SlideShare una empresa de Scribd logo
1 de 9
Descargar para leer sin conexión
International Journal of Innovative Research in Information Security (IJIRIS) ISSN: 2349-7017(O)
Issue 01, Volume 3 (January 2016) ISSN: 2349-7009(P)
www.ijiris.com
_______________________________________________________________________________________________________
IJIRIS- Impact Factor Value - ISEAJIF: 0.351 | Innospace SJIF: 1.695
© 2014-16, IJIRIS- All Rights Reserved Page -1
Secure Data Encryption and Authentication using Visual
Cryptography in the TSVEC Algorithm
G.Kanimozhi
Assistant Professor,
Department of computer science,
Bharathidasan University Constituent College (W),
Orathanadu, Thanjavur (Dt), Tamil Nadu, India
Dr.A.Shaik Abul khadir,
Associate Professor,
Department of computer science,
Khadir Mohideen College,
Adirampattinam, Thanjavur (Dt), Tamil Nadu,India
Abstract - In today’s nature transmitting message in a safe and protected miniature is difficult, especially when decidedly
conscious message is involved. The system aspiration at suggested a methodology which employs dual stage of examination
getting cryptography and steganography to cover the mysterious document message. The Visual cryptography system (VCS)
is a protected mode that encoded a mysterious image into shares. The key design behind the suggested access deals with
message hiding in image getting Zigzag scanning pattern which is more complex method Z2
H in steganography again
encoded as shares by VC technique for hidden in separate cover images to present authentication for the VC shares which
makes these mysterious shares invisible by hidden them into cover images getting TSVCE method. The mysterious shares
generated from VC encryption are watermarked into some cover images getting digitized watermarking. Digitized
watermarking is used for providing the dual examination of image shares. The share is embedded into the cover image
getting Least Significant Bit Insertion Technique (LSB). The system presents more protected and meaningful mysterious
shares that are robust against a total of attacks. The performance of the suggested system is evaluated getting peak signal to
noise ratio (PSNR), histogram analysis and also numerical experimentation suggests that hidden time varies linearly with
message length. The simulation results show that, the suggested system presents high stage of examination.
Index Terms- Zigzag, Mysterious shares, Visual cryptography, Watermarking, Cover images.
1. INTRODUCTION
Digitized machinery has leading immensely [1]. This has put forth lot of opportunities as well as challenges to protect the
digitized content. Protected message transmission refers to confidential message being transferred over a protected carrier such
that it is not infiltrated or intercepted by any other party other than the expected receiver. As machinery progresses more and
more messages is digitized, there is even more emphasis required on message examination today than there has ever been.
Protecting this message in a safe and protected way which does not impede the access of an authorized authority is an immensely
difficult and very interesting research complication. Uncounted attempts have been made to solve this complication within the
cryptographic center. Steganography is the art and science of encoding a mysterious message into an current communication
carrier in such a way that only the sender and intended receiver are aware of its pronounce [1]. The ongoing development of
computer and technologies presents an excellent new carrier for steganography. Images do not convey any significant message
and they can be used to cover a mysterious message [2].Also, some pixels of the image can be modified to carry a small total of
mysterious bits as small alteration (e.g. least significant bit of pixels) will not be noticeable to an unsuspecting user [2].One of
the new approach in message examination modes is visual cryptography allow us to effectively share mysterious between a total
of trusted parties [3] [4].
As with uncounted cryptographic arrangement, trust is the most difficult part. Visual cryptography presents a very powerful
access by which one mysterious can be distributed into two or more shares [5].When the shares are superimposed exactly stable;
the original mysterious can be discovered. A mysterious is something which is kept from the knowledge of any but the initiated
or privileged. Mysterious sharing is a mode by which a mysterious can be distributed between factions of participant is allocated
a piece of mysterious [6]. This piece of the mysterious is known as a share. The mysterious can be reconstructed when a
sufficient total of shares are combined stable. While these shares are separate, no message about the mysterious can be accessed.
That is shares are completely useless while they are separated. Pixel expansion and low contrast of the recovered image is the
most important drawback in visual cryptography [7]. Watermarking is the access of hidden mysterious image into a cover image
