculation (NCA) which utilizes control capacity and digression work rather than straight capacity. Its basic parameters are acquired by test examination. The message with the key is then consolidated with the cover picture utilizing LSB installing and discrete cosine change.
Keywords— Discrete Cosine Transform, LSB Embedding, Nonlinear Chaotic Algorithm, Steganography, Stego Image.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
An improved color image encryption algorithm with pixel permutation and bit s...eSAT Journals
Abstract Today the transmission of multimedia data including image and video is growing in telecommunications. Security is one of the main issues in transferring such sensitive information. Powerful image encryption algorithm is the solution for this problem. This paper is an implementation of a color image encryption algorithm based on Rubik’s cube technique. The Rubik’s cube technique is used for pixel permutation and a bit substitution method based on DNA sequences are used to change the value of each pixel on the image. Then the time-stamp is appended with encrypted image, which can be used to identify the replay attack. For evaluating the performance of the algorithm a series of tests are performed. These tests include information entropy analysis, correlation analysis, analysis of NPCR and UACI values etc. Index Terms: Cryptography, encryption, decryption, timestamp, replay attack, plaintext, cipher-text, algorithm, chaos.
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitutionijsrd.com
Digital image Encryption techniques play a very important role to prevent image from unauthorized access. There are many types of methods available that can do Image Encryption, and the majority of them are scrambling algorithms based on pixel shuffling, which cannot change the histogram of an image. Hence, their security performances are not good. The encryption method that combines the pixel exchanging and gray level changing can handles reach a good chaotic effect. In this paper we focus on an image encryption technique based on pixel wise shuffling with the help of skew tent map and text based pixel substitution. The PSNR, NPCR and CC obtained by our technique shows that the proposed technique gives better result than the existing techniques.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...idescitation
Copyright protection is a vital issue in modern day’s data transmission over
internet. For copyright protection, watermarking technique is extensively used. In this
paper, we have proposed a robust watermarking scheme using 2D Logistic map and elliptic
curve cryptosystem (ECC) in the DWT domain. The combined encryption has been taken to
enhance the security of the watermark before the embedding phase. The PSNR value shows
the difference between original cover and embedded cover is minimal. Similarly, NC values
show the robustness and resistance capability of the proposed technique from the common
attacks such as scaling, Gaussian noise etc. Thus, this combined version of 2D Logistic map
and Elliptic curve cryptosystem can be used in case of higher security requirement of the
watermark signal.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
CT-SVD and Arnold Transform for Secure Color Image WatermarkingAM Publications,India
Watermarking is used for protecting copyright of digital images. In this paper, we propose a novel technique for watermarking using Contourlet Transform (CT) and Singular Value Decomposition (SVD). CT ensures imperceptibility of the watermark and SVD ensures its robustness against attacks. Arnold transform is used for scrambling watermark pixels to ensure watermark security. Watermark extraction is semi-blind, which avoids the need for original image for extraction. Both watermark and cover image are color images. Performance of the system is judged by using PSNR and Correlation Coefficient (CC) values. System shows good robustness against noise, JPEG compression, filtering and cropping
A novel efficient multiple encryption algorithm for real time images IJECEIAES
In this study, we propose an innovative image encryption Techniques based on four different image encryption Algorithm. Our methodology integrates scrambling followed by Symmetric and Asymmetric Encryption Techniques, to make the image meaningless or disordered to enhance the ability to confront attack and in turn improve the security. This paper mainly focused on the multiple encryption Techniques with multiple keys on a single image by dividing it into four blocks. So instead of using one Encryption method a combination of four different Encryption Algorithm can make our image more secure. The Encryption is done first by using DNA as secret key, second by using RSA, third by DES and fourth by Chebyshev. The pros and cons for all the Encryption methods are discussed here. Proposed methodology can strongly encrypt the images for the purpose of storing images and transmitting them over the Internet. There are two major benefits related with this system. The first benefit is the use of Different Algorithm with different keys. The second benefit is that even though we are using four different Algorithm for a single image, the time taken for encryption and decryption is few seconds only. Our method is methodically checked, and it shows an exceptionally high level of security with very good image quality.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Effects of different mole spacings on the yield of summer groundnuteSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Chaos Image Encryption using Pixel shuffling cscpconf
The advent of wireless communications, both inside and outside the home-office environment
has led to an increased demand for effective encryption systems. The beauty of encryption
technology comes out in more pronounced way when there is no absolute relation between
cipher and original data and it is possible to rebuild the original image in much easier way. As
chaotic systems are known to be more random and non-predictable, they can be made utilized in
achieving the encryption. The transposition technology of encryption systems requires scrambleness
behaviour in order to achieve the encryption of the data. This scrambleness behaviour can
be derived from the randomness property of chaos which can be better utilized in the techniques
like transposition system. In wireless communication systems, bandwidth utilization is an important
criterion. In order to use encryption system in wireless communication; key space plays an
important role for the efficient utilization of the bandwidth. In this paper we present a chaosbased
encryption algorithm for images. This algorithm is based on pixel scrambling where in the
randomness of the chaos is made utilized to scramble the position of the data. The position of the
data is scrambled in the order of randomness of the elements obtained from the chaotic map and
again rearranged back to their original position in decryption process. The same algoritm is
tested with two different maps and performance analysis is done to select best suited map for encription.
