SlideShare a Scribd company logo
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 32
SECURED DATA HIDING BY USING EXTENDED VISUAL
CRYPTOGRAPHY
Megha Goel1
, M. Chaudhari2
1
PG Student, Computer Science & Engineering, PBCOE, Maharashtra, India
2
HOD & Asst. Professor, Computer Science & Engineering, PBCOE, Maharashtra, India
Abstract
Due to the rapid advancement of the internet large amount of data is transmitted over the internet. Some of the transmitted
information is very important like password, confidential file, security codes etc. so it is very important to provide security to
these data. In computer technology there are two ways to provide security to the data they are cryptography & steganography.
Although, in the past, there has been various research related to cryptography & steganography but neither of them provide
enough & strong security. So this paper proposes a novel approach for data hiding by combining steganography & extended
visual cryptography. Visual cryptography was invented by Moni Naor & Adi Shamir in 1994. Visual cryptography hide secret
image within one or more images & then generate shares. For share generation this paper uses Visual Information Pixel (VIP) &
error diffusion technique.
Keywords: Steganography, Visual Cryptography, Share Generation, VIP, Extended Visual cryptography,
Cryptography
--------------------------------------------------------------------***----------------------------------------------------------------------
1. INTRODUCTION
1.1 Visual Cryptography
Visual cryptography is a secret sharing scheme proposed by
Naor & Shamir [1] in 1994. In Visual cryptography secret
images are divided into n number of shares & separately
shares reveal no information about the secret image. Each
share looks like a collection of random pixels & appear
meaningless. These shares are distributed to k participants &
recovery of the secret image is done by superimposing these
shares. For decryption in traditional cryptography, require a
key, but in visual cryptography it is done by the human
visual system. In other words, visual cryptography does not
require any software or complex computation technique for
decryption. The summary of Naor and Shamir’s schemes is
(1) The secret data is separated into n shares.
(2) Any k or more than k shares can recover the secret.
(3) Any k-1 or fewer than k shares cannot recover the secret
data.
1.2 Basic Model of Visual Cryptography
Following is the process of share generation. Each pixel p
from the secret image is encoded into m black and white
subpixels in each share. If pixel p is white or black one of
the six columns from the Table 1 is randomly selected.
Regardless of the value of p it is replaced by a set of 4
subpixels two of them black & two white. Now the subpixel
in the share gives no clue about the original pixel p of the
secret image.
Fig. 1 shows the basic 2-out-of-2 scheme of visual
cryptography. Here the secret image is divided into two
shares which look like a random collection of black & white
pixels. These shares are distributed to two participants. Now
separately these shares will not reveal anything about the
secret image. After stacking the share 1 & share 2, secret
image can be recovered.
Table 1: Construction of (2, 2) Visual Cryptography
Scheme (VCS)
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 33
Fig 1: Example of 2-out-of-2 scheme. (a) Binary secret
image. (b) Encrypted share 1. (c) Encrypted share 2. (d)
Decrypted secret message.
1.3 Basic Schemes of Visual Cryptography
1. (2,2) VCS – This is the simplest & less secured
scheme of visual cryptography. In this scheme
secret image is encoded into 2 shares & also
distrubuted to only two participants. For decryption
two shares are overlaid. This scheme can be
implemented by encoding each pixel of the secret
image into either 2 subpixels or 4 subpixels as
shown in the figure 2.
2. (n,n) VCS – This scheme encode the secret image
into n number of shares. For decryption it also
require all of the n shares. If we stack less than n
shares than it will not reveal anything about the
secret image.
3. (k,n) VCS – This scheme encrypt the secret image
into n number of shares & distribute theses shares
to n participants. For decryption it require k number
of shares i.e. k<n & k-1 shares will not provide any
information.
1.4 Extended Visual Cryptography
Ateniese, Blundo & Stinson [2] proposed Extended Visual
Cryptography. In EVC, shares contain secret information
but these shares are meaningful share. In EVC, each share is
some meaningful image rather than random collection of
black & white pixels.
Fig 2
(a) Secret Image
(b) First Cover Image (c) Second Cover Image
(d) Share1 (e) Share 2
(f) Recovered Secret Image
Fig 3: Example of (2, 2) EVC Scheme
1.5 Steganography
Steganography is the art & science of passing information or
hiding information in such a manner that the existence of
information is known to the intended recipient only. The
word steganography derived from Greek means “Covered
Writing”.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 34
Steganography uses various methods for hiding data.
Previously our ancestors also used this method for secret
communication. The media they were using are invisible
inks, microdots, etc. today steganography uses test, images
& soud media for hiding data.
There are number of ways to hide information in images.
The most popular one are Least Significant Bit(LSB)
Substitution, Masking & Filtering Technique.
2. RELATED WORK
Visual Cryptography is proposed by Naor & Shamir [1] in
1994. In Visual Cryptography, secret image is encoded into
two or more images called as shares. These shares are
similar to random noise like images. (2,2) is the masic
model of visual cryptography.
Ateniese, Blundo & Stinson[2] in 1996 proposed Extended
Visual cryptography which contain meaningful share
images.
Upto 1997, Visual Cryptography schemes developed for
black & white images only. Verheul & Tilborg[3] developed
the first colored Visual Cryptography Scheme. But in this
scheme share generated is meaningless.
Chang & Tsai [5] develop a color visual cryptography
scheme & also generate meaningful share. In this scheme,
secret color image is encoded in two color image called as
cover images. This scheme uses predefined color Index
Table. The disadvantage of this scheme is that it requires
more storage space to store color index table. This
disadvantage is overcome by Chin-Chen Chang et al. [6].
Nakajima & Yamaguchi [7] proposed Extended Visual