without affecting its perceptual quality so that mysterious image can be revealed by some process [8]. One significant
improvement of watermarking is the inseparability of the watermark (mysterious image) from the cover image.
International Journal of Innovative Research in Information Security (IJIRIS) ISSN: 2349-7017(O)
Issue 01, Volume 3 (January 2016) ISSN: 2349-7009(P)
www.ijiris.com
_______________________________________________________________________________________________________
IJIRIS- Impact Factor Value - ISEAJIF: 0.351 | Innospace SJIF: 1.695
© 2014-16, IJIRIS- All Rights Reserved Page -2
Some of the vital characteristics of the watermark are hard to perceive, resists typical distortions, endures malevolent attacks,
carries numerous bits of message, capable of coexisting with other watermarks, and demands little computation to insert and
extract Watermarks [9]. Generally, robust watermarking is used to resist un-malicious or malicious attacks like scaling,
cropping, loss squeeze, and so forth. Watermarking approach can be categorized into different types based on a total of ways.
Watermarking can be divided into Non-blind, Semi-Blind and Blind arrangement based on the requisite for watermark extraction
or detection [10]. Non-blind watermarking arrangement necessitates the original image and mysterious keys for watermark
detection. The Semi-Blind arrangement require the mysterious keys and the watermark bit sequence for extraction, whereas, the
Blind arrangement need only the mysterious keys for extraction. Another categorization of watermarks based on the embedded
message (watermark) is: visible and invisible. With visible watermarking of images, a secondary image (the watermark) is
embedded in a primary image in such that it is perceptible to a human observer, whereas the embedded message is not detectable
in case of invisible watermarking; nevertheless, it can be extracted by a computer program.
Pixel expansion and low comparison stage is the most important drawback in visual cryptography. In our suggested access these
drawbacks are overcome by getting xor operation for stacking those shares and also present very strong stage of examination.
Here our suggested system will add the merits of Steganography getting zigzag pattern, visual cryptography as well as Invisible
and blind watermarking approach, where we will cover the message getting Steganography and generate the mysterious shares
getting basic visual cryptography miniature and then we will watermark these shares into some cover images getting invisible
watermarking. Thus the mysterious shares are protected from cheating attacks. The decryption will be same as in the visual
cryptographic miniature i.e. by stacking of the shares after the mysterious shares have been extracted by a simple watermark
extraction access. The experimental results have been demonstrated for efficiency of the suggested Invisible Watermarking
system for Binary images.
The remainder of this system is organized as follows: Section II presents a review of background and related work. In Section
III, we introduce our suggested miniature with four phases with the simulated results and also the suggested miniature is
evaluated by PSNR and histogram analysis. In Section IV, we show the results of an experiment that was performed to evaluate
the performance of the suggested mode.
2. LITERATURE REVIEW
A. Steganography:
Steganography is the art of hiding messages inside unsuspicious medium. The purpose of steganography is to cover the existence
of a message from a third party. Cryptography is widely used with steganography. A major drawback of cryptography is that the
existence of the message is not hidden, whereas, steganography covers the existence of the message. Steganography works in
two stages, hidden then extracting. During the hidden stage, a key is used to embed a message in a cover medium resulting in a
hidden object. The hidden-object is then transmitted along public carriers to its destination. When the hidden-object is received,
the embedded message is extracted from hidden-object getting the known hidden-key. steganalysis is the art of discovering and
rendering useless such covert message. Its goal is to avoid drawing suspicion to the transmission of a hidden message.
steganalysis contains two main issues: Detection and Distortion. Drawback of Steganography is if the key is known then the
message can be retrieved easily. Therefore no examination for the encoded image. The encoded image can be protected by
combining these steganography with visual cryptography and digitized watermarking.
B. Visual Cryptography System
Visual Cryptography (VC) was first introduced by Moni Noar and Shamir at Eurocrypt'94. In the above basic VC system each
pixel 'p' of the mysterious image is encoded into a pair of sub pixels in each of the two shares [11]. If 'p' is white, one of the two
columns under the white pixel in Fig. 1 is selected. If p is black, one of the two columns under the black pixel is selected. In each
case, the selection is performed randomly such that each column has 50% probability to be chosen [12]. Then, the first two pairs
