CFP last date
20 May 2024
Reseach Article

New Image Broadcasting based on Visual Cryptography and Steganography

by Dhiaa Alzubaydi, Dina R. Alshibani
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 108 - Number 9
Year of Publication: 2014
Authors: Dhiaa Alzubaydi, Dina R. Alshibani
10.5120/18938-9011

Dhiaa Alzubaydi, Dina R. Alshibani . New Image Broadcasting based on Visual Cryptography and Steganography. International Journal of Computer Applications. 108, 9 ( December 2014), 11-15. DOI=10.5120/18938-9011

@article{ 10.5120/18938-9011,
author = { Dhiaa Alzubaydi, Dina R. Alshibani },
title = { New Image Broadcasting based on Visual Cryptography and Steganography },
journal = { International Journal of Computer Applications },
issue_date = { December 2014 },
volume = { 108 },
number = { 9 },
month = { December },
year = { 2014 },
issn = { 0975-8887 },
pages = { 11-15 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume108/number9/18938-9011/ },
doi = { 10.5120/18938-9011 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:42:32.178637+05:30
%A Dhiaa Alzubaydi
%A Dina R. Alshibani
%T New Image Broadcasting based on Visual Cryptography and Steganography
%J International Journal of Computer Applications
%@ 0975-8887
%V 108
%N 9
%P 11-15
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper presents a new security system by combining cryptographic and steganographic Technique. The main idea behind the present work is to divide the participants into different security levels, determining which participant will be able to decrypt the secret image, and which participant will not be able to decrypt the secret image. A modified idea of traditional visual cryptography with pixel expansion will be introduced to encrypt the data. The hiding method is based on hiding the pixel of the encrypted secret image in a colored cover by altering the DCT coefficients of the cover image. Before the hiding process Arnold transformation is performed on the cover image. The results show that the stego-image is closed related to the original cover image, with good impressibility.

References
  1. N. Chekuri, J. Bellampalli , " Region Incrementing Visual Cryptography" ,Bookman International Journal of Electrical & Electronics Engineering, Vol. 1 No. 1 Sep. 2012 . ISSN No. 2319-4294 © Bookman International Journals.
  2. O. Deshmukh, S. Sonavane," Multi-Share Crypt-Stego Authentication System ", IJCSMC, Vol. 2, Issue. 2, February 2013, pg. 80 – 90.
  3. JITHESH K, Dr. A. V. S. KUMAR. "Multi- Layer Information Hiding-A Blend Of Steganography And Visual Cryptography". Journal of Theoretical and Applied Information Technology, © 2005 - 2010 JATIT & LLS. All rights reserved.
  4. A. M. Al-Anani, M. H. Abdallah, R. A. Al-Dallah, R. I. Al-Khalid, " Multimedia Multilevel Hiding Technique" , European Journal of Scientific Research , ISSN 1450-216X Vol. 24 No. 1 (2008), pp. 42-54© EuroJournals Publishing, Inc. 2008.
  5. B. Surekha and Dr. G. N. Swamy," Visual Secret Sharing Based Digital Image Watermarking ", IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 3, No 2, May 2012.
  6. M. Prasath, D. Sharmiladevi, " DIGITAL IMAGE HIDING USING TRANSFORMATION TECHNIQUES", nternational Journal of Communications and Engineering ,Volume 05– No. 5, Issue: 03 March 2012.
  7. V. Naidu," Discrete Cosine Transform based Image Fusion Techniques", Journal of Communication, Navigation and Signal Processing (January 2012) ,Vol. 1, No. 1, pp. 35-45.
  8. S. Bhattacharyya, G. Sanyal " A Robust Image Steganography using DWT Difference Modulation (DWTDM )", I. J. Computer Network and Information Security, 2012, 7, 27-40 Published Online July 2012 in MECS (http://www. mecs-press. org/) DOI: 10. 5815/ijcnis. 2012. 07. 04.
  9. P. Ganesan and R. Bhavani, " A High Secure and Robust Image Steganography Using Dual Wavelete and Blending Model", Journal of Computer Science, 9 (3): 277-284, 2013, ISSN 1549-3636 © 2013 Science Publications.
Index Terms

Computer Science
Information Sciences

Keywords

Visual Cryptography steganography DCT Arnold Transform bit plane.