Abstract
Steganography is a data hiding technique which uses images, audio or video as a cover medium. Cryptography has become an essential part of security. Image Steganography is one such way to hide secret messages in an image to reduce vulnerability to cryptanalysis. We overcome the drawbacks of using only textual steganography as it is easier to intercept and decipher. We encrypt the plaintext with a randomly generated key using XOR and One Time Pad (OTP) Algorithm and in turn embedding it into the Least Significant Bit (LSB) of the cover image. We embed the cipher text in LSB of the pixels of the cover image to form Stego image. To enhance and ensure security, we use visual cryptography along with image scrambling. Image scrambling is a technique in which the location of pixels is scrambled to provide extra protection to the Stego image. Visual cryptography is a method used to encrypt the visual information by breaking it into shares. Using both image scrambling and visual cryptography makes the system not only more secure but also difficult to decrypt. A decryption algorithm for the same is also constructed in this paper.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Natarajan, S., Prema, G.: Steganography using genetic algorithm along with visual cryptography for wireless network application. In: International Conference on Information Communication and Embedded Systems (ICICES) (2013)
Shao, L., Qin, Z., Liu, B., Qin, J., Li, H.: Image scrambling algorithm based on random shuffling strategy. In: 3rd IEEE International Conference on Industrial Electronics and Applications (ICIEA), Singapore (2008)
Tseng, L.-Y., Chan, Y.-K., Ho, Y.-A., Chu, Y.-P.: Image hiding with an improved genetic algorithm and an optimal pixel adjustment process. In: Eighth International Conference, vol. 3, on Intelligent Systems Design and Applications (ISDA), Kaohsiung (2008)
Li, H., Du, W., Yao, X., Wu, H.: A steganographic scheme based on image scrambling and coding techniques. In: International Conference on Communications, Circuits and Systems (ICCCAS) vol. 1, Chengdu, China (2013)
Blesswin, J., Rema, Joselin, J.: Recovering secret image in visual cryptography. In: International Conference on Communications and Signal Processing (ICCSP), Calicut (2011)
Jena, D., Jena, S.K.: A novel visual cryptography scheme. In: International Conference on Advance Computer Control (2009)
Che, S., Che, Z., Ma, B.: An improved image scrambling algorithm. In: Second International Conference on Genetic and Evolutionary Computing (WGEC), Hubei (2008)
Ghasemi, E., Shanbehzadeh, J., Fassihi, N.: High capacity image steganography using wavelet transform and genetic algorithm. Manuscript received November, 2010; revised (2011)
Al-Bahadili, H.: A secure block permutation image steganography algorithm. Int. J. Crypt. Inf. Secur. (IJCIS) 3(3) (2013)
Usha, B.A., Srinath, N.K., Narayan, K., Sangeetha, K.N.: A secure data embedding technique in image steganography for medical images. Int. J. Adv. Res. Comput. Commun. Eng. 3(8) (2014)
Luo, H., Yu, F., (Correspondence author), Pan, J.-S.: Data hiding in non-expansion visual cryptography based on edge enhancement multitoning. In: The Fourth International Conference on Information Assurance and Security (2008)
Shang, Z., Ren, H., Zhang, J.: A block location scrambling algorithm of digital image based on arnold transformation. In: The 9th International Conference for Young Computer Scientists (2008)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Rangaswamaiah, C., Bai, Y., Choi, Y. (2020). Multilevel Data Concealing Technique Using Steganography and Visual Cryptography. In: Arai, K., Bhatia, R. (eds) Advances in Information and Communication. FICC 2019. Lecture Notes in Networks and Systems, vol 70. Springer, Cham. https://doi.org/10.1007/978-3-030-12385-7_53
Download citation
DOI: https://doi.org/10.1007/978-3-030-12385-7_53
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-12384-0
Online ISBN: 978-3-030-12385-7
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)