of sub pixels in the selected column are assigned to share 1 and share 2, respectively. Since, in each share, p is encoded into a
black white or white-black pair of sub pixels, an individual share gives no clue about the mysterious image. By stacking the two
shares as shown in the last row of Fig. 1, if 'p' is white it always outputs one black and one white sub pixel, irrespective of which
column of the sub pixel pairs is chosen during encryption. If 'p' is black, it outputs two black sub pixels.
Anyone who holds only one share will not be able to reveal any message about the mysterious. Stacking both these
transparencies will permit visual recovery of the mysterious. The pixel-expansion complication is a major drawback with most
VCSs that use the VC-based access. The pixel-expansion complication affects the practicability of a VC system because it
increases the storage and/or transmission costs. VCS access for GASs also suffers from the pixel-expansion complication [13].
When used standalone steganography and cryptography approach are vulnerable to attacks. Attacks on steganography and
cryptography lead to detection and destruction of the mysterious message. Steganography attacks focus on detecting the changes
in the cover that has been used to send the mysterious message. Cryptography attacks focus on de-scrambling the mysterious
message. Examination breaches can be overcome when the improvements of both these approach are combined stable.
Steganography methods applied on cryptography approach results into a robust system. The objective of getting two approaches
in combination in the existed system is such that benefits of the two approaches can be combined and a more protected and
robust system can be built.
International Journal of Innovative Research in Information Security (IJIRIS) ISSN: 2349-7017(O)
Issue 01, Volume 3 (January 2016) ISSN: 2349-7009(P)
www.ijiris.com
_______________________________________________________________________________________________________
IJIRIS- Impact Factor Value - ISEAJIF: 0.351 | Innospace SJIF: 1.695
© 2014-16, IJIRIS- All Rights Reserved Page -3
Three layers of examination are added to the mysterious message that is hidden in the video the first stage being arrangement of
message in a random miniature that is the frame selection logic. If this stage of examination is broken still the steganography
message has to be recovered and later the message has to be decrypted to obtain the original message. This makes it difficult to
the attacker to obtain the mysterious message quickly and correctly.
Figure .l. Visual Cryptography system
Cryptography can be classified broadly into three main factions’ asymmetric encryption method, digitized signature and hash
function [8].In asymmetric encryption methods two keys are used. Public key for encryption process and private key for
decryption process. Digitized process is a mathematical access to check the authenticity of a digitized message. Digitized
signatures prevent message from being tampered or forged. Hashing is only a one way mathematical function and hashed value
is only a message digest of the message. An overview is presented in section II. The section III describes the suggested
methodology. Section IV briefs about the methodic view and results. Section V illustrates about the performance evaluation and
section VI describes the future work and the system is concluded.
C. Digitized Watermarking
A digitized watermark is a kind of marker covertly embedded in a noise-tolerant signal such as audio or image message. It is
typically used to identify ownership of the copyright of such signal. "Watermarking" is the process of hiding digitized message
in a carrier signal the hidden message should, but does not need to contain a relation to the carrier signal. Digitized watermarks
may be used to verify the authenticity or integrity of the carrier signal or to show the identity of its owners. Digitized
watermarking is the act of hiding a message related to a digitized signal (i.e. an image, song, and video) within the signal itself
[14]. It is a concept closely related to steganography, in that they both cover a message inside a digitized signal. In this system
the mysterious message has been hidden in image and then the shares have been generated by Visual Cryptography. VC system
was used for generating shares. After that both shares were embedded into separate cover images with the help of invisible
watermarking [15]. In this research, we existed an innovative Invisible system, applied to VC shares to protect them against
cheating attacks by the adversaries.
III. THE SUGGESTED MINIATURE
A. Phases of Suggested Scheme
This suggested miniature for protected the message communication getting steganography, visual cryptography which will use
watermarking access to embed the generated shares into any cover image. The suggested access has tested getting various image
size and message length with hidden time getting TSVCE method. Suggested system consists of four phases which are described