Cryptography for natural images. This scheme produces
meaningful binary shares.
Hou[8] proposed the visual cryptography scheme for gray
level images. This scheme is based on the halftone
technique & color decomposition method.
3. PROPOSED WORK
Fig 4: Framework of the proposed system
3.1 Data Hiding
This is the first module & it based on the steganography. In
this secret data is hided in one color image using text
embedding algorithm.
Following is the working of the algorithm.
 First retrive the pixel info i.e the R,G,B values of the
pixel.
 Then convert the secret data into their ASCII
equivalents, this forms a byte stream.
 Apply Hash function on that byte stream which will
produce a pseudo byte stream
 This pseudo byte stream is hided in the LSB’s of the
image.
3.2 Generation of Shares
This paper uses VIP synchronization & error diffusion
technique for share generation. VIP synchronization, this
method, keep possession of pixels having visual information
of original images & error diffusion technique is used to
produce share of good quality.
3.3 Data Extraction
In data Extraction module, apply the text extracting
algorithm on the recovered secret image.
Following is the working of the algorithm.
1) First retrive the pixel info i.e the R,G,B values of the
pixel, this is the pseudo byte stream.
2) Then perform XOR operation between pseudo byte
stream & Hash function to generate ASCII characters.
3) Then convert the ASCII byte stream to text string.
4. SIMULATED RESULTS
Fig.5 Data Hiding Screen
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 35
Fig.6 Secret File
Fig 7 Selection of cover images
Fig 8 Generation of Shares
Fig: 9 Error diffused for share 1
Fig: 10 Error diffused for share 2
Fig: 11 Recovered Secret File
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 36
5. ANALYSIS OF THE RESULT
Following table shows the MSE & PSNR for the share1 &
share 2.
Table 2 Result analysis of meaningful shares & their PSNR
Sr.
No.
Color shares
image
PSNR MSE
1 Lena 30.6898 dB 55.4758
2 Baboon 31.1892 dB 49.4488
3 Pepper 30.6303 dB 56.242
6. CONCLUSION
This paper presents a novel approach for hiding data in color
images by integrating steganography & extended visual
cryptography. In Visual cryptography secret images are
divided into n number of shares
For hiding data in color images, this paper uses text
embedding algorithm & then for share generation which is a
visual cryptography part, uses VIP synchronization & error
diffusion technique. VIP synchronization, this method, keep
possession of place of pixels having visual information of
original images & error diffusion technique is used to
produce share of good quality.
REFERENCES
[1]. M. Naor & A. Shamir, Visual Cryptography, advances
in cryptology Eurocrypt’94. Lecture notes in computer
science, 1-12, 1994.
[2]. G. Ateniese, C. Blundo, A. Santis & D. R. Stinson,
Extended capabilities for visual cryptography, ACM Theor.
Comput. Sci., Vol.250,pp. 143-161,2001.
[3]. E. R. Verheul & H.C.A. van Tilborg, Construction &
properties of k out of n visual secret sharing schemes,
Designs, codes & cryptography, vol.11, no. 2, pp.179-196,
1997.
[4]. C. Yang and C. Laih, “New Colored Visual Secret
Sharing Schemes”. Designs, Codes and cryptography, 20,
pp. 325–335, 2000.
[5]. C. Chang, C. Tsai, and T. Chen. “A New Scheme For
Sharing Secret Color Images In Computer Network”,
Proceedings of International Conference on Parallel and
Distributed Systems, pp. 21–27, July 2000.
[6]. Chin-Chen Chang , Tai-Xing Yu , “Sharing A Secret
Gray Image In Multiple Images”, Proceedings of the First
International Symposium on Cyber Worlds (CW.02), 2002.
[7]. M. Nakajima, Y. Yamaguchi, Extended visual
cryptography for natural images, in Proc. WSCG Conf.
2002, pp303-412.
[8]. Y. C. Hou, Visual cryptography for color images,
Pattern Recognition, vol. 17773, pp.1-11, 2003.
[9]. R.Youmaran, A. Adler, A. Miri , “An Improved Visual
Cryptography Scheme For Secret Hiding”, 23rd
Biennial
Symposium on Communications, pp. 340-343, 2006.
[10]. Z. Zhou, Gonzalo R. Arce & Giovanni Di Crescenzo,
Halftone Visual Cryptography, IEEE Transactions on image
processing, vol. 18, no. 8, Aug. 2006
[11]. Hsien-chu Wu, Hao-Cheng Wang & Rui-Wen Yu,
Color visual cryptography scheme using meaningful shares,
8th International conference on intelligent systems design &
applications, IEEE computer society, 2008.
[12]. Z. M. Wang, Gonzalo R. Arce & Giovanni Di
Crescenzo, Halftone Visual Cryptography via error
diffusion, IEEE Transactions Inf. Forensics Security, vol.4,
no. 3, pp. 383-396, Sep.2009.
[13]. Q. Chen, X. Lv, M. Zhang, Y. Chu, An extended color
visual cryptography scheme with multiple secrets hidden,
2010 International conference on computational &
information sciences, IEEE computer society, 2010.
[14]. John Blesswin, Rema, Jenifer Joselin, “Recovering
secret image in visual cryptography” IEEE, 2011.
[15]. M. Kamath, A. Parab, A. Salyankar & S. Dholay,
Extended visual cryptography for color images using coding
tables, International conference on communication,
Information & computing technology(ICCICT), Oct. 19-20,
2012, Mumbai, India.
[16]. P.S. Revenkar, A. Anjum, W. Z. Gandhare, Survey of
visual cryptography schemes, International Journal of
security & its applications, vol.4, No. 2, April-2010.
[17]. Soumik Das, Pradosh Bandyopadhyay, Proj Alai
Chaudhuri, Dr. Monalisa Banerjee, A Secured Key-based
Digital Text Passing System through Color Image Pixels,
IEEE-International Conference On Advances In
Engineering, Science And Management (ICAESM -2012)
March 30, 31, 2012
[18]. Chi-Kwong Chan, L.M. Cheng, Hiding data in images
by simple LSB substitution, Pattern Recognition 37 (2004)
469 – 474.
[19]. Arvind Kumar, Km. Pooja, Steganography- A Data
Hiding Technique‖, International Journal of Computer
Applications (0975 – 8887) Volume 9– No.7, November
2010.
[20]. Nagham Hamid, Abid Yahya, R. Badlishah Ahmad &
Osamah M. Al-Qershi, Image Steganography Techniques:
An Overview, International Journal of Computer Science
and Security (IJCSS), Volume (6) : Issue (3) : 2012.
[21]. Babloo Saha and Shuchi Sharma, Steganographic
Techniques of Data Hiding using Digital Images, Defence
Science Journal, Vol. 62, No. 1, January 2012, pp. 11-18.
[22]. N. Askari, N.H. Heys & C. R. Moloney, “An extended
visual cryptography schemes without pixel expansion for
halftone images”, 2013, 26th
IEEE Canadian conference of
electrical & computer engineering.
[23]. Jin, D., Yan and Kankanhalli, M.S., Progressive color
visual cryptography. J. Electron. Imaging. v14.