Performance analysis of transformation and bogdonov chaotic substitution base...IJECEIAES
In this article, a combined Pseudo Hadamard transformation and modified Bogdonav chaotic generator based image encryption technique is proposed. Pixel position transformation is performed using Pseudo Hadamard transformation and pixel value variation is made using Bogdonav chaotic substitution. Bogdonav chaotic generator produces random sequences and it is observed that very less correlation between the adjacent elements in the sequence. The cipher image obtained from the transformation stage is subjected for substitution using Bogdonav chaotic sequence to break correlation between adjacent pixels. The cipher image is subjected for various security tests under noisy conditions and very high degree of similarity is observed after deciphering process between original and decrypted images.
Double layer security using visual cryptography and transform based steganogr...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Visual Cryptography is a special encryption technique that encrypts the secret image into n
number of shares to hide information in images in such a way that it can be decrypted by the
human visual system. It is imperceptible to reveal the secret information unless a certain
number of shares (k) or more are superimposed. Simple visual cryptography is very insecure.
Variable length key based visual cryptography for color image uses a variable length Symmetric
Key based Visual Cryptographic Scheme for color images where a secret key is used to encrypt
the image and division of the encrypted image is done using Random Number. Unless the secret
key, the original image will not be decrypted. Here secret key ensures the security of image.
This paper describes the overall process of above scheme. Encryption process encrypts the
Original Image using variable length Symmetric Key, gives encrypted image. Share generation
process divides the encrypted image into n number of shares using random number. Decryption process stacks k number of shares out of n to reconstruct encrypted image and uses the same key for decryption.
A new fangled symmetric block cipher using zig-zag scan patternseSAT Journals
Abstract In today’s world of Information Technology, information storage and distribution is very important. To secure the data in the network, one need to protect the data using cipher algorithms. This paper presents a novel symmetric block cipher which ciphers data using zig-zag scan patterns. The input data is divided into manageable size of blocks. Each block of data is taken as an input and produces the corresponding cipher text. The data is arranged in a corresponding matrix of manageable size using the zig-zag scan pattern. Then again it is divided into number of 2x2 sub matrices. Cipher text can be retrieved from each 2x2 sub matrix by reading column wise. The Cipher is tested with time complexity, frequency analysis, and with homogeneity testing. Keywords: Symmetric Ciphers, block Ciphers, Cryptography, Zig-Zag Scan Patterns, DES
A CHAOTIC CONFUSION-DIFFUSION IMAGE ENCRYPTION BASED ON HENON MAPIJNSA Journal
This paper suggests chaotic confusion-diffusion image encryption based on the Henon map. The proposed chaotic confusion-diffusion image encryption utilizes image confusion and pixel diffusion in two levels. In the first level, the plainimage is scrambled by a modified Henon map for n rounds. In the second level, the scrambled image is diffused using Henon chaotic map. Comparison between the logistic map and modified Henon map is established to investigate the effectiveness of the suggested chaotic confusion-diffusion image encryption scheme. Experimental results showed that the suggested chaotic confusion-diffusion image encryption scheme can successfully encrypt/decrypt images using the same secret keys. Simulation results confirmed that the ciphered images have good entropy information and low correlation between coefficients. Besides the distribution of the gray values in the ciphered image has random-like behavior.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Image Steganography Based On Non Linear Chaotic AlgorithmIJARIDEA Journal
Abstract— Late inquires about of picture steganography have been progressively in light of clamorous frameworks, yet the disadvantages of little key space and powerless security in one-dimensional disorderly cryptosystems are self-evident. This paper presents steganography with nonlinear riotous calculation (NCA) which utilizes control capacity and digression work rather than straight capacity. Its basic parameters are acquired by test examination. The message with the key is then consolidated with the cover picture utilizing LSB installing and discrete cosine change.
Keywords— Discrete Cosine Transform, LSB Embedding, Nonlinear Chaotic Algorithm, Steganography, Stego Image.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
An improved color image encryption algorithm with pixel permutation and bit s...eSAT Journals
Abstract Today the transmission of multimedia data including image and video is growing in telecommunications. Security is one of the main issues in transferring such sensitive information. Powerful image encryption algorithm is the solution for this problem. This paper is an implementation of a color image encryption algorithm based on Rubik’s cube technique. The Rubik’s cube technique is used for pixel permutation and a bit substitution method based on DNA sequences are used to change the value of each pixel on the image. Then the time-stamp is appended with encrypted image, which can be used to identify the replay attack. For evaluating the performance of the algorithm a series of tests are performed. These tests include information entropy analysis, correlation analysis, analysis of NPCR and UACI values etc. Index Terms: Cryptography, encryption, decryption, timestamp, replay attack, plaintext, cipher-text, algorithm, chaos.