in the following subsections. The performance is evaluated by getting peak to noise signal ratio (PSNR) and also by histogram of
image before and after hidden. In our suggested system the histogram of the image before and after hidden will be same. Phase1-
steganographic Access in this very first phase, the mysterious message is hidden getting steganographic access. The suggested
access is based on the (Z2
H) Zigzag hiding sequence applied on binary images. Image would be divided into 8x8 blocks and in
each pixel; message will be covered in zigzag manner. It presents more examination comparing to other hiding sequence.
B. Z2
h (Zigzag Hiding) Method for Steganographic Technique
Stride 1: Zigzag hiding sequence applied on binary images
Input: 3 greyscale images
Output: divided into 8x8 blocks and in each pixel
Action: The hidden process starts from any pixel and covers the message in Z2
H pattern as the diagram illustrates. In suggested
scanning sequence Z2
H sequence is used which is very complex so the hacker find it difficult to hack the message. The message
is covered in Z2
H manner so the message covered path cannot be easily predicted by the hacker. The test images taken for
system testing with various sizes
End
International Journal of Innovative Research in Information Security (IJIRIS) ISSN: 2349-7017(O)
Issue 01, Volume 3 (January 2016) ISSN: 2349-7009(P)
www.ijiris.com
_______________________________________________________________________________________________________
IJIRIS- Impact Factor Value - ISEAJIF: 0.351 | Innospace SJIF: 1.695
© 2014-16, IJIRIS- All Rights Reserved Page -4
Figure.2. Zigzag Pattern
TABLE 1: IMAGES
IMAGE SIZE WIDTH HEIGHT
1 108KB 192 192
2 300KB 320 320
3 588KB 448 448
4 768KB 512 512
The hidden time for zigzag pattern IS shown with various message lengths in Table 2
Stride 2: the depth of the 3 dimensional Effect of message length on hidden time for zigzag pattern images
Input: greyscale images
Output: test images 1, 2, 3 and 4 by zigzag
Action: established on the projection
TABLE 2: HIDDEN TIME
The above Table 2 shows different message lengths and hidden time in seconds for test images 1, 2, 3 and 4 by zigzag
scanning pattern. For image 1 it was observed that the hidden process failed for message length of value 12KB or greater.
Figure.3. Effect of message length on hidden time for zigzag pattern.
End
Stride 3: image and pixel size calculation
Input: greyscale images
Output: test images
MESSAGE
LENGTH
HIDDEN TIME
IMAGE 1 IMAGE 2 IMAGE 3 IMAGE 4
1KB 0.055 0.056 0.056 0.025
4KB 0.215 0.219 0.217 0.222
8KB 0.432 0.435 0.436 0.441
12KB 0.648 0.654 0.653 0.651
16KB 0.862 0.879 0.871
32KB 1.734 1.757 1.742
64KB 3.521 3.495
74KB 4.002
84KB 4.558
94KB 4.919
International Journal of Innovative Research in Information Security (IJIRIS) ISSN: 2349-7017(O)
Issue 01, Volume 3 (January 2016) ISSN: 2349-7009(P)
www.ijiris.com
_______________________________________________________________________________________________________
IJIRIS- Impact Factor Value - ISEAJIF: 0.351 | Innospace SJIF: 1.695
© 2014-16, IJIRIS- All Rights Reserved Page -5
Action: image size Ll xL2 pixels, it is possible to cover (LlxL2x3) bits
So for an image size Ll xL2 pixels, it is possible to cover (LlxL2x3) bits, that is (LlxL2x3) / (8xl024) KB. From the above
analysis it is clearly shown that, when the image size is smaller only less amount of message can be stored. When the image size
increases the amount of message length stored can also be increased.
End
Larger the image, larger the message length can be stored. So, mostly large size of image is used for protected transmission of
message where huge amount of message can be stored. The above Figure.3 shows the hidden time performance for Zigzag
hiding sequence which is applied in four test images as function of message length. The result suggests that the hidden time
varies linearly with the message length. For experimentation message taken and the binary image
Fig.4. (a) Document with message length of 194 needs to cover (b) Message covered binary image with the message length of
194 and hidden time of 0.025737 seconds.
C. Visual Cryptographic Encryption Getting TSVCE (Two Shares Visual Cryptographic Encryption) METHOD
In this second phase they will do visual cryptography (VC) encryption. The message encoded image is generated as two shares
by VC access. In our suggested system, VC share creation is performed.
Stride 1: message encoded image is generated as two shares
Input: encoded images
Output: VC share
Action: A white pixel is shared into two identical blocks of four sub pixels. A black pixel is shared into two complementary
blocks of four sub pixels. All the pixels in the mysterious image are encoded similarly getting this system.
End
Stride 2: two shares are stacked stable
Input: VC share
Output: medium grey or completely black
Action: When two shares are stacked stable, the result is either medium grey (which represents white) or completely black
(which represents black). In general, a (k, and n) mysterious sharing system is a mode to share a mysterious K among n
