Skip to main content

Multilevel Data Concealing Technique Using Steganography and Visual Cryptography

  • Conference paper
  • First Online:
Advances in Information and Communication (FICC 2019)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 70))

Included in the following conference series:

Abstract

Steganography is a data hiding technique which uses images, audio or video as a cover medium. Cryptography has become an essential part of security. Image Steganography is one such way to hide secret messages in an image to reduce vulnerability to cryptanalysis. We overcome the drawbacks of using only textual steganography as it is easier to intercept and decipher. We encrypt the plaintext with a randomly generated key using XOR and One Time Pad (OTP) Algorithm and in turn embedding it into the Least Significant Bit (LSB) of the cover image. We embed the cipher text in LSB of the pixels of the cover image to form Stego image. To enhance and ensure security, we use visual cryptography along with image scrambling. Image scrambling is a technique in which the location of pixels is scrambled to provide extra protection to the Stego image. Visual cryptography is a method used to encrypt the visual information by breaking it into shares. Using both image scrambling and visual cryptography makes the system not only more secure but also difficult to decrypt. A decryption algorithm for the same is also constructed in this paper.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Natarajan, S., Prema, G.: Steganography using genetic algorithm along with visual cryptography for wireless network application. In: International Conference on Information Communication and Embedded Systems (ICICES) (2013)

    Google Scholar 

  2. Shao, L., Qin, Z., Liu, B., Qin, J., Li, H.: Image scrambling algorithm based on random shuffling strategy. In: 3rd IEEE International Conference on Industrial Electronics and Applications (ICIEA), Singapore (2008)

    Google Scholar 

  3. Tseng, L.-Y., Chan, Y.-K., Ho, Y.-A., Chu, Y.-P.: Image hiding with an improved genetic algorithm and an optimal pixel adjustment process. In: Eighth International Conference, vol. 3, on Intelligent Systems Design and Applications (ISDA), Kaohsiung (2008)

    Google Scholar 

  4. Li, H., Du, W., Yao, X., Wu, H.: A steganographic scheme based on image scrambling and coding techniques. In: International Conference on Communications, Circuits and Systems (ICCCAS) vol. 1, Chengdu, China (2013)

    Google Scholar 

  5. Blesswin, J., Rema, Joselin, J.: Recovering secret image in visual cryptography. In: International Conference on Communications and Signal Processing (ICCSP), Calicut (2011)

    Google Scholar 

  6. Jena, D., Jena, S.K.: A novel visual cryptography scheme. In: International Conference on Advance Computer Control (2009)

    Google Scholar 

  7. Che, S., Che, Z., Ma, B.: An improved image scrambling algorithm. In: Second International Conference on Genetic and Evolutionary Computing (WGEC), Hubei (2008)

    Google Scholar 

  8. Ghasemi, E., Shanbehzadeh, J., Fassihi, N.: High capacity image steganography using wavelet transform and genetic algorithm. Manuscript received November, 2010; revised (2011)

    Google Scholar 

  9. Al-Bahadili, H.: A secure block permutation image steganography algorithm. Int. J. Crypt. Inf. Secur. (IJCIS) 3(3) (2013)

    Article  Google Scholar 

  10. Usha, B.A., Srinath, N.K., Narayan, K., Sangeetha, K.N.: A secure data embedding technique in image steganography for medical images. Int. J. Adv. Res. Comput. Commun. Eng. 3(8) (2014)

    Google Scholar 

  11. Luo, H., Yu, F., (Correspondence author), Pan, J.-S.: Data hiding in non-expansion visual cryptography based on edge enhancement multitoning. In: The Fourth International Conference on Information Assurance and Security (2008)

    Google Scholar 

  12. Shang, Z., Ren, H., Zhang, J.: A block location scrambling algorithm of digital image based on arnold transformation. In: The 9th International Conference for Young Computer Scientists (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yoonsuk Choi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Rangaswamaiah, C., Bai, Y., Choi, Y. (2020). Multilevel Data Concealing Technique Using Steganography and Visual Cryptography. In: Arai, K., Bhatia, R. (eds) Advances in Information and Communication. FICC 2019. Lecture Notes in Networks and Systems, vol 70. Springer, Cham. https://doi.org/10.1007/978-3-030-12385-7_53

Download citation

Publish with us

Policies and ethics