Advanced Steganographic Technique Based on Extended Visual Cryptography Scheme

International Journal of Computer Science and Engineering
© 2015 by SSRG - IJCSE Journal
Volume 2 Issue 5
Year of Publication : 2015
Authors : Harshal S. Tekade, Prof. Baisa L. Gunjal

pdf
How to Cite?

Harshal S. Tekade, Prof. Baisa L. Gunjal, "Advanced Steganographic Technique Based on Extended Visual Cryptography Scheme," SSRG International Journal of Computer Science and Engineering , vol. 2,  no. 5, pp. 1-5, 2015. Crossref, https://doi.org/10.14445/23488387/IJCSE-V2I5P101

Abstract:

In steganography, a message is hidden in such a way that no one apart from the intended recipient knows of the existence of the message. It is an art of concealing using which we are sending secret message by hiding its content. Steganography is comprised of two algorithms: one for embedding data and one for extraction. Visual cryptography is a technique of secret sharing in which images are distributed as shares in such a faction that, when these share images are superimposed, a message hidden secretly in the image is revealed. In extended visual cryptography (EVC), the share images are constructed to contain meaningful cover images. Unique size of secret images, share images and recovered images is key requirement to improve quality in visual. That way we can maintain the perfect security of the original extended visual cryptography approach.As a part of project, secret text message is encrypted and hide behind the 2 cover images while sharing. At the receiver end message is re-constructed in image form and can be viewed by superimposing the two share images. The reconstructed image is in CAPTCHA form to provide enhanced security. Project is in JAVA Platform. The objectives of the project will be to improve certain image parameters such as Robustness, in order to block unauthorized use, Security of the hidden message and to maintain the Perceptual Quality of the image.

Keywords:

Steganography, Cryptography, Visual Cryptography, hidden information, image processing, random grid.

References:

[1] Young-Chang Hou, Shih-Chieh Wei, and Chia-Yin Lin, Visual cryptography Random-grid-based Visual Cryptography Schemes, in IEEE Transactions on Circuits and Systems for Video Technology, vol. 24, no. 1 part 2, 2014, pp. 733-744. 
[2] Monika Agrawal and Pradeep Mishra, A Modified approach for Symmetric Key Cryptography Based on Blowfish Algorithm, in International Journal of Engineering and advanced Technology (IJEAT), vol. 1, no. 6, 2012. 
[3] MD Asif Mushtaque, Shahnawaz Hussai, Harsh Dhiman, Shivangi , Evaluation of DES, TDES, AES, Blowfish and Two fish Encryption Algorithm: Based on Space Complexity, in International Journal of Engineering Research and Technology (IJERT) vol. 3, no. 4 part 2, 2014. 
[4] Suchitra. B and Priya. M, Raju.J , Image Steganography Based On DCT Algorithm for Data Hiding, in International Journal of Advanced Research in Computer Engineering and Technology (IJARCET) , vol. 2, no. 11 ,2013. 
[5] Moni Naor and Adi Shamir Visual Cryptography, Lecture Notes in Computer Science Volume 950, pp 1-12, 1995. 
[6] Luis von Ahn, Manuel Blum, Nicholas J. Hopper and John Langford, CAPTCHA: Using Hard AI Problems for Security, Watson Research Center, Yorktown Heights NY 10598, USA. 
[7] R. Ito, H. Kuwakado, and H. Tanaka, Image size invariant visual cryptography, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol. E82-A, no. 10, 1999, pp. 2172- 2177. 
[8] C. N. Yang, New visual secret sharing schemes using probabilistic Pattern Recognition, Letters, vol. 25, no. 4, 2004, pp. 481-494. 
[9] S. F. Tu and Y. C. Hou, Design of visual cryptographic methods with smooth-looking decoded images of invariant size for gray level images, Imaging Science Journal, vol. 55, no. 2, 2007, pp. 90-101,. 
[10] O. Kafri and E. Keren, Encryption of pictures and shapes by random grids, Optics Letters, vol. 12, no. 6, June 1987, pp. 377-379. 
[11] G. Ateniese, C. Blundo, A. De Santis, and D. R. Stinson, Extended schemes for visual cryptography, Theoretical Computer Science, vol. 250, 2001, pp. 143-161. 
[12] Z. Wang, G. R. Arce, and G. D. Crescenzo, Halftone visual cryptography via error diffusion, IEEE Transactions on Information Forensics and Security, vol. 4, no. 3, 2009, pp. 383-396.