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitutionijsrd.com
Digital image Encryption techniques play a very important role to prevent image from unauthorized access. There are many types of methods available that can do Image Encryption, and the majority of them are scrambling algorithms based on pixel shuffling, which cannot change the histogram of an image. Hence, their security performances are not good. The encryption method that combines the pixel exchanging and gray level changing can handles reach a good chaotic effect. In this paper we focus on an image encryption technique based on pixel wise shuffling with the help of skew tent map and text based pixel substitution. The PSNR, NPCR and CC obtained by our technique shows that the proposed technique gives better result than the existing techniques.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...idescitation
Copyright protection is a vital issue in modern day’s data transmission over
internet. For copyright protection, watermarking technique is extensively used. In this
paper, we have proposed a robust watermarking scheme using 2D Logistic map and elliptic
curve cryptosystem (ECC) in the DWT domain. The combined encryption has been taken to
enhance the security of the watermark before the embedding phase. The PSNR value shows
the difference between original cover and embedded cover is minimal. Similarly, NC values
show the robustness and resistance capability of the proposed technique from the common
attacks such as scaling, Gaussian noise etc. Thus, this combined version of 2D Logistic map
and Elliptic curve cryptosystem can be used in case of higher security requirement of the
watermark signal.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
CT-SVD and Arnold Transform for Secure Color Image WatermarkingAM Publications,India
Watermarking is used for protecting copyright of digital images. In this paper, we propose a novel technique for watermarking using Contourlet Transform (CT) and Singular Value Decomposition (SVD). CT ensures imperceptibility of the watermark and SVD ensures its robustness against attacks. Arnold transform is used for scrambling watermark pixels to ensure watermark security. Watermark extraction is semi-blind, which avoids the need for original image for extraction. Both watermark and cover image are color images. Performance of the system is judged by using PSNR and Correlation Coefficient (CC) values. System shows good robustness against noise, JPEG compression, filtering and cropping
A novel efficient multiple encryption algorithm for real time images IJECEIAES
In this study, we propose an innovative image encryption Techniques based on four different image encryption Algorithm. Our methodology integrates scrambling followed by Symmetric and Asymmetric Encryption Techniques, to make the image meaningless or disordered to enhance the ability to confront attack and in turn improve the security. This paper mainly focused on the multiple encryption Techniques with multiple keys on a single image by dividing it into four blocks. So instead of using one Encryption method a combination of four different Encryption Algorithm can make our image more secure. The Encryption is done first by using DNA as secret key, second by using RSA, third by DES and fourth by Chebyshev. The pros and cons for all the Encryption methods are discussed here. Proposed methodology can strongly encrypt the images for the purpose of storing images and transmitting them over the Internet. There are two major benefits related with this system. The first benefit is the use of Different Algorithm with different keys. The second benefit is that even though we are using four different Algorithm for a single image, the time taken for encryption and decryption is few seconds only. Our method is methodically checked, and it shows an exceptionally high level of security with very good image quality.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Effects of different mole spacings on the yield of summer groundnuteSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Screening of antibacterial and cytotoxic activity of extracts from epidermis ...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Fpga implementation of optimal step size nlms algorithm and its performance a...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Transient voltage distribution in transformer winding (experimental investiga...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
An iterative unsymmetrical trimmed midpoint median filter for removal of high...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Conceptual design of laser assisted fixture for bending operationeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
The demonstration of fourier series to first year undergraduate engineering s...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Experimental investigation, optimization and performance prediction of wind t...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
A novel cryptographic technique that emphasis visual quality and efficieny by...eSAT Journals
Abstract Visual cryptography is a cryptographic technique which allows visual information to be encrypted in such a way that decryption becomes a mechanical operation that does not require a computer. The original image can be split into shares, where unauthorized person cannot get the data which we hide within that share images. By stacking the two shares, the secret data can be revealed. The highlighted issue in VC is, the size and quality of the reconstructed image should be same as the original image. In this paper, a novel k out of k extended visual cryptography scheme (EVCS) is used, to improve security and to produce meaningful shares. Halftone visual cryptography (VC) encodes a secret image into k halftone meaningful image shares through Floyd Steinberg error diffusion algorithm. The algorithm achieves dithering using error diffusion, meaning it pushes (adds) the residual quantization error of a pixel onto its neighboring pixels, to be dealt with later. This algorithm takes a substantial time for encryption and decryption in a considerably calmer manner. Comparisons with previous approaches show the superior performance of the new method.
Keywords: k out of k, extended visual cryptography, halftone visual cryptography, Floyd Steinberg error diffusion algorithm.
A comparatively study on visual cryptographyeSAT Journals
Abstract The effective and secure protections of sensitive information are primary concerns in commercial, medical and military systems. To address the reliability problems for secret images, a visual cryptography scheme is a good alternative to remedy the vulnerabilities. Visual cryptography is a very secure and unique way to protect secrets. Visual cryptography is an encryption technique which is used to hide information which is present in an image. Unliketraditional cryptographic schemes, it uses human eyes to recover the secret without any complex decryption algorithms and the facilitate of computers. It is a secret sharing scheme which uses images distributed as shares such that, when the shares are superimposed, a hidden secret image is revealed.In this paper we represent various cryptography technique and research work done in this field. Keywords: Secret image sharing, cryptography, visual quality of image, pixel expansion
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDSIJNSA Journal
With the increasing popularity of information technology in communication network, security has become an inseparable but vital issue for providing for confidentiality, data security, entity authentication and data origin authentication. Steganography is the scheme of hiding data into a cover media to provide confidentiality and secrecy without risking suspicion of an intruder. Visual cryptography is a new technique which provides information security using simple algorithm unlike the complex, computationally intensive algorithms used in other techniques like traditional cryptography. This technique allows visual information to be encrypted in such a way that their decryption can be performed by the Human Visual System (HVS), without any complex cryptographic algorithms. To provide a better secured system that ensures high data capacity and information security, a multilevel security system can be thought for which can be built by incorporating the principles of steganography and visual cryptography.