participants such that the following conditions hold. Any k participants stable can compute K. Any t participants, t < k, gain no
message about K. Here is an example of a (2,2) mysterious sharing system.
End
Stride 3: two shares can be constructed
Input: VC share
Output: constructed
Action: Assume that the mysterious K is a binary sequence of length m, i.e. K = (kp kz, "', km) the two shares, 8, and 82 can be
constructed as follow. The first share is chosen to be a random binary sequence of length m, say 8, = (8",512,'" ,Slm ) 'Then, we
can compute the second share by doing "exclusive or" on K and S1.
S2i = ki EB S1i, i = l,···,m equation(l) 21 f II '
For example, assume that m = 2, k = (0, 1). Then the two shares can be constructed as follow:
S1 = (0, 0), S2 = S1 EB K = (0, 1)
S1 = (0, 1), S2 = S1, EB K = (0, 0)
S1 = (1, 0), S2 = S1 EB K = (1, 1)
S1 = (1, 1), S2 = S1, EB K = (1, 0)
End
However, looking only at one share, say SI' any four values of K is possible. In other words, it gains no message about K if
another share S2 is unknown. Generally, the black-and white (2, 2) visual cryptography decomposes every pixel in a mysterious
image into a 2x2 block in the two transparencies according to the rules in figure 1, two of them black and white. If pixel is white
(black) one of the above six columns of figure 1 is chosen to generate Share 1 and Share 2.
International Journal of Innovative Research in Information Security (IJIRIS) ISSN: 2349-7017(O)
Issue 01, Volume 3 (January 2016) ISSN: 2349-7009(P)
www.ijiris.com
_______________________________________________________________________________________________________
IJIRIS- Impact Factor Value - ISEAJIF: 0.351 | Innospace SJIF: 1.695
© 2014-16, IJIRIS- All Rights Reserved Page -6
Figure.5. VC share
D. Hiding The Shares Getting Digitized Watermarking:
This phase embeds image shares into some cover images getting digitized watermarking. Result of this phase will be different
meaningful shares consist some cover image. The shares generated by VC (2, 2) were hidden into the separate cover images by
Least Significant Bit (LSB) insertion access. A digitized image consists of a matrix of color and intensity values. In a typical
gray scale image, 8 bits per pixel are used [16]. In a typical full color image, there are 24 bits per pixel, 8bits assigned to each
color components. Modulating the least-significant bit does not result in a human perceptible difference because the amplitude of
the change is small. Improvement of LSB is its simplicity and uncounted approach uses these modes. LSB hidden also allows
high perceptual transparency. LSB encoding is extremely conscious to any kind of filtering or manipulation of the watermarked
image. One of the most common approaches used in watermarking is called least significant bit (LSB) insertion. The least
significant bits of the cover-image are altered so that they form the embedded message [17]. The experimentation results for
hiding shares into cover image were shown below.
Fig.6. Cover image 1 before and after encoding with PSNR =55.9110 and corresponding histogram analysis.
Figure.7. Cover image 2 before and after encoding with PSNR =55.9045 and corresponding histogram analysis.
Thus share 1 embedded into the cover image 'Lena' and share2 in 'Baboon'.
International Journal of Innovative Research in Information Security (IJIRIS) ISSN: 2349-7017(O)
Issue 01, Volume 3 (January 2016) ISSN: 2349-7009(P)
www.ijiris.com
_______________________________________________________________________________________________________
IJIRIS- Impact Factor Value - ISEAJIF: 0.351 | Innospace SJIF: 1.695
© 2014-16, IJIRIS- All Rights Reserved Page -7
IV. PEKFORMANCE EVALUATION
Peak signal to noise ratio (PSNR) is employed to measure the difference between the cover image and the watermarked image.
PSNR can be calculated getting P, 'IiVR IOiop: .t MRSL is the maximum value the samples and MES is the mean error square.
The evaluation of performance of any visual cryptography arrangement, which can done by considering the parameters such as
PSNR (peak signal-to-noise ratio)PSNR is used to compare between the cover image and the watermarked image. It is measured
in decibels (dB). It is used to assess the quality of the hidden image. If PSNR of gray scale image larger than 36 dB then the
human cannot distinguish between the cover image and the watermarked image. PSNR results as shown below prove the visual
quality of the image after hidden.
TABLE 3 RESULTS
SHARES COVER IMAGES PSNR % MSR % BER %
SHARE 1 LENA 55.9110 0.09 1
SHARE 2 BABOON 55.9045 0.12 1
Histogram analysis can be used to evaluate the efficiency of the embedded method. If the histogram remains the same after the
hidden, then the embedded method is efficient. Note that the histograms of the cover images and the watermarked images do not
have any significant change. The stability of the watermarked images histograms means that the suggested system can resist the
attacks and statistical changes. Histogram of original and the embedded image remains the same which prove efficiency of
