CFP last date
20 May 2024
Reseach Article

Hybrid Steganography using Visual Cryptography and LSB Encryption Method

by Gokul M, Umeshbabu R, Shriram K Vasudevan, Deepak Karthik
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 59 - Number 14
Year of Publication: 2012
Authors: Gokul M, Umeshbabu R, Shriram K Vasudevan, Deepak Karthik
10.5120/9614-4247

Gokul M, Umeshbabu R, Shriram K Vasudevan, Deepak Karthik . Hybrid Steganography using Visual Cryptography and LSB Encryption Method. International Journal of Computer Applications. 59, 14 ( December 2012), 5-8. DOI=10.5120/9614-4247

@article{ 10.5120/9614-4247,
author = { Gokul M, Umeshbabu R, Shriram K Vasudevan, Deepak Karthik },
title = { Hybrid Steganography using Visual Cryptography and LSB Encryption Method },
journal = { International Journal of Computer Applications },
issue_date = { December 2012 },
volume = { 59 },
number = { 14 },
month = { December },
year = { 2012 },
issn = { 0975-8887 },
pages = { 5-8 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume59/number14/9614-4247/ },
doi = { 10.5120/9614-4247 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:04:43.812787+05:30
%A Gokul M
%A Umeshbabu R
%A Shriram K Vasudevan
%A Deepak Karthik
%T Hybrid Steganography using Visual Cryptography and LSB Encryption Method
%J International Journal of Computer Applications
%@ 0975-8887
%V 59
%N 14
%P 5-8
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The biggest threat in the data transfer is through any medium is, the chance for it being hacked. Any information, these days are hackable. So utmost care has to be taken for any communication to be done, in particular, if confidential. The so claimed most sheltered data have also been hacked nowadays. The digital watermarking is a widely used method for information hiding to authenticate as well as secure the content in an image. This paper describes a hybrid watermarking technique to embed a secret message into an image using visual cryptography and SLSB(Selected Least Significant Bit) encryption techniques. This paper becomes very special in few aspects, all of them are explained in a detailed way in the chapters.

References
  1. Naor, M. and Shamir, A. "Visual cryptography, Advances in Cryptology - EUROCRYPT '94", 1995.
  2. Hartung, F. and Kutter, M ,"Multimedia Watermarking Techniques, Proc. of IEEE, Tutorial, Survey , and Special Issue on Data Hiding & Security", pp. 1079-1107,1999
  3. Roque, J. J. and Minguet, J. M. , "SLSB: Improving the Steganographic Algorithm LSB", The 7th International Workshop on Security in Information Systems (WOSIS2009), Milan, Italy, Pp. 1-11, 2009.
  4. D. Mathivadhani, C. Meena" Digital Watermarking and Information Hiding Using Wavelets, SLSB and Visual Cryptography Method" 2010 IEEE
  5. Sharp, T. "An implementation of key-based digital signal steganography. " Proc. 4th International Workshop on Information Hiding. Springer LNCS, Vol. 2137, Pp. 13-26, 2001.
  6. Yuan Tai Hsu ,Long Wen Chang ,"A new Construction algorithm of Visual cryptography for gray level images" , 2006,IEEE
  7. G. Karthigai Selvi ,Leon Mariadhasan and K. LShunmuganthan "Steganography Using Edge Adaptive Image" International Conference on Computing,Electronics and Electrical Technologies 2012,IEEE
  8. Weiqi Luo ,member ,IEEE Fangjun Huang member, IEEE, and Jiwu Huang ,senior member ,IEEE, "Edge Adaptive Image Steganography based on LSB matching Revisited" ,IEEE transations on information forensics and security ,vol. 5, no. 2 , June 2010.
  9. Piyush Marwaha, Paresh Marwaha , "Visual cryptographic Steganography in images",2nd International conference on Computing ,Communication and Networking Technologies ,2010.
  10. Ujwala B. S,Chetan K. R ,"An efficient DCT based pringerprinting scheme for thwarting collusion attacks",IEEE 2010
  11. Bhandare Shital, Jhade Manoj, Jadhav Angarika,"An improved approach for extended visual cryptography scheme for color images",2011,International journal of computer applications.
  12. Vaibhav Choudhary,Pravin kumar,Kishore Kumar,D. S. Singh, "An improved pixel sieve method for visual cryptography",2011,vol. 12,no. 9, International journal of computer applications.
  13. Jaishri Chourasia, M. B. Potdar,Abdul Jhummarwala,Keyur Parmar, "Halftone image watermarking based on visual cryptography",2012,vol. 41,no. 20, International journal of computer applications.
  14. Chunlin Song, Sud Sudirman and Madjid Merabti, "Robust Digital image watermarking using Region Adaptive embedding technique",IEEE, pp. 378-382, 2010.
  15. Y-C Hou, P-M Chen, "An asymmetric Watermarking scheme based on Visual cryptography",In Proceedings of ICSP, vol. 2,pp. 992-995, (2000).
Index Terms

Computer Science
Information Sciences

Keywords

Information Hiding SLSB (Selected Least Significant Bit) Visual Cryptography