Image steganography is the art of hiding a message, image, or file within another message, image, or file. Likely, an old term in Ancient Greek, Steganography is derived from steganos meaning ―”concealed” and graphein meaning ―”writing”, in other word we can say it refers to the science of “invisible” communication. Unlike cryptography, where the goal is to secure communications from an eavesdropper, steganography techniques strive to hide the very presence of the message itself froman observer. In this research paper we deal with hiding a digital message image inside a digital cover image leading us to the stego image. With the combination of Message Preparation using Spatial Domain image modification technique, discrete cosine transforms (DCT) and image scrambled using modified Arnold Transform, an algorithm based on the three technologies is proposed. The effectiveness of the proposed methods has been estimated by computing Mean square error (MSE) and Peak Signal to Noise Ratio (PSNR) and experimental result shows that the proposed algorithm is highly secured with good perceptual invisibility
MEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMESijiert bestjournal
In today�s internet world it is very essential to secretly share biometric data stored in the central database. There are so many options to secretly share biometri c data using cryptographic computation. This work reviews and applies a perfectly secure method to secretly share biometric data,for possible use in biometric authentication and protection based on conc ept of visual cryptography. The basic concept of proposed approach is to secretly share private imag e into two meaningful and unexpanded shares (sheets) that are stored in two separate database servers such that decryption can be performed only when both shares are simultaneously available;at the same ti me,the individual share do not open identity of the private image. Previous research,such as Arun Ross et al. in 2011,was using pixel expansion for encryption,which causes the waste of storage space and transmission time. Furthermore,some researcher such as Hou and Quan�s research in 2011,producing m eaningless shares,which causes visually revealing existence of secret image. In this work,we review visual cryptography scheme and apply them to secretly share biometric data such as fingerprint,face images for the purpose of user authentication. So,using this technique we can secretly share biometric data over internet and only authorized user can decrypt the information.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Greyscale image authentication and repairingeSAT Journals
Abstract It is very necessary to design effective methods to solve image authentication problem, particularly for images whose security must be protected. In digital documents it is necessary to provide data authentication and repairing of tampered data e.g. important documents such as certificates, scanned cheques, drawings, circuit diagrams, signed documents, design draft etc. In this paper, a technique for authentication of images with self-repair capability for fixing tampered image data is explained. The input image is assumed to be a binary-type greyscale image with 2 main gray values. Alpha channel is combined in the greyscale image .Using the binary image, authentication signal is calculated which is then embedded in the alpha channel to create an authentic image. After embedding the authentication signal, image is encrypted. If still Content modifications of the stego-image is detected, then data is repaired at the pixel level using reverse secrete sharing scheme. In case if the alpha channel is completely removed from the stego-image, the integral resulting image is regarded as unauthentic, meaning that the integrity check of the image fails. The proposed method is based on the generation of (k, n)-threshold secret sharing scheme proposed by Shamir. In this method a secret message is converted into n shares which is used as authentication signal for keeping by n participants; and when k of the n shares are collected, the secret image can be recovered without any loss[8]. This type of secret sharing scheme is helpful for reducing the risk of incidental partial data loss. Keywords:-Alpha Channel, Secrete sharing scheme, Data repair, Encryption, greyscale image
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Proposed aes for image steganography in different mediaseSAT Journals
Abstract
In this paper, the author presents an enhanced version of modified AES for image-audio steganography technique. The proposed technique improves the security level of encryption and steganography process. Digital image processing is a wide area for research. Images are widely used today. Processing on images means some editing, preprocessing, restoration, compression, steganography and encryption. Steganography is concealing secret information into cover information. Encryption is mainly used for encoding the content of an image into something that cannot be understandable by unauthorized persons. Authorized are those who have the legal access to the content. Nowadays everyone is after information so; it becomes the need today to secure the (confidential) information. The proposed AES technique is an enhancement of modified AES method, which focuses on improving the security of steganography images. Modified AES is described in four steps: first step is key expansion, second is sub bytes modification, third is new shift rows and at last mixing of columns is applied to the matrix. This technique will provide better security and good quality encryption and decryption. Results shows that this method takes less time with the high quality of encrypted image
Keywords – Steganography, Modified Advance Encyption Standard(MAES), Proposed Advance Encyption Standard(PAES),Image Steganography , Image Encryption.