image before and after hidden in suggested system. Histogram of the two cover images are shown in figure
A. Robustness to Attacks:
To evaluate the robustness of the suggested mode, several attacks have been applied to the watermarked image and also to share
1 & 2. Fig.8 shows watermarked image and share 1 &2 under different attacks
(a) (b) (c) (d)
Figure 8. Watermarked Image 1 under different attacks.
(a) Salt & Pepper Noise (PSNR = 9.S9db)
(b) Comparison (PSNR =6.78db) (c) Luminance (PSNR=16.99 db) (d) Tamper (PSNR=12.S4 db)
(a) (b) (c) (d)
Fig 9.Share 1 under different
(a) Salt & Pepper Noise (b) Contrast
(c) Luminance (d) Tamper
(a) (b) (c) (d)
Figure.10. Watermarked Image 2 under different attacks. (a) Salt& Pepper Noise (PSNR = 10.69db)
(b) Contrast (PSNR =9.78db) (c) Luminance (PSNR=I1.59 db) (d) Tamper (PSNR=19.43 db)
(a) (b) (c) (d)
Figure.11. Share 2 under different attacks.
(a) Salt & Pepper Noise (b) Contrast
(b) (c) Luminance (d) Tamper
International Journal of Innovative Research in Information Security (IJIRIS) ISSN: 2349-7017(O)
Issue 01, Volume 3 (January 2016) ISSN: 2349-7009(P)
www.ijiris.com
_______________________________________________________________________________________________________
IJIRIS- Impact Factor Value - ISEAJIF: 0.351 | Innospace SJIF: 1.695
© 2014-16, IJIRIS- All Rights Reserved Page -8
V. VISUAL CRYPTOGRAPHIC DECRYPTION:
In this phase the binary watermarked shares extracted from the cover images. The suggested watermarking system doesn't
necessitate the original image or any of its characteristics for the extraction of watermark, and hence the suggested system is
blind. Then they apply the visual cryptographic decryption. It uses human visual system for decryption which is the core
improvement for which visual cryptography was developed. Now they can decrypt the original mysterious image by overlapping
or stacking the shares. Then the mysterious message has been recovered from the overlapped share getting length of the message
as key.
(a)
(b) (c)
Figure.12. (a) Recovered Share1 and Share2
b) Recovered image (c) Extracted message
The message is extracted from the recovered image with message length of 194 as a key
VI. EXPERIMENTAL RESULTS
For simulation they have used MATLAB 7.0 tool and tested with images of different sizes as shown in Table 1. The mysterious
image used for experimentation of steganography is the size of Test Image 4. The suggested system achieves effective
embedment of the binary share images into the cover images. Also, the suggested system depicts efficient extraction of the
embedded watermarks from the watermarked images. The watermarked images possess good Peak Signal to Noise Ratio
(PSNR) and good visual quality. Fig. 4, S, 6, 7, 8, 9, 10, 11, 12depicts the results obtained on experimentation of the entire
suggested Visual Cryptography system. The results include original mysterious image, encoded mysterious shares, cover image,
watermarked images and the decoded mysterious image.
VII. PERFORMANCE EVALUATION
A. Less computational time
The suggested system contains a frame selection logic which uses an index, hence retrieval of the mysterious message from then
hidden -crypto message becomes easy and fast. Retrieval time for the decrypted message is 6.44 seconds for the implemented
access.
B. Decidedly protected
Dual stage of examination is obtained by the use of steganography as well as cryptography. In addition to it there is a frame
selection logic used which embeds the message in random frames, which becomes difficult to gauge.
C. High availability
Message is used widely across uncounted social networking sites and applications. The avi format used is also a well-known and
frequently used format in videos. Thus the usage of video will not arouse any suspicion since they are commonly used these
days. Confidential message can such as banking or military message can be transmitted across an unprotected communication
carrier too, since it won’t gross attention.
VIII. CONCLUSION
In this work a general design of the suggested work was put forth in brief and a simple access was implemented to conduct an
efficiency check of the suggested work. Currently the focus is restricted to one access. The suggested concept can be extended
for several novel crypto-hidden approaches. A wide variety of combinations can be used to design more robust and efficient
arrangement. Various approach can be compared and caparisoned to evaluate and analyze the best one with respect to message
hiding capacity, visual perceptibility, efficient retrieval of message and uncounted more factors. Steganography and
Watermarking is the current area of research where lot of scope exists. Currently the particular cryptographic access called
Visual Cryptography is being used by several countries for mysteriously transfer of hand written documents, facial documents,
document images, internet voting etc.
International Journal of Innovative Research in Information Security (IJIRIS) ISSN: 2349-7017(O)
Issue 01, Volume 3 (January 2016) ISSN: 2349-7009(P)
www.ijiris.com
_______________________________________________________________________________________________________
IJIRIS- Impact Factor Value - ISEAJIF: 0.351 | Innospace SJIF: 1.695
© 2014-16, IJIRIS- All Rights Reserved Page -9
Therefore combining these three phases of message hiding access present high stage of examination. The Zigzag hiding
sequence was implemented which presents more examination than any other hiding sequence in Steganography. The result
suggests that the hidden time varies linearly with the message length. In our suggested system the vulnerability of binary
mysterious shares is overcome by hiding them invisibly into some cover images. During the decryption phase, the mysterious
shares are extracted from their cover images. The overlapping f these shares reveal the original mysterious image from which the
message has been decrypted getting message length as a key. Yet uncounted possible enhancements and extensions can be made
to improve further.
XI. FUTURE WORK:
In future this miniature concept can be extended for several novel crypto-hidden approaches. A wide variety of combinations can
be used to design more robust and efficient arrangement. Various approach can be compared and caparisoned to evaluate and
analyze the best one with respect to message hiding capacity, visual perceptibility, efficient retrieval of message and uncounted
more factors.
REFERENCES
[1]. Hassan Mathkour .Ghazy M. R. Assassa Abdulaziz AI Muharib Ibrahim Kiady" A Novel Approach for Hiding Messages in
Images" 2009 International Conference on Signal Acquisition and Processing
[2]. P. S. Revenkar, Anisa Anjum, W .Z. Gandhare "Survey of Visual Cryptography Schemes" International Journal of Security
and Its Applications Vol. 4, No. 2, April, 2010
[3]. M.Naor and A. Shamir, 1995. Visual cryptography. Advances in Cryptology EUROCRYPT '94. Lecture Notes in
Computer Science, (950): 1-12.
[4]. Neelima. Guntupalli, Mr: P. D. Ratna Raju, Mr.Suresh cheekaty "An Introduction to Different Types of Visual
Cryptography Schemes" International Journal of Science and Advanced Technology Volume I No 7 September 2011.
[5]. B Surekha , Dr GN Swamy , Dr K Srinivasa Rao , A Ravi Kumar "A Watermarking Technique based on Visual
Cryptography" Journal of Information Assurance and Security 4 (2009)
[6]. Saleh Saraireh "A Secure Data Communication System using Cryptography and Steganography" International Journal of
Computer Networks & Communications (IJCNC) Vo1.5, No.3, May 2013.
[7]. Chih-Ming Hu and Wen-Guey Tzeng "Cheating Prevention in Visual Cryptography" IEEE transactions on image
processing, vol. 16, no. I, january 2007.
[8]. Zhi-hui Wang, Chin-Chen Chang, Huynh Ngoc Tu, Ming-Chu Li: "Sharing a Secret Image in Binary Images with
Verification" Journal of Information Hiding and Multimedia Signal Processing 2011 ISSN 2073-4212 Volume 2, Number
1, January 2011
[9]. Ravindra Gupta, Akanksha Jain, Gajendra Singh "Combine use of Steganography and Visual Cryptography for Secured
Data hiding in Computer Forensics" International Journal of Computer Science and Information Technologies, Vol. 3 (3) ,
2012,4366 - 4370
[10]. Zhi Zhou, Gonzalo R. Arce, and Giovanni Di Crescenzo "Halftone Visual Cryptography" IEEE transactions on image
processing, VOL. 15, NO. 8, AUGUST 2006 2441
[11]. C. M. Hu and W. G. Tzeng, "Cheating prevention in visual cryptography," IEEE Transactions on Image Processing, vol.
16, no. I, pp. 36-45, 2007.
[12]. Sian-Jheng Lin and Wei-Ho Chung "A Probabilistic Model of Visual Cryptography Scheme With Dynamic Group" IEEE
transactions on information forensics and security, vol. 7, no. 1, february 2012
[13]. P. F. Tsai and M. S. Wang, "An (3,3)-visual secret sharing scheme for hiding three secret data," Proceedings of the 2006
Joint Conference on Information Sciences, 2006.
[14]. Jen-Bang Fenga, Hsien-Chu Wub, Chwei-Shyong Tsaic, Ya-Fen Changb, Yen-Ping Chud, "Visual secret sharing for
mUltiple secrets," Pattern Recognition, vol. 40, pp. 3633-3651, 2007.
[15]. Nazanin Askari, Cecilia Moloney, H.M. Heys "A Novel Visual Secret Sharing Scheme without Image Size Expansion. "
[16]. Y.Bani, Dr.B. Majhi and R. S. Mangrulkar, 2008. “A Novel Approach for Visual Cryptography Using a Watermarking
Technique”. In Proceedings of 2nd National Conference, IndiaCom 2008. Computing for national development, February
08-09, New Delhi.
[17]. Jagdeep Verma, Dr.Vineeta Khemchandani "A Visual Cryptographic Technique to Secure Image Shares" International
Journal of Engineering Research and Applications Vol. 2, Issue I, Jan-Feb 2012, pp. 1121-1125
[18]. A. Markman and B. Javidi. Full-phase photon-counting double-random-phase encryption. J. Opt. Soc. Am. A, 31(2):394–
403, 2014.
[19]. M.S.Millan and E.P´erez-Cabr´e. Optical data encryption. In Optical and Digital Image Processing: Fundamentals and
Applications, pages 739–767. Wiley-VCH Verlag GmbH & Co., 2011.
[20]. E. Perez-Cabre, H. C. Abril, M. S. Mill an, and B. Javidi. Photon-counting double-random-phase encoding for secure
image verification and retrieval. J.Opt., 14(9):094001, 2012.

