Advertisement

Multilevel Data Concealing Technique Using Steganography and Visual Cryptography

  • Chaitra Rangaswamaiah
  • Yu Bai
  • Yoonsuk ChoiEmail author
Conference paper
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 70)

Abstract

Steganography is a data hiding technique which uses images, audio or video as a cover medium. Cryptography has become an essential part of security. Image Steganography is one such way to hide secret messages in an image to reduce vulnerability to cryptanalysis. We overcome the drawbacks of using only textual steganography as it is easier to intercept and decipher. We encrypt the plaintext with a randomly generated key using XOR and One Time Pad (OTP) Algorithm and in turn embedding it into the Least Significant Bit (LSB) of the cover image. We embed the cipher text in LSB of the pixels of the cover image to form Stego image. To enhance and ensure security, we use visual cryptography along with image scrambling. Image scrambling is a technique in which the location of pixels is scrambled to provide extra protection to the Stego image. Visual cryptography is a method used to encrypt the visual information by breaking it into shares. Using both image scrambling and visual cryptography makes the system not only more secure but also difficult to decrypt. A decryption algorithm for the same is also constructed in this paper.

Keywords

Image scrambling Mean square error (MSE) One time pad (OTP) algorithm Peak signal to noise ratio (PSNR) Stego image and data security 

References

  1. 1.
    Natarajan, S., Prema, G.: Steganography using genetic algorithm along with visual cryptography for wireless network application. In: International Conference on Information Communication and Embedded Systems (ICICES) (2013)Google Scholar
  2. 2.
    Shao, L., Qin, Z., Liu, B., Qin, J., Li, H.: Image scrambling algorithm based on random shuffling strategy. In: 3rd IEEE International Conference on Industrial Electronics and Applications (ICIEA), Singapore (2008)Google Scholar
  3. 3.
    Tseng, L.-Y., Chan, Y.-K., Ho, Y.-A., Chu, Y.-P.: Image hiding with an improved genetic algorithm and an optimal pixel adjustment process. In: Eighth International Conference, vol. 3, on Intelligent Systems Design and Applications (ISDA), Kaohsiung (2008)Google Scholar
  4. 4.
    Li, H., Du, W., Yao, X., Wu, H.: A steganographic scheme based on image scrambling and coding techniques. In: International Conference on Communications, Circuits and Systems (ICCCAS) vol. 1, Chengdu, China (2013)Google Scholar
  5. 5.
    Blesswin, J., Rema, Joselin, J.: Recovering secret image in visual cryptography. In: International Conference on Communications and Signal Processing (ICCSP), Calicut (2011)Google Scholar
  6. 6.
    Jena, D., Jena, S.K.: A novel visual cryptography scheme. In: International Conference on Advance Computer Control (2009)Google Scholar
  7. 7.
    Che, S., Che, Z., Ma, B.: An improved image scrambling algorithm. In: Second International Conference on Genetic and Evolutionary Computing (WGEC), Hubei (2008)Google Scholar
  8. 8.
    Ghasemi, E., Shanbehzadeh, J., Fassihi, N.: High capacity image steganography using wavelet transform and genetic algorithm. Manuscript received November, 2010; revised (2011)Google Scholar
  9. 9.
    Al-Bahadili, H.: A secure block permutation image steganography algorithm. Int. J. Crypt. Inf. Secur. (IJCIS) 3(3) (2013)CrossRefGoogle Scholar
  10. 10.
    Usha, B.A., Srinath, N.K., Narayan, K., Sangeetha, K.N.: A secure data embedding technique in image steganography for medical images. Int. J. Adv. Res. Comput. Commun. Eng. 3(8) (2014)Google Scholar
  11. 11.
    Luo, H., Yu, F., (Correspondence author), Pan, J.-S.: Data hiding in non-expansion visual cryptography based on edge enhancement multitoning. In: The Fourth International Conference on Information Assurance and Security (2008)Google Scholar
  12. 12.
    Shang, Z., Ren, H., Zhang, J.: A block location scrambling algorithm of digital image based on arnold transformation. In: The 9th International Conference for Young Computer Scientists (2008)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.California State University FullertonFullertonUSA

Personalised recommendations