A Novel Visual Cryptographic Scheme Using Floyd Steinberg Half Toning and Block Replacement Algorithms Nisha Menon K – PG Scholar,
Minu Kuriakose – Assistant Professor,
Department of Electronics and Communication,
Federal Institute of Science and Technology, Ernakulam, India
Copyright protection scheme based on visual Cryptography: A Reviewiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Security analysis of fbdk block cipher for digital imageseSAT Journals
Abstract Network security is one of the major concerns in the modern world. In this regard, a strong security technique is required to protect user data. Cryptography techniques plays an important role in secured transmission through encryption of data and thus ensuring integrity, authenticity, confidentiality of information. Several encryption algorithms have been proposed like AES (Advanced Encryption Standard), DES (Data Encryption Standard) and RSA. These provide very good encryption for text applications. However, these encryption schemes appear not to be ideal for image applications. Some algorithms like GKSBC and RC6 provide very good encryption for digital images. New techniques are emerging that are aimed at providing secured transmission of images over networks. The FBDK (Fixed Block with Dynamic Key Size) block cipher is a new cryptography technique designed using simple operations like XOR, substitutions, circular shifting. The FBDK algorithm is applicable for blocks of any size with key size being dynamic for each block. It does not involve any complex mathematical operations like modular exponentiation. It is a hybrid cryptography technique based on symmetric key and asymmetric key cryptosystems. This paper investigates the security of FBDK block cipher for digital images against brute-force attack, statistical analysis and Differential analysis attacks. In this paper, various security analysis tests has been discussed which are helpful in finding out whether the FBDK encryption algorithm can do secure encryption or not. Experimental results proves the security and efficiency of FBDK cipher for images against all aforementioned types of attacks which justifies its consideration for real time image applications. Keywords: Cryptography, Ciphers, Encryption, Security, and cryptanalysis.
A NOVEL METHOD FOR THE CONSTRUCTION OF THRESHOLD MULTIPLE-SECRET VISUAL CRYPT...Editor IJCATR
The main concept of the original visual secret sharing (VSS) scheme is to encrypt a secret image into n
meaningless share images. It cannot leak any information of the shared secret by any combination of the n share images
except for all of images. The shared secret image can be revealed by printing the share images on transparencies and
stacking the transparencies directly, so that the human visual system can recognize the shared secret image without using any
devices. The visual secrets sharing scheme for multiple secrets is called multiple-secret visual cryptographic schemes
(MVCSs). This paper proposed general constructions for threshold multiple-secret visual cryptographic schemes (MVCSs)
that are capable of encoding s secret images. This presented MVCS schemes utilize a predefined pattern book with pixel
expansion to encrypt secret images into share images. In our research, we propose a novel MVCS scheme that can share two
binary secret images on two rectangular share images with no pixel expansion, but also has an excellent recovery quality for
the secret images.
Steganography is the technique of hiding the fact that communication is taking place,by hiding data in other data. Many different carrier file formats such as image, audio, video, DNA etc can be used, but digital images
are the most popular because of their frequency on the Internet. For hiding secret information in images, there exist a large variety of steganographic techniques. In this paper different steganographic techniques are described.
Steganography is the technique of hiding the fact that communication is taking place,
by hiding data in other data. Many different carrier file formats can be used, but digital images
are the most popular because of their frequency on the Internet. For hiding secret information in
images, there exist a large variety of steganographic techniques. Steganalysis, the detection of this
hidden information, is an inherently difficult problem.In this paper,I am going to cover different
steganographic techniques researched by different researchers.
Keywords — Cryptography, Steganography, LSB, Hash-LSB, RSA Encryption –Decryption
Similar to Secured data hiding by using extended visual (20)
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfKamal Acharya
The College Bus Management system is completely developed by Visual Basic .NET Version. The application is connect with most secured database language MS SQL Server. The application is develop by using best combination of front-end and back-end languages. The application is totally design like flat user interface. This flat user interface is more attractive user interface in 2017. The application is gives more important to the system functionality. The application is to manage the student’s details, driver’s details, bus details, bus route details, bus fees details and more. The application has only one unit for admin. The admin can manage the entire application. The admin can login into the application by using username and password of the admin. The application is develop for big and small colleges. It is more user friendly for non-computer person. Even they can easily learn how to manage the application within hours. The application is more secure by the admin. The system will give an effective output for the VB.Net and SQL Server given as input to the system. The compiled java program given as input to the system, after scanning the program will generate different reports. The application generates the report for users. The admin can view and download the report of the data. The application deliver the excel format reports. Because, excel formatted reports is very easy to understand the income and expense of the college bus. This application is mainly develop for windows operating system users. In 2017, 73% of people enterprises are using windows operating system. So the application will easily install for all the windows operating system users. The application-developed size is very low. The application consumes very low space in disk. Therefore, the user can allocate very minimum local disk space for this application.
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSEDuvanRamosGarzon1
AIRCRAFT GENERAL
The Single Aisle is the most advanced family aircraft in service today, with fly-by-wire flight controls.
The A318, A319, A320 and A321 are twin-engine subsonic medium range aircraft.
The family offers a choice of engines
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Courier management system project report.pdfKamal Acharya
It is now-a-days very important for the people to send or receive articles like imported furniture, electronic items, gifts, business goods and the like. People depend vastly on different transport systems which mostly use the manual way of receiving and delivering the articles. There is no way to track the articles till they are received and there is no way to let the customer know what happened in transit, once he booked some articles. In such a situation, we need a system which completely computerizes the cargo activities including time to time tracking of the articles sent. This need is fulfilled by Courier Management System software which is online software for the cargo management people that enables them to receive the goods from a source and send them to a required destination and track their status from time to time.