More Related Content

What's hot

Chaos Image Encryption using Pixel shuffling
Chaos Image Encryption using Pixel shuffling Chaos Image Encryption using Pixel shuffling
Chaos Image Encryption using Pixel shuffling
cscpconf
 
Performance analysis of transformation and bogdonov chaotic substitution base...
Performance analysis of transformation and bogdonov chaotic substitution base...Performance analysis of transformation and bogdonov chaotic substitution base...
Performance analysis of transformation and bogdonov chaotic substitution base...
IJECEIAES
 
Double layer security using visual cryptography and transform based steganogr...
Double layer security using visual cryptography and transform based steganogr...Double layer security using visual cryptography and transform based steganogr...
Double layer security using visual cryptography and transform based steganogr...
eSAT Publishing House
 
Variable length key based visual
Variable length key based visualVariable length key based visual
Variable length key based visual
csandit
 
A new fangled symmetric block cipher using zig-zag scan patterns
A new fangled symmetric block cipher using zig-zag scan patternsA new fangled symmetric block cipher using zig-zag scan patterns
A new fangled symmetric block cipher using zig-zag scan patterns
eSAT Journals
 
Analysing secure image secret sharing schemes based on steganography
Analysing secure image secret sharing schemes based on steganographyAnalysing secure image secret sharing schemes based on steganography
Analysing secure image secret sharing schemes based on steganographyIAEME Publication
 
A CHAOTIC CONFUSION-DIFFUSION IMAGE ENCRYPTION BASED ON HENON MAP
A CHAOTIC CONFUSION-DIFFUSION IMAGE ENCRYPTION BASED ON HENON MAPA CHAOTIC CONFUSION-DIFFUSION IMAGE ENCRYPTION BASED ON HENON MAP
A CHAOTIC CONFUSION-DIFFUSION IMAGE ENCRYPTION BASED ON HENON MAP
IJNSA Journal
 
Fx3610771081
Fx3610771081Fx3610771081
Fx3610771081
IJERA Editor
 
Image Steganography Based On Non Linear Chaotic Algorithm
Image Steganography Based On Non Linear Chaotic AlgorithmImage Steganography Based On Non Linear Chaotic Algorithm
Image Steganography Based On Non Linear Chaotic Algorithm
IJARIDEA Journal
 
An improved color image encryption algorithm with
An improved color image encryption algorithm withAn improved color image encryption algorithm with
An improved color image encryption algorithm with
eSAT Publishing House
 
An improved color image encryption algorithm with pixel permutation and bit s...
An improved color image encryption algorithm with pixel permutation and bit s...An improved color image encryption algorithm with pixel permutation and bit s...
An improved color image encryption algorithm with pixel permutation and bit s...
eSAT Journals
 
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel SubstitutionImage Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
ijsrd.com
 
Secure image encryption using aes
Secure image encryption using aesSecure image encryption using aes
Secure image encryption using aes
eSAT Publishing House
 
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
idescitation
 
Ew4301904907
Ew4301904907Ew4301904907
Ew4301904907
IJERA Editor
 
CT-SVD and Arnold Transform for Secure Color Image Watermarking
CT-SVD and Arnold Transform for Secure Color Image WatermarkingCT-SVD and Arnold Transform for Secure Color Image Watermarking
CT-SVD and Arnold Transform for Secure Color Image Watermarking
AM Publications,India
 
11.biometric data security using recursive visual cryptography
11.biometric data security using recursive visual cryptography11.biometric data security using recursive visual cryptography
11.biometric data security using recursive visual cryptography
Alexander Decker
 
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
IOSR Journals
 
A novel efficient multiple encryption algorithm for real time images
A novel efficient multiple encryption algorithm for real time images A novel efficient multiple encryption algorithm for real time images
A novel efficient multiple encryption algorithm for real time images
IJECEIAES
 

What's hot (19)

Chaos Image Encryption using Pixel shuffling
Chaos Image Encryption using Pixel shuffling Chaos Image Encryption using Pixel shuffling
Chaos Image Encryption using Pixel shuffling
 
Performance analysis of transformation and bogdonov chaotic substitution base...
Performance analysis of transformation and bogdonov chaotic substitution base...Performance analysis of transformation and bogdonov chaotic substitution base...
Performance analysis of transformation and bogdonov chaotic substitution base...
 
Double layer security using visual cryptography and transform based steganogr...
Double layer security using visual cryptography and transform based steganogr...Double layer security using visual cryptography and transform based steganogr...
Double layer security using visual cryptography and transform based steganogr...
 
