Faculty In-charge:
Prof. S.A.Dongre.
Guided by:
Prof. Ravikumar Sir.
Index.
 Introduction.
 Existing System.
 Proposed System.
- Algorithm.
- Block Diagram.
- Hardware.
 Conclusion.
Introduction.
 Cryptography is an art of converting data into
unreadable format.
Fig. Cryptography
Visual Cryptography is a special encryption technique
to hide information in images in such a way that it can
be decrypted by the human vision if the correct key
image is used.
Introduction(cont..)
Steganography means hiding one piece of data
within another.
Fig. Steganography Model
Existing System.
 Existing reversible data hiding schemes the design of
an encryption algorithm must provide security against
unauthorized attacks.
 Key oriented algorithms are very efficient but they
were very bulky to manage as key handling must be
done.
 It provides one levels of security to the information
being transmitted .
Proposed System.
This system overcomes the demerits of using single level
of hiding. That is either using cryptography or
Steganography.
 And one more thing to add is it requires only the
computation time of single level hiding, because visual
cryptography requires no computation to decrypt the
information.
To improved quality of existing system, keyless random
hiding techniques can be used.
Framework for proposed system.
VCSDH Algorithm algorithm
1. considered a secrete data and Encipher the data
using receiver public key as per RSA algorithm.
2 . Select an image as cover image to embed the
encipher data into the image.
3. Transmit this Data hidden image that is
stenography image along with video file.
4. Recover the steno image from the video file and
recover cipher from the steno image.
5. Decipher the text using its (receiver) own
private key and recovered cover image and secret
data.
Visual Cryptography.
Overlay
System Implementation.
System Methodology.
1.Continuous Tone 2. Halftone
Fig. Share 1 Fig. Share 2
Decrypted Image
References.
 Visual Cryptography for General Access Structures,
Carlo Blonde and Alfredo De Santis, Douglas R. Stinson.
 Survey of Visual Cryptography Schemes,P.S.Revenkar,
Anisa Anjum, W .Z.Gandhare.
 Hiding data in images by simple LSB substitution,Chi-
Kwong Chan∗, L.M. Cheng.
 SECURED DATA HIDING BY USING EXTENDED VISUAL
CRYPTOGRAPHY ,Megha Goel1, M. Chaudhari
novel Approach For Data Hiding by integrating Steganography and Extended Visual Cryptography.

novel Approach For Data Hiding by integrating Steganography and Extended Visual Cryptography.

  • 1.
  • 2.
    Index.  Introduction.  ExistingSystem.  Proposed System. - Algorithm. - Block Diagram. - Hardware.  Conclusion.
  • 3.
    Introduction.  Cryptography isan art of converting data into unreadable format. Fig. Cryptography Visual Cryptography is a special encryption technique to hide information in images in such a way that it can be decrypted by the human vision if the correct key image is used.
  • 4.
    Introduction(cont..) Steganography means hidingone piece of data within another. Fig. Steganography Model
  • 5.
    Existing System.  Existingreversible data hiding schemes the design of an encryption algorithm must provide security against unauthorized attacks.  Key oriented algorithms are very efficient but they were very bulky to manage as key handling must be done.  It provides one levels of security to the information being transmitted .
  • 6.
    Proposed System. This systemovercomes the demerits of using single level of hiding. That is either using cryptography or Steganography.  And one more thing to add is it requires only the computation time of single level hiding, because visual cryptography requires no computation to decrypt the information. To improved quality of existing system, keyless random hiding techniques can be used.
  • 7.
  • 8.
    VCSDH Algorithm algorithm 1.considered a secrete data and Encipher the data using receiver public key as per RSA algorithm. 2 . Select an image as cover image to embed the encipher data into the image. 3. Transmit this Data hidden image that is stenography image along with video file. 4. Recover the steno image from the video file and recover cipher from the steno image. 5. Decipher the text using its (receiver) own private key and recovered cover image and secret data.
  • 9.
  • 10.
  • 11.
    System Methodology. 1.Continuous Tone2. Halftone Fig. Share 1 Fig. Share 2 Decrypted Image
  • 12.
    References.  Visual Cryptographyfor General Access Structures, Carlo Blonde and Alfredo De Santis, Douglas R. Stinson.  Survey of Visual Cryptography Schemes,P.S.Revenkar, Anisa Anjum, W .Z.Gandhare.  Hiding data in images by simple LSB substitution,Chi- Kwong Chan∗, L.M. Cheng.  SECURED DATA HIDING BY USING EXTENDED VISUAL CRYPTOGRAPHY ,Megha Goel1, M. Chaudhari