Automobile Management System Project Report.pdfKamal Acharya
The proposed project is developed to manage the automobile in the automobile dealer company. The main module in this project is login, automobile management, customer management, sales, complaints and reports. The first module is the login. The automobile showroom owner should login to the project for usage. The username and password are verified and if it is correct, next form opens. If the username and password are not correct, it shows the error message.
When a customer search for a automobile, if the automobile is available, they will be taken to a page that shows the details of the automobile including automobile name, automobile ID, quantity, price etc. “Automobile Management System” is useful for maintaining automobiles, customers effectively and hence helps for establishing good relation between customer and automobile organization. It contains various customized modules for effectively maintaining automobiles and stock information accurately and safely.
When the automobile is sold to the customer, stock will be reduced automatically. When a new purchase is made, stock will be increased automatically. While selecting automobiles for sale, the proposed software will automatically check for total number of available stock of that particular item, if the total stock of that particular item is less than 5, software will notify the user to purchase the particular item.
Also when the user tries to sale items which are not in stock, the system will prompt the user that the stock is not enough. Customers of this system can search for a automobile; can purchase a automobile easily by selecting fast. On the other hand the stock of automobiles can be maintained perfectly by the automobile shop manager overcoming the drawbacks of existing system.
Event Management System Vb Net Project Report.pdfKamal Acharya
In present era, the scopes of information technology growing with a very fast .We do not see any are untouched from this industry. The scope of information technology has become wider includes: Business and industry. Household Business, Communication, Education, Entertainment, Science, Medicine, Engineering, Distance Learning, Weather Forecasting. Carrier Searching and so on.
My project named “Event Management System” is software that store and maintained all events coordinated in college. It also helpful to print related reports. My project will help to record the events coordinated by faculties with their Name, Event subject, date & details in an efficient & effective ways.
In my system we have to make a system by which a user can record all events coordinated by a particular faculty. In our proposed system some more featured are added which differs it from the existing system such as security.
Vaccine management system project report documentation..pdfKamal Acharya
The Division of Vaccine and Immunization is facing increasing difficulty monitoring vaccines and other commodities distribution once they have been distributed from the national stores. With the introduction of new vaccines, more challenges have been anticipated with this additions posing serious threat to the already over strained vaccine supply chain system in Kenya.
Vaccine management system project report documentation..pdf
Secured data hiding by using extended visual
1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 32
SECURED DATA HIDING BY USING EXTENDED VISUAL
CRYPTOGRAPHY
Megha Goel1
, M. Chaudhari2
1
PG Student, Computer Science & Engineering, PBCOE, Maharashtra, India
2
HOD & Asst. Professor, Computer Science & Engineering, PBCOE, Maharashtra, India
Abstract
Due to the rapid advancement of the internet large amount of data is transmitted over the internet. Some of the transmitted
information is very important like password, confidential file, security codes etc. so it is very important to provide security to
these data. In computer technology there are two ways to provide security to the data they are cryptography & steganography.
Although, in the past, there has been various research related to cryptography & steganography but neither of them provide
enough & strong security. So this paper proposes a novel approach for data hiding by combining steganography & extended
visual cryptography. Visual cryptography was invented by Moni Naor & Adi Shamir in 1994. Visual cryptography hide secret
image within one or more images & then generate shares. For share generation this paper uses Visual Information Pixel (VIP) &
error diffusion technique.
Keywords: Steganography, Visual Cryptography, Share Generation, VIP, Extended Visual cryptography,
Cryptography
--------------------------------------------------------------------***----------------------------------------------------------------------
1. INTRODUCTION
1.1 Visual Cryptography
Visual cryptography is a secret sharing scheme proposed by
Naor & Shamir [1] in 1994. In Visual cryptography secret
images are divided into n number of shares & separately
shares reveal no information about the secret image. Each
share looks like a collection of random pixels & appear
meaningless. These shares are distributed to k participants &
recovery of the secret image is done by superimposing these
shares. For decryption in traditional cryptography, require a
key, but in visual cryptography it is done by the human
visual system. In other words, visual cryptography does not
require any software or complex computation technique for
decryption. The summary of Naor and Shamir’s schemes is
(1) The secret data is separated into n shares.
(2) Any k or more than k shares can recover the secret.
(3) Any k-1 or fewer than k shares cannot recover the secret
data.
1.2 Basic Model of Visual Cryptography
Following is the process of share generation. Each pixel p
from the secret image is encoded into m black and white
subpixels in each share. If pixel p is white or black one of
the six columns from the Table 1 is randomly selected.
Regardless of the value of p it is replaced by a set of 4
subpixels two of them black & two white. Now the subpixel
in the share gives no clue about the original pixel p of the
secret image.
Fig. 1 shows the basic 2-out-of-2 scheme of visual
cryptography. Here the secret image is divided into two
shares which look like a random collection of black & white
pixels. These shares are distributed to two participants. Now
separately these shares will not reveal anything about the
secret image. After stacking the share 1 & share 2, secret
image can be recovered.
Table 1: Construction of (2, 2) Visual Cryptography
Scheme (VCS)
2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 33
Fig 1: Example of 2-out-of-2 scheme. (a) Binary secret
image. (b) Encrypted share 1. (c) Encrypted share 2. (d)
Decrypted secret message.
1.3 Basic Schemes of Visual Cryptography
1. (2,2) VCS – This is the simplest & less secured
scheme of visual cryptography. In this scheme
secret image is encoded into 2 shares & also
distrubuted to only two participants. For decryption
two shares are overlaid. This scheme can be
implemented by encoding each pixel of the secret
image into either 2 subpixels or 4 subpixels as
shown in the figure 2.
2. (n,n) VCS – This scheme encode the secret image
into n number of shares. For decryption it also
require all of the n shares. If we stack less than n
shares than it will not reveal anything about the
secret image.
3. (k,n) VCS – This scheme encrypt the secret image
into n number of shares & distribute theses shares
to n participants. For decryption it require k number
of shares i.e. k<n & k-1 shares will not provide any
information.
1.4 Extended Visual Cryptography
Ateniese, Blundo & Stinson [2] proposed Extended Visual
Cryptography. In EVC, shares contain secret information
but these shares are meaningful share. In EVC, each share is
some meaningful image rather than random collection of
black & white pixels.
Fig 2
(a) Secret Image
(b) First Cover Image (c) Second Cover Image
(d) Share1 (e) Share 2
(f) Recovered Secret Image
Fig 3: Example of (2, 2) EVC Scheme
1.5 Steganography
Steganography is the art & science of passing information or
hiding information in such a manner that the existence of
information is known to the intended recipient only. The
word steganography derived from Greek means “Covered
Writing”.
3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 34
Steganography uses various methods for hiding data.
Previously our ancestors also used this method for secret
communication. The media they were using are invisible
inks, microdots, etc. today steganography uses test, images
& soud media for hiding data.
There are number of ways to hide information in images.
The most popular one are Least Significant Bit(LSB)
Substitution, Masking & Filtering Technique.
2. RELATED WORK
Visual Cryptography is proposed by Naor & Shamir [1] in
1994. In Visual Cryptography, secret image is encoded into
two or more images called as shares. These shares are
similar to random noise like images. (2,2) is the masic
model of visual cryptography.
Ateniese, Blundo & Stinson[2] in 1996 proposed Extended
Visual cryptography which contain meaningful share
images.
Upto 1997, Visual Cryptography schemes developed for
black & white images only. Verheul & Tilborg[3] developed
the first colored Visual Cryptography Scheme. But in this
scheme share generated is meaningless.
Chang & Tsai [5] develop a color visual cryptography
scheme & also generate meaningful share. In this scheme,
secret color image is encoded in two color image called as
cover images. This scheme uses predefined color Index
Table. The disadvantage of this scheme is that it requires
more storage space to store color index table. This
disadvantage is overcome by Chin-Chen Chang et al. [6].
Nakajima & Yamaguchi [7] proposed Extended Visual
Cryptography for natural images. This scheme produces
meaningful binary shares.
Hou[8] proposed the visual cryptography scheme for gray
level images. This scheme is based on the halftone
technique & color decomposition method.
3. PROPOSED WORK
Fig 4: Framework of the proposed system
3.1 Data Hiding
This is the first module & it based on the steganography. In
this secret data is hided in one color image using text
embedding algorithm.
Following is the working of the algorithm.
First retrive the pixel info i.e the R,G,B values of the
pixel.
Then convert the secret data into their ASCII
equivalents, this forms a byte stream.
Apply Hash function on that byte stream which will
produce a pseudo byte stream
This pseudo byte stream is hided in the LSB’s of the
image.
3.2 Generation of Shares
This paper uses VIP synchronization & error diffusion
technique for share generation. VIP synchronization, this
method, keep possession of pixels having visual information
of original images & error diffusion technique is used to
produce share of good quality.
3.3 Data Extraction
In data Extraction module, apply the text extracting
algorithm on the recovered secret image.
Following is the working of the algorithm.
1) First retrive the pixel info i.e the R,G,B values of the
pixel, this is the pseudo byte stream.
2) Then perform XOR operation between pseudo byte
stream & Hash function to generate ASCII characters.
3) Then convert the ASCII byte stream to text string.
4. SIMULATED RESULTS
Fig.5 Data Hiding Screen
4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 35
Fig.6 Secret File
Fig 7 Selection of cover images
Fig 8 Generation of Shares
Fig: 9 Error diffused for share 1
Fig: 10 Error diffused for share 2
Fig: 11 Recovered Secret File
5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 36
5. ANALYSIS OF THE RESULT
Following table shows the MSE & PSNR for the share1 &
share 2.
Table 2 Result analysis of meaningful shares & their PSNR
Sr.
No.
Color shares
image
PSNR MSE
1 Lena 30.6898 dB 55.4758
2 Baboon 31.1892 dB 49.4488
3 Pepper 30.6303 dB 56.242
6. CONCLUSION
This paper presents a novel approach for hiding data in color
images by integrating steganography & extended visual
cryptography. In Visual cryptography secret images are
divided into n number of shares
For hiding data in color images, this paper uses text
embedding algorithm & then for share generation which is a
visual cryptography part, uses VIP synchronization & error
diffusion technique. VIP synchronization, this method, keep
possession of place of pixels having visual information of
original images & error diffusion technique is used to
produce share of good quality.
REFERENCES
[1]. M. Naor & A. Shamir, Visual Cryptography, advances
in cryptology Eurocrypt’94. Lecture notes in computer
science, 1-12, 1994.
[2]. G. Ateniese, C. Blundo, A. Santis & D. R. Stinson,
Extended capabilities for visual cryptography, ACM Theor.
Comput. Sci., Vol.250,pp. 143-161,2001.
[3]. E. R. Verheul & H.C.A. van Tilborg, Construction &
properties of k out of n visual secret sharing schemes,
Designs, codes & cryptography, vol.11, no. 2, pp.179-196,
1997.
[4]. C. Yang and C. Laih, “New Colored Visual Secret
Sharing Schemes”. Designs, Codes and cryptography, 20,
pp. 325–335, 2000.
[5]. C. Chang, C. Tsai, and T. Chen. “A New Scheme For
Sharing Secret Color Images In Computer Network”,
Proceedings of International Conference on Parallel and
Distributed Systems, pp. 21–27, July 2000.
[6]. Chin-Chen Chang , Tai-Xing Yu , “Sharing A Secret
Gray Image In Multiple Images”, Proceedings of the First
International Symposium on Cyber Worlds (CW.02), 2002.
[7]. M. Nakajima, Y. Yamaguchi, Extended visual
cryptography for natural images, in Proc. WSCG Conf.
2002, pp303-412.
[8]. Y. C. Hou, Visual cryptography for color images,
Pattern Recognition, vol. 17773, pp.1-11, 2003.
[9]. R.Youmaran, A. Adler, A. Miri , “An Improved Visual
Cryptography Scheme For Secret Hiding”, 23rd
Biennial
Symposium on Communications, pp. 340-343, 2006.
[10]. Z. Zhou, Gonzalo R. Arce & Giovanni Di Crescenzo,
Halftone Visual Cryptography, IEEE Transactions on image
processing, vol. 18, no. 8, Aug. 2006
[11]. Hsien-chu Wu, Hao-Cheng Wang & Rui-Wen Yu,
Color visual cryptography scheme using meaningful shares,
8th International conference on intelligent systems design &
applications, IEEE computer society, 2008.
[12]. Z. M. Wang, Gonzalo R. Arce & Giovanni Di
Crescenzo, Halftone Visual Cryptography via error
diffusion, IEEE Transactions Inf. Forensics Security, vol.4,
no. 3, pp. 383-396, Sep.2009.
[13]. Q. Chen, X. Lv, M. Zhang, Y. Chu, An extended color
visual cryptography scheme with multiple secrets hidden,
2010 International conference on computational &
information sciences, IEEE computer society, 2010.
[14]. John Blesswin, Rema, Jenifer Joselin, “Recovering
secret image in visual cryptography” IEEE, 2011.
[15]. M. Kamath, A. Parab, A. Salyankar & S. Dholay,
Extended visual cryptography for color images using coding
tables, International conference on communication,
Information & computing technology(ICCICT), Oct. 19-20,
2012, Mumbai, India.
[16]. P.S. Revenkar, A. Anjum, W. Z. Gandhare, Survey of
visual cryptography schemes, International Journal of
security & its applications, vol.4, No. 2, April-2010.
[17]. Soumik Das, Pradosh Bandyopadhyay, Proj Alai
Chaudhuri, Dr. Monalisa Banerjee, A Secured Key-based
Digital Text Passing System through Color Image Pixels,
IEEE-International Conference On Advances In
Engineering, Science And Management (ICAESM -2012)
March 30, 31, 2012
[18]. Chi-Kwong Chan, L.M. Cheng, Hiding data in images
by simple LSB substitution, Pattern Recognition 37 (2004)
469 – 474.
[19]. Arvind Kumar, Km. Pooja, Steganography- A Data
Hiding Technique‖, International Journal of Computer
Applications (0975 – 8887) Volume 9– No.7, November
2010.
[20]. Nagham Hamid, Abid Yahya, R. Badlishah Ahmad &
Osamah M. Al-Qershi, Image Steganography Techniques:
An Overview, International Journal of Computer Science
and Security (IJCSS), Volume (6) : Issue (3) : 2012.
[21]. Babloo Saha and Shuchi Sharma, Steganographic
Techniques of Data Hiding using Digital Images, Defence
Science Journal, Vol. 62, No. 1, January 2012, pp. 11-18.
[22]. N. Askari, N.H. Heys & C. R. Moloney, “An extended
visual cryptography schemes without pixel expansion for
halftone images”, 2013, 26th
IEEE Canadian conference of
electrical & computer engineering.
[23]. Jin, D., Yan and Kankanhalli, M.S., Progressive color
visual cryptography. J. Electron. Imaging. v14.