Variable length key based visual
Variable length key based visualVariable length key based visual
Variable length key based visual
 
A new fangled symmetric block cipher using zig-zag scan patterns
A new fangled symmetric block cipher using zig-zag scan patternsA new fangled symmetric block cipher using zig-zag scan patterns
A new fangled symmetric block cipher using zig-zag scan patterns
 
Analysing secure image secret sharing schemes based on steganography
Analysing secure image secret sharing schemes based on steganographyAnalysing secure image secret sharing schemes based on steganography
Analysing secure image secret sharing schemes based on steganography
 
A CHAOTIC CONFUSION-DIFFUSION IMAGE ENCRYPTION BASED ON HENON MAP
A CHAOTIC CONFUSION-DIFFUSION IMAGE ENCRYPTION BASED ON HENON MAPA CHAOTIC CONFUSION-DIFFUSION IMAGE ENCRYPTION BASED ON HENON MAP
A CHAOTIC CONFUSION-DIFFUSION IMAGE ENCRYPTION BASED ON HENON MAP
 
Fx3610771081
Fx3610771081Fx3610771081
Fx3610771081
 
Image Steganography Based On Non Linear Chaotic Algorithm
Image Steganography Based On Non Linear Chaotic AlgorithmImage Steganography Based On Non Linear Chaotic Algorithm
Image Steganography Based On Non Linear Chaotic Algorithm
 
An improved color image encryption algorithm with
An improved color image encryption algorithm withAn improved color image encryption algorithm with
An improved color image encryption algorithm with
 
An improved color image encryption algorithm with pixel permutation and bit s...
An improved color image encryption algorithm with pixel permutation and bit s...An improved color image encryption algorithm with pixel permutation and bit s...
An improved color image encryption algorithm with pixel permutation and bit s...
 
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel SubstitutionImage Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
 
Secure image encryption using aes
Secure image encryption using aesSecure image encryption using aes
Secure image encryption using aes
 
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
 
Ew4301904907
Ew4301904907Ew4301904907
Ew4301904907
 
CT-SVD and Arnold Transform for Secure Color Image Watermarking
CT-SVD and Arnold Transform for Secure Color Image WatermarkingCT-SVD and Arnold Transform for Secure Color Image Watermarking
CT-SVD and Arnold Transform for Secure Color Image Watermarking
 
11.biometric data security using recursive visual cryptography
11.biometric data security using recursive visual cryptography11.biometric data security using recursive visual cryptography
11.biometric data security using recursive visual cryptography
 
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
 
A novel efficient multiple encryption algorithm for real time images
A novel efficient multiple encryption algorithm for real time images A novel efficient multiple encryption algorithm for real time images
A novel efficient multiple encryption algorithm for real time images
 

Viewers also liked

Optimized sensor nodes by fault node recovery algorithm
Optimized sensor nodes by fault node recovery algorithmOptimized sensor nodes by fault node recovery algorithm
Optimized sensor nodes by fault node recovery algorithm
eSAT Publishing House
 
Effects of different mole spacings on the yield of summer groundnut
Effects of different mole spacings on the yield of summer groundnutEffects of different mole spacings on the yield of summer groundnut
Effects of different mole spacings on the yield of summer groundnut
eSAT Publishing House
 
Elevating forensic investigation system for file clustering
Elevating forensic investigation system for file clusteringElevating forensic investigation system for file clustering
Elevating forensic investigation system for file clustering
eSAT Publishing House
 
Novel model for rural housing development
Novel model for rural housing developmentNovel model for rural housing development
Novel model for rural housing development
eSAT Publishing House
 
A review of pre combustion co2 capture in igcc
A review of pre combustion co2 capture in igccA review of pre combustion co2 capture in igcc
A review of pre combustion co2 capture in igcc
eSAT Publishing House
 
Design and characterization of various shapes of microcantilever for human im...
Design and characterization of various shapes of microcantilever for human im...Design and characterization of various shapes of microcantilever for human im...
Design and characterization of various shapes of microcantilever for human im...
eSAT Publishing House
 
Screening of antibacterial and cytotoxic activity of extracts from epidermis ...
Screening of antibacterial and cytotoxic activity of extracts from epidermis ...Screening of antibacterial and cytotoxic activity of extracts from epidermis ...
Screening of antibacterial and cytotoxic activity of extracts from epidermis ...
eSAT Publishing House
 
Fpga implementation of optimal step size nlms algorithm and its performance a...
Fpga implementation of optimal step size nlms algorithm and its performance a...Fpga implementation of optimal step size nlms algorithm and its performance a...
Fpga implementation of optimal step size nlms algorithm and its performance a...
eSAT Publishing House
 
A survey on optimal route queries for road networks
A survey on optimal route queries for road networksA survey on optimal route queries for road networks
A survey on optimal route queries for road networks
eSAT Publishing House
 
Transient voltage distribution in transformer winding (experimental investiga...
Transient voltage distribution in transformer winding (experimental investiga...Transient voltage distribution in transformer winding (experimental investiga...
Transient voltage distribution in transformer winding (experimental investiga...
eSAT Publishing House
 
An iterative unsymmetrical trimmed midpoint median filter for removal of high...
An iterative unsymmetrical trimmed midpoint median filter for removal of high...An iterative unsymmetrical trimmed midpoint median filter for removal of high...
An iterative unsymmetrical trimmed midpoint median filter for removal of high...
eSAT Publishing House
 
Web performance prediction using geo statistical method
Web performance prediction using geo statistical methodWeb performance prediction using geo statistical method
Web performance prediction using geo statistical method
eSAT Publishing House
 
Conceptual design of laser assisted fixture for bending operation
Conceptual design of laser assisted fixture for bending operationConceptual design of laser assisted fixture for bending operation
Conceptual design of laser assisted fixture for bending operation
eSAT Publishing House
 
The demonstration of fourier series to first year undergraduate engineering s...
The demonstration of fourier series to first year undergraduate engineering s...The demonstration of fourier series to first year undergraduate engineering s...
The demonstration of fourier series to first year undergraduate engineering s...
eSAT Publishing House
 
Experimental investigation, optimization and performance prediction of wind t...
Experimental investigation, optimization and performance prediction of wind t...Experimental investigation, optimization and performance prediction of wind t...
Experimental investigation, optimization and performance prediction of wind t...
eSAT Publishing House
 
Biodiesel as a blended fuel in compression ignition
Biodiesel as a blended fuel in compression ignitionBiodiesel as a blended fuel in compression ignition
Biodiesel as a blended fuel in compression ignition
eSAT Publishing House
 
Optimization of process parameter for stir casted
Optimization of process parameter for stir castedOptimization of process parameter for stir casted
Optimization of process parameter for stir casted
eSAT Publishing House
 
Fabrication and optimization of parameters for dye
Fabrication and optimization of parameters for dyeFabrication and optimization of parameters for dye
Fabrication and optimization of parameters for dye
eSAT Publishing House
 
Assessment of composting, energy and gas generation
Assessment of composting, energy and gas generationAssessment of composting, energy and gas generation
Assessment of composting, energy and gas generation
eSAT Publishing House
 
Study of bad block management and wear leveling in
Study of bad block management and wear leveling inStudy of bad block management and wear leveling in
Study of bad block management and wear leveling in
eSAT Publishing House
 

Viewers also liked (20)

Optimized sensor nodes by fault node recovery algorithm
Optimized sensor nodes by fault node recovery algorithmOptimized sensor nodes by fault node recovery algorithm
Optimized sensor nodes by fault node recovery algorithm
 
Effects of different mole spacings on the yield of summer groundnut
Effects of different mole spacings on the yield of summer groundnutEffects of different mole spacings on the yield of summer groundnut
Effects of different mole spacings on the yield of summer groundnut
 
Elevating forensic investigation system for file clustering
Elevating forensic investigation system for file clusteringElevating forensic investigation system for file clustering
Elevating forensic investigation system for file clustering
 
Novel model for rural housing development
Novel model for rural housing developmentNovel model for rural housing development
Novel model for rural housing development
 
A review of pre combustion co2 capture in igcc
A review of pre combustion co2 capture in igccA review of pre combustion co2 capture in igcc
A review of pre combustion co2 capture in igcc
 
Design and characterization of various shapes of microcantilever for human im...
Design and characterization of various shapes of microcantilever for human im...Design and characterization of various shapes of microcantilever for human im...
Design and characterization of various shapes of microcantilever for human im...
 
Screening of antibacterial and cytotoxic activity of extracts from epidermis ...
Screening of antibacterial and cytotoxic activity of extracts from epidermis ...Screening of antibacterial and cytotoxic activity of extracts from epidermis ...
Screening of antibacterial and cytotoxic activity of extracts from epidermis ...
 
Fpga implementation of optimal step size nlms algorithm and its performance a...
Fpga implementation of optimal step size nlms algorithm and its performance a...Fpga implementation of optimal step size nlms algorithm and its performance a...
Fpga implementation of optimal step size nlms algorithm and its performance a...
 
A survey on optimal route queries for road networks
A survey on optimal route queries for road networksA survey on optimal route queries for road networks
A survey on optimal route queries for road networks
 
Transient voltage distribution in transformer winding (experimental investiga...
Transient voltage distribution in transformer winding (experimental investiga...Transient voltage distribution in transformer winding (experimental investiga...
Transient voltage distribution in transformer winding (experimental investiga...
 
An iterative unsymmetrical trimmed midpoint median filter for removal of high...
An iterative unsymmetrical trimmed midpoint median filter for removal of high...An iterative unsymmetrical trimmed midpoint median filter for removal of high...
An iterative unsymmetrical trimmed midpoint median filter for removal of high...
 
Web performance prediction using geo statistical method
Web performance prediction using geo statistical methodWeb performance prediction using geo statistical method
Web performance prediction using geo statistical method
 
Conceptual design of laser assisted fixture for bending operation
Conceptual design of laser assisted fixture for bending operationConceptual design of laser assisted fixture for bending operation
Conceptual design of laser assisted fixture for bending operation
 
The demonstration of fourier series to first year undergraduate engineering s...
The demonstration of fourier series to first year undergraduate engineering s...The demonstration of fourier series to first year undergraduate engineering s...
The demonstration of fourier series to first year undergraduate engineering s...
 
Experimental investigation, optimization and performance prediction of wind t...
Experimental investigation, optimization and performance prediction of wind t...Experimental investigation, optimization and performance prediction of wind t...
Experimental investigation, optimization and performance prediction of wind t...
 
Biodiesel as a blended fuel in compression ignition
Biodiesel as a blended fuel in compression ignitionBiodiesel as a blended fuel in compression ignition
Biodiesel as a blended fuel in compression ignition
 
Optimization of process parameter for stir casted
Optimization of process parameter for stir castedOptimization of process parameter for stir casted
Optimization of process parameter for stir casted
 
Fabrication and optimization of parameters for dye
Fabrication and optimization of parameters for dyeFabrication and optimization of parameters for dye
Fabrication and optimization of parameters for dye
 
Assessment of composting, energy and gas generation
Assessment of composting, energy and gas generationAssessment of composting, energy and gas generation
Assessment of composting, energy and gas generation
 
Study of bad block management and wear leveling in
Study of bad block management and wear leveling inStudy of bad block management and wear leveling in
Study of bad block management and wear leveling in
 

Similar to Secured data hiding by using extended visual

A novel cryptographic technique that emphasis visual quality and efficieny by...
A novel cryptographic technique that emphasis visual quality and efficieny by...A novel cryptographic technique that emphasis visual quality and efficieny by...
A novel cryptographic technique that emphasis visual quality and efficieny by...
eSAT Journals
 
A comparatively study on visual cryptography
A comparatively study on visual cryptographyA comparatively study on visual cryptography
A comparatively study on visual cryptography
eSAT Journals
 
Authentication framework using visual cryptography
Authentication framework using visual cryptographyAuthentication framework using visual cryptography
Authentication framework using visual cryptography
eSAT Publishing House
 
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDSHYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
IJNSA Journal
 
Frequency Domain Approach of Image Steganography
Frequency Domain Approach of Image SteganographyFrequency Domain Approach of Image Steganography
Frequency Domain Approach of Image Steganography
AM Publications,India
 
MEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMES
MEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMESMEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMES
MEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMES
ijiert bestjournal
 
Greyscale image authentication and repairing
Greyscale image authentication and repairingGreyscale image authentication and repairing
Greyscale image authentication and repairing
eSAT Publishing House
 
Greyscale image authentication and repairing
Greyscale image authentication and repairingGreyscale image authentication and repairing
Greyscale image authentication and repairing
eSAT Journals
 
An approach to hide data in video using steganography
An approach to hide data in video using steganographyAn approach to hide data in video using steganography
An approach to hide data in video using steganography
eSAT Publishing House
 
Proposed aes for image steganography in different medias
Proposed aes for image steganography in different mediasProposed aes for image steganography in different medias
Proposed aes for image steganography in different medias
eSAT Journals
 
Proposed aes for image steganography in different medias
Proposed aes for image steganography in different mediasProposed aes for image steganography in different medias
Proposed aes for image steganography in different medias
eSAT Publishing House
 
V01 i010411
V01 i010411V01 i010411
V01 i010411
IJARBEST JOURNAL
 
Copyright protection scheme based on visual Cryptography: A Review
Copyright protection scheme based on visual Cryptography: A ReviewCopyright protection scheme based on visual Cryptography: A Review
Copyright protection scheme based on visual Cryptography: A Review
iosrjce
 
N017327985
N017327985N017327985
N017327985
IOSR Journals
 
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
IRJET Journal
 
Security analysis of fbdk block cipher for digital
Security analysis of fbdk block cipher for digitalSecurity analysis of fbdk block cipher for digital
Security analysis of fbdk block cipher for digital
eSAT Publishing House
 
Security analysis of fbdk block cipher for digital images
Security analysis of fbdk block cipher for digital imagesSecurity analysis of fbdk block cipher for digital images
Security analysis of fbdk block cipher for digital images
eSAT Journals
 
A NOVEL METHOD FOR THE CONSTRUCTION OF THRESHOLD MULTIPLE-SECRET VISUAL CRYPT...
A NOVEL METHOD FOR THE CONSTRUCTION OF THRESHOLD MULTIPLE-SECRET VISUAL CRYPT...A NOVEL METHOD FOR THE CONSTRUCTION OF THRESHOLD MULTIPLE-SECRET VISUAL CRYPT...
A NOVEL METHOD FOR THE CONSTRUCTION OF THRESHOLD MULTIPLE-SECRET VISUAL CRYPT...
Editor IJCATR
 
Image steganography techniques
Image steganography techniquesImage steganography techniques
Image steganography techniques
Rashmi Tank
 
Image Steganography Techniques
Image Steganography TechniquesImage Steganography Techniques
Image Steganography Techniques
editor1knowledgecuddle
 

Similar to Secured data hiding by using extended visual (20)

A novel cryptographic technique that emphasis visual quality and efficieny by...
A novel cryptographic technique that emphasis visual quality and efficieny by...A novel cryptographic technique that emphasis visual quality and efficieny by...
A novel cryptographic technique that emphasis visual quality and efficieny by...
 
A comparatively study on visual cryptography
A comparatively study on visual cryptographyA comparatively study on visual cryptography
A comparatively study on visual cryptography
 
Authentication framework using visual cryptography
Authentication framework using visual cryptographyAuthentication framework using visual cryptography
Authentication framework using visual cryptography
 
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDSHYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
 
Frequency Domain Approach of Image Steganography
Frequency Domain Approach of Image SteganographyFrequency Domain Approach of Image Steganography
Frequency Domain Approach of Image Steganography
 
MEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMES
MEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMESMEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMES
MEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMES
 
Greyscale image authentication and repairing
Greyscale image authentication and repairingGreyscale image authentication and repairing
Greyscale image authentication and repairing
 
Greyscale image authentication and repairing
Greyscale image authentication and repairingGreyscale image authentication and repairing
Greyscale image authentication and repairing
 
An approach to hide data in video using steganography
An approach to hide data in video using steganographyAn approach to hide data in video using steganography
An approach to hide data in video using steganography
 
Proposed aes for image steganography in different medias
Proposed aes for image steganography in different mediasProposed aes for image steganography in different medias
Proposed aes for image steganography in different medias
 
Proposed aes for image steganography in different medias
Proposed aes for image steganography in different mediasProposed aes for image steganography in different medias
Proposed aes for image steganography in different medias
 
V01 i010411
V01 i010411V01 i010411
V01 i010411
 
Copyright protection scheme based on visual Cryptography: A Review
Copyright protection scheme based on visual Cryptography: A ReviewCopyright protection scheme based on visual Cryptography: A Review
Copyright protection scheme based on visual Cryptography: A Review
 
N017327985
N017327985N017327985
N017327985
 
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
 
Security analysis of fbdk block cipher for digital
Security analysis of fbdk block cipher for digitalSecurity analysis of fbdk block cipher for digital
Security analysis of fbdk block cipher for digital
 
Security analysis of fbdk block cipher for digital images
Security analysis of fbdk block cipher for digital imagesSecurity analysis of fbdk block cipher for digital images
Security analysis of fbdk block cipher for digital images
 
A NOVEL METHOD FOR THE CONSTRUCTION OF THRESHOLD MULTIPLE-SECRET VISUAL CRYPT...
A NOVEL METHOD FOR THE CONSTRUCTION OF THRESHOLD MULTIPLE-SECRET VISUAL CRYPT...A NOVEL METHOD FOR THE CONSTRUCTION OF THRESHOLD MULTIPLE-SECRET VISUAL CRYPT...
A NOVEL METHOD FOR THE CONSTRUCTION OF THRESHOLD MULTIPLE-SECRET VISUAL CRYPT...
 
Image steganography techniques
Image steganography techniquesImage steganography techniques
Image steganography techniques
 
Image Steganography Techniques
Image Steganography TechniquesImage Steganography Techniques
Image Steganography Techniques
 

More from eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
eSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
eSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
eSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
eSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
eSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
eSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
eSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
eSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
eSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
eSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
eSAT Publishing House
 

More from eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 

Recently uploaded

AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfCOLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
Kamal Acharya
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
DuvanRamosGarzon1
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
Kamal Acharya
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
Kamal Acharya
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
Kamal Acharya
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
Kamal Acharya
 

Recently uploaded (20)

AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfCOLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
 

Secured data hiding by using extended visual

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 32 SECURED DATA HIDING BY USING EXTENDED VISUAL CRYPTOGRAPHY Megha Goel1 , M. Chaudhari2 1 PG Student, Computer Science & Engineering, PBCOE, Maharashtra, India 2 HOD & Asst. Professor, Computer Science & Engineering, PBCOE, Maharashtra, India Abstract Due to the rapid advancement of the internet large amount of data is transmitted over the internet. Some of the transmitted information is very important like password, confidential file, security codes etc. so it is very important to provide security to these data. In computer technology there are two ways to provide security to the data they are cryptography & steganography. Although, in the past, there has been various research related to cryptography & steganography but neither of them provide enough & strong security. So this paper proposes a novel approach for data hiding by combining steganography & extended visual cryptography. Visual cryptography was invented by Moni Naor & Adi Shamir in 1994. Visual cryptography hide secret image within one or more images & then generate shares. For share generation this paper uses Visual Information Pixel (VIP) & error diffusion technique. Keywords: Steganography, Visual Cryptography, Share Generation, VIP, Extended Visual cryptography, Cryptography --------------------------------------------------------------------***---------------------------------------------------------------------- 1. INTRODUCTION 1.1 Visual Cryptography Visual cryptography is a secret sharing scheme proposed by Naor & Shamir [1] in 1994. In Visual cryptography secret images are divided into n number of shares & separately shares reveal no information about the secret image. Each share looks like a collection of random pixels & appear meaningless. These shares are distributed to k participants & recovery of the secret image is done by superimposing these shares. For decryption in traditional cryptography, require a key, but in visual cryptography it is done by the human visual system. In other words, visual cryptography does not require any software or complex computation technique for decryption. The summary of Naor and Shamir’s schemes is (1) The secret data is separated into n shares. (2) Any k or more than k shares can recover the secret. (3) Any k-1 or fewer than k shares cannot recover the secret data. 1.2 Basic Model of Visual Cryptography Following is the process of share generation. Each pixel p from the secret image is encoded into m black and white subpixels in each share. If pixel p is white or black one of the six columns from the Table 1 is randomly selected. Regardless of the value of p it is replaced by a set of 4 subpixels two of them black & two white. Now the subpixel in the share gives no clue about the original pixel p of the secret image. Fig. 1 shows the basic 2-out-of-2 scheme of visual cryptography. Here the secret image is divided into two shares which look like a random collection of black & white pixels. These shares are distributed to two participants. Now separately these shares will not reveal anything about the secret image. After stacking the share 1 & share 2, secret image can be recovered. Table 1: Construction of (2, 2) Visual Cryptography Scheme (VCS)
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 33 Fig 1: Example of 2-out-of-2 scheme. (a) Binary secret image. (b) Encrypted share 1. (c) Encrypted share 2. (d) Decrypted secret message. 1.3 Basic Schemes of Visual Cryptography 1. (2,2) VCS – This is the simplest & less secured scheme of visual cryptography. In this scheme secret image is encoded into 2 shares & also distrubuted to only two participants. For decryption two shares are overlaid. This scheme can be implemented by encoding each pixel of the secret image into either 2 subpixels or 4 subpixels as shown in the figure 2. 2. (n,n) VCS – This scheme encode the secret image into n number of shares. For decryption it also require all of the n shares. If we stack less than n shares than it will not reveal anything about the secret image. 3. (k,n) VCS – This scheme encrypt the secret image into n number of shares & distribute theses shares to n participants. For decryption it require k number of shares i.e. k<n & k-1 shares will not provide any information. 1.4 Extended Visual Cryptography Ateniese, Blundo & Stinson [2] proposed Extended Visual Cryptography. In EVC, shares contain secret information but these shares are meaningful share. In EVC, each share is some meaningful image rather than random collection of black & white pixels. Fig 2 (a) Secret Image (b) First Cover Image (c) Second Cover Image (d) Share1 (e) Share 2 (f) Recovered Secret Image Fig 3: Example of (2, 2) EVC Scheme 1.5 Steganography Steganography is the art & science of passing information or hiding information in such a manner that the existence of information is known to the intended recipient only. The word steganography derived from Greek means “Covered Writing”.
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 34 Steganography uses various methods for hiding data. Previously our ancestors also used this method for secret communication. The media they were using are invisible inks, microdots, etc. today steganography uses test, images & soud media for hiding data. There are number of ways to hide information in images. The most popular one are Least Significant Bit(LSB) Substitution, Masking & Filtering Technique. 2. RELATED WORK Visual Cryptography is proposed by Naor & Shamir [1] in 1994. In Visual Cryptography, secret image is encoded into two or more images called as shares. These shares are similar to random noise like images. (2,2) is the masic model of visual cryptography. Ateniese, Blundo & Stinson[2] in 1996 proposed Extended Visual cryptography which contain meaningful share images. Upto 1997, Visual Cryptography schemes developed for black & white images only. Verheul & Tilborg[3] developed the first colored Visual Cryptography Scheme. But in this scheme share generated is meaningless. Chang & Tsai [5] develop a color visual cryptography scheme & also generate meaningful share. In this scheme, secret color image is encoded in two color image called as cover images. This scheme uses predefined color Index Table. The disadvantage of this scheme is that it requires more storage space to store color index table. This disadvantage is overcome by Chin-Chen Chang et al. [6]. Nakajima & Yamaguchi [7] proposed Extended Visual Cryptography for natural images. This scheme produces meaningful binary shares. Hou[8] proposed the visual cryptography scheme for gray level images. This scheme is based on the halftone technique & color decomposition method. 3. PROPOSED WORK Fig 4: Framework of the proposed system 3.1 Data Hiding This is the first module & it based on the steganography. In this secret data is hided in one color image using text embedding algorithm. Following is the working of the algorithm.  First retrive the pixel info i.e the R,G,B values of the pixel.  Then convert the secret data into their ASCII equivalents, this forms a byte stream.  Apply Hash function on that byte stream which will produce a pseudo byte stream  This pseudo byte stream is hided in the LSB’s of the image. 3.2 Generation of Shares This paper uses VIP synchronization & error diffusion technique for share generation. VIP synchronization, this method, keep possession of pixels having visual information of original images & error diffusion technique is used to produce share of good quality. 3.3 Data Extraction In data Extraction module, apply the text extracting algorithm on the recovered secret image. Following is the working of the algorithm. 1) First retrive the pixel info i.e the R,G,B values of the pixel, this is the pseudo byte stream. 2) Then perform XOR operation between pseudo byte stream & Hash function to generate ASCII characters. 3) Then convert the ASCII byte stream to text string. 4. SIMULATED RESULTS Fig.5 Data Hiding Screen
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 35 Fig.6 Secret File Fig 7 Selection of cover images Fig 8 Generation of Shares Fig: 9 Error diffused for share 1 Fig: 10 Error diffused for share 2 Fig: 11 Recovered Secret File
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org 36 5. ANALYSIS OF THE RESULT Following table shows the MSE & PSNR for the share1 & share 2. Table 2 Result analysis of meaningful shares & their PSNR Sr. No. Color shares image PSNR MSE 1 Lena 30.6898 dB 55.4758 2 Baboon 31.1892 dB 49.4488 3 Pepper 30.6303 dB 56.242 6. CONCLUSION This paper presents a novel approach for hiding data in color images by integrating steganography & extended visual cryptography. In Visual cryptography secret images are divided into n number of shares For hiding data in color images, this paper uses text embedding algorithm & then for share generation which is a visual cryptography part, uses VIP synchronization & error diffusion technique. VIP synchronization, this method, keep possession of place of pixels having visual information of original images & error diffusion technique is used to produce share of good quality. REFERENCES [1]. M. Naor & A. Shamir, Visual Cryptography, advances in cryptology Eurocrypt’94. Lecture notes in computer science, 1-12, 1994. [2]. G. Ateniese, C. Blundo, A. Santis & D. R. Stinson, Extended capabilities for visual cryptography, ACM Theor. Comput. Sci., Vol.250,pp. 143-161,2001. [3]. E. R. Verheul & H.C.A. van Tilborg, Construction & properties of k out of n visual secret sharing schemes, Designs, codes & cryptography, vol.11, no. 2, pp.179-196, 1997. [4]. C. Yang and C. Laih, “New Colored Visual Secret Sharing Schemes”. Designs, Codes and cryptography, 20, pp. 325–335, 2000. [5]. C. Chang, C. Tsai, and T. Chen. “A New Scheme For Sharing Secret Color Images In Computer Network”, Proceedings of International Conference on Parallel and Distributed Systems, pp. 21–27, July 2000. [6]. Chin-Chen Chang , Tai-Xing Yu , “Sharing A Secret Gray Image In Multiple Images”, Proceedings of the First International Symposium on Cyber Worlds (CW.02), 2002. [7]. M. Nakajima, Y. Yamaguchi, Extended visual cryptography for natural images, in Proc. WSCG Conf. 2002, pp303-412. [8]. Y. C. Hou, Visual cryptography for color images, Pattern Recognition, vol. 17773, pp.1-11, 2003. [9]. R.Youmaran, A. Adler, A. Miri , “An Improved Visual Cryptography Scheme For Secret Hiding”, 23rd Biennial Symposium on Communications, pp. 340-343, 2006. [10]. Z. Zhou, Gonzalo R. Arce & Giovanni Di Crescenzo, Halftone Visual Cryptography, IEEE Transactions on image processing, vol. 18, no. 8, Aug. 2006 [11]. Hsien-chu Wu, Hao-Cheng Wang & Rui-Wen Yu, Color visual cryptography scheme using meaningful shares, 8th International conference on intelligent systems design & applications, IEEE computer society, 2008. [12]. Z. M. Wang, Gonzalo R. Arce & Giovanni Di Crescenzo, Halftone Visual Cryptography via error diffusion, IEEE Transactions Inf. Forensics Security, vol.4, no. 3, pp. 383-396, Sep.2009. [13]. Q. Chen, X. Lv, M. Zhang, Y. Chu, An extended color visual cryptography scheme with multiple secrets hidden, 2010 International conference on computational & information sciences, IEEE computer society, 2010. [14]. John Blesswin, Rema, Jenifer Joselin, “Recovering secret image in visual cryptography” IEEE, 2011. [15]. M. Kamath, A. Parab, A. Salyankar & S. Dholay, Extended visual cryptography for color images using coding tables, International conference on communication, Information & computing technology(ICCICT), Oct. 19-20, 2012, Mumbai, India. [16]. P.S. Revenkar, A. Anjum, W. Z. Gandhare, Survey of visual cryptography schemes, International Journal of security & its applications, vol.4, No. 2, April-2010. [17]. Soumik Das, Pradosh Bandyopadhyay, Proj Alai Chaudhuri, Dr. Monalisa Banerjee, A Secured Key-based Digital Text Passing System through Color Image Pixels, IEEE-International Conference On Advances In Engineering, Science And Management (ICAESM -2012) March 30, 31, 2012 [18]. Chi-Kwong Chan, L.M. Cheng, Hiding data in images by simple LSB substitution, Pattern Recognition 37 (2004) 469 – 474. [19]. Arvind Kumar, Km. Pooja, Steganography- A Data Hiding Technique‖, International Journal of Computer Applications (0975 – 8887) Volume 9– No.7, November 2010. [20]. Nagham Hamid, Abid Yahya, R. Badlishah Ahmad & Osamah M. Al-Qershi, Image Steganography Techniques: An Overview, International Journal of Computer Science and Security (IJCSS), Volume (6) : Issue (3) : 2012. [21]. Babloo Saha and Shuchi Sharma, Steganographic Techniques of Data Hiding using Digital Images, Defence Science Journal, Vol. 62, No. 1, January 2012, pp. 11-18. [22]. N. Askari, N.H. Heys & C. R. Moloney, “An extended visual cryptography schemes without pixel expansion for halftone images”, 2013, 26th IEEE Canadian conference of electrical & computer engineering. [23]. Jin, D., Yan and Kankanhalli, M.S., Progressive color visual cryptography. J. Electron. Imaging. v14.