Más contenido relacionado

La actualidad más candente

Data security using stegnography and quantum cryptography
Data security using stegnography and quantum cryptographyData security using stegnography and quantum cryptography
Data security using stegnography and quantum cryptographyAlexander Decker
 
steganography using visual cryptography_report
steganography using visual cryptography_reportsteganography using visual cryptography_report
steganography using visual cryptography_reportSaurabh Nambiar
 
Online paymentusingsteganographt&Visualcryptography
Online paymentusingsteganographt&VisualcryptographyOnline paymentusingsteganographt&Visualcryptography
Online paymentusingsteganographt&VisualcryptographyNagarjuna mahanti
 
Secure Message Transmission using Image Steganography on Desktop Based
Secure Message Transmission using Image Steganography on Desktop BasedSecure Message Transmission using Image Steganography on Desktop Based
Secure Message Transmission using Image Steganography on Desktop Basedijtsrd
 
Analysis of Different Steganography Algorithms and Security Issues
Analysis of Different Steganography Algorithms and Security IssuesAnalysis of Different Steganography Algorithms and Security Issues
Analysis of Different Steganography Algorithms and Security IssuesIRJAES Editor
 
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...IRJET Journal
 
ENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUD
ENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUDENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUD
ENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUDIAEME Publication
 
A Robust Technique to Encrypt and Decrypt Confidential Data within Image
A Robust Technique to Encrypt and Decrypt Confidential Data within ImageA Robust Technique to Encrypt and Decrypt Confidential Data within Image
A Robust Technique to Encrypt and Decrypt Confidential Data within Imageinventionjournals
 
A Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and SteganographyA Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and SteganographyIJCNCJournal
 
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...IAEME Publication
 
Authentic Data Exchange in Wireless Sensor Networks Ensuring Integrity and Co...
Authentic Data Exchange in Wireless Sensor Networks Ensuring Integrity and Co...Authentic Data Exchange in Wireless Sensor Networks Ensuring Integrity and Co...
Authentic Data Exchange in Wireless Sensor Networks Ensuring Integrity and Co...AM Publications,India
 
IRJET- Comparative Study on Video Steganography in Spatial and IWT Domain
IRJET-  	  Comparative Study on Video Steganography in Spatial and IWT DomainIRJET-  	  Comparative Study on Video Steganography in Spatial and IWT Domain
IRJET- Comparative Study on Video Steganography in Spatial and IWT DomainIRJET Journal
 
Sample projectdocumentation
Sample projectdocumentationSample projectdocumentation
Sample projectdocumentationhlksd
 
TWO PHASE CLANDESTAIN IMAGE ENCRYPTION
TWO PHASE CLANDESTAIN IMAGE ENCRYPTION TWO PHASE CLANDESTAIN IMAGE ENCRYPTION
TWO PHASE CLANDESTAIN IMAGE ENCRYPTION acijjournal
 
IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...
IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...
IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...IJCSEA Journal
 
Design and implementation of hierarchical visual
Design and implementation of hierarchical visualDesign and implementation of hierarchical visual
Design and implementation of hierarchical visualIJNSA Journal
 
novel Approach For Data Hiding by integrating Steganography and Extended Visu...
novel Approach For Data Hiding by integrating Steganography and Extended Visu...novel Approach For Data Hiding by integrating Steganography and Extended Visu...
novel Approach For Data Hiding by integrating Steganography and Extended Visu...swapnalithakur7
 

La actualidad más candente (20)

Data security using stegnography and quantum cryptography
Data security using stegnography and quantum cryptographyData security using stegnography and quantum cryptography
Data security using stegnography and quantum cryptography
 
steganography using visual cryptography_report
steganography using visual cryptography_reportsteganography using visual cryptography_report
steganography using visual cryptography_report
 
Online paymentusingsteganographt&Visualcryptography
Online paymentusingsteganographt&VisualcryptographyOnