Triple Layered Security for Data Hiding Using Steganography and Visual Cryptography

Main Article Content

Bhawna
Sanjay Kumar Malik

Abstract

The proposed system makes use of steganographic method along with visual cryptography for hiding data in images and to provide better security.  Even though extensive research work has been done previously, but most of the research work gives no robust security for the image that has been encrypted. The method proposed in this paper is capable of hiding some secret message in least significant bits of the original image, thereby hiding the secret message in way to make its detection difficult. The secret image is then under went to visual cryptography algorithm. Thereby, creating shares of the secret image, which are noise like structures. Further, the method proposes to hide these shares in least significant bits of different images so as to create three levels of security for the message. The main objective of the proposed method is to combine the use of data hiding techniques, steganography and visual cryptography algorithms for designing a secure algorithm so that security, reliability and efficiency of secret message can be improved. The framework is implemented in matlab.

Article Details

How to Cite
Bhawna, B., & Malik, S. K. . (2023). Triple Layered Security for Data Hiding Using Steganography and Visual Cryptography. International Journal on Recent and Innovation Trends in Computing and Communication, 11(10s), 335–345. https://doi.org/10.17762/ijritcc.v11i10s.7634
Section
Articles

References

Shreyank N Gowda. Dual Layered Secure Algorithm for Image Steganography. 2nd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT). IEEE 2016.

Aishwarya Nandakumar, P. Harmya, Noopa Jagadeesh, and S.S. Anju. A Secure Data Hiding Scheme Based on Combined Steganography and Visual Cryptography Methods. ACC 2011, Part II, CCIS 191, pp. 498–505, Springer. 2011.

Pallavi B, Vishala I. L. Double Layer Security Using Visual Cryptography and Transform Based Steganography. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163. pISSN: 2321-7308. Volume: 03 Special Issue: 03.2014.

Yogesh K. Meghrajani, Himanshu S. Mazumdar. Hiding Secret Message Using Visual Cryptography in Steganography. IEEE INDICON 2015.

Souvik Roy and P. Venkateswaran. Online Payment System using Steganography and Visual Cryptography. IEEE. 2014.

M. Wherate, Dr. S. Sherekar, Dr. V. M. Thakre. Two Layer Security Using Visual Cryptography and Steganography. IJARCSSE International Journal of Advance Research in Computer Science and Software Engineering, Vol 5, Issue 4, 2015.

S.M.Poonkuzhali, M.Therasa. Data Hiding Using Visual Cryptography for Secure Transmission. International Journal of Advanced Research in Computer and Communication Engineering. Vol. 4, Issue 4, 2015.

Apurva. S. Mahajan , Prof. Sheetal. G. Khadke. Review on LSB Steganography. International Journal of Computer Science Trends and Technology (IJCST). Vol 3, Issue 2, 2015.

Sumeet Kaur, Savina Bansal, R. K. Bansal. Steganography and Classification of Image Steganography Techniques. IEEE, 2014.

Archana O. Vyas Dr. Sanjay V. Dudul. Study of Image Steganalysis Techniques. International Journal of Advanced Research in Computer Science. ISSN No. 0976-5697, Volume 6, No. 8, 2015.

D. Taghaddos, A. Latif. Visual Cryptography for Gray-scale Images Using Bit-Level. Journal of Information Hiding and Multimedia Signal Processing. SN 2073-4212. Volume 5, Number 1, 2014.

Mr. K. Das, Prof. S. K. Bandyopadhyay. A REVIEW PAPER ON VARIOUS VISUAL CRYPTOGRAPHY SCHEMES. International Journal of Current Research. ISSN: 0975-833X. Vol. 8, Issue, 06, pp.32445-32449, 2016.

T. Ambritha, J. Poorani Sri, J. Jessintha Jebarani, M. Pradhiba Selvarani. Comparative Study of Various Visual Cryptography Techniques to Analyze the Quality of Reconstruction. International Journal for Research in Applied Science & Engineering Technology (IJRASET). ISSN: 2321-9653. Vol 4 Issue 4, 2016.

Aejaz Farooq Ganai, Farida Khursheed. (2023). Computationally Efficient Holistic Approach for Handwritten Urdu Recognition using LRCN Model. International Journal of Intelligent Systems and Applications in Engineering, 11(4s), 536 –. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/2724

Rosziati Ibrahim and Teoh Suk Kuan. Steganography Algorithm to Hide Secret Message inside an Image. Computer Technology and Application 2. pp 102-108, 2011.

Ravikumar M.Raypure, Prof. Vinay Keswani. Implementation For Data Hiding Using Visual Cryptography. International Research Journal of Engineering and Technology (IRJET). Vol: 04 Issue: 07. 2017.

Halim Maulana, Edy Rahman Syahputra. International Conference on Information and Communication Technology. Journal of Physics. 2017

M. Naor, and A. Shamir, Visual cryptography, Proc. of Advances in Cryptology - EUROCRYPT, LNCS 950, Springer, pp. 1-12, 1995.

R. Lukac, and K. N. Plataniotis, Bit-level based secret sharing for image encryption, Journal of Pattern Recognitions, vol. 38, no. 5, pp. 767-772, 2005.

B. Li, J. H. He, J. W. Huang, and Y. Q. Shi, A survey on image steganography and steganalysis, Journal of Information Hiding and Multimedia Signal Processing, vol. 2, no. 2, pp. 142-172, 2006.

Z. H. Wang, C. C. Chang, H. N. Tu, and M. C. Li, Sharing a secret image in binary images with veri_cation, Journal of Information Hiding and Multimedia Signal Processing, vol. 2, no. 1, pp. 78-90, 2008.

A. Latif, and A. R. Naghsh-Nilchi, Digital image watermarking based on parameters amelioration of parametric slant-hadamart transform using genetic algorithm, International Journal of Innovative Computing, Information and Control, vol. 8, no. 2, pp. 1205-1220, 2012.

K. Gurunathan and S. P. Rajagopalan, A stegano - visual cryptography technique for multimedia security, Springer, 2019.

L. Rudraksha and G. Prasad M.N., Advanced Robust Data Hiding Using Visual Cryptography, IEEE, 2019.