3. Introduction.
Cryptography is an art of converting data into
unreadable format.
Fig. Cryptography
Visual Cryptography is a special encryption technique
to hide information in images in such a way that it can
be decrypted by the human vision if the correct key
image is used.
5. Existing System.
Existing reversible data hiding schemes the design of
an encryption algorithm must provide security against
unauthorized attacks.
Key oriented algorithms are very efficient but they
were very bulky to manage as key handling must be
done.
It provides one levels of security to the information
being transmitted .
6. Proposed System.
This system overcomes the demerits of using single level
of hiding. That is either using cryptography or
Steganography.
And one more thing to add is it requires only the
computation time of single level hiding, because visual
cryptography requires no computation to decrypt the
information.
To improved quality of existing system, keyless random
hiding techniques can be used.
8. VCSDH Algorithm algorithm
1. considered a secrete data and Encipher the data
using receiver public key as per RSA algorithm.
2 . Select an image as cover image to embed the
encipher data into the image.
3. Transmit this Data hidden image that is
stenography image along with video file.
4. Recover the steno image from the video file and
recover cipher from the steno image.
5. Decipher the text using its (receiver) own
private key and recovered cover image and secret
data.
12. References.
Visual Cryptography for General Access Structures,
Carlo Blonde and Alfredo De Santis, Douglas R. Stinson.
Survey of Visual Cryptography Schemes,P.S.Revenkar,
Anisa Anjum, W .Z.Gandhare.
Hiding data in images by simple LSB substitution,Chi-
Kwong Chan∗, L.M. Cheng.
SECURED DATA HIDING BY USING EXTENDED VISUAL
CRYPTOGRAPHY ,Megha Goel1, M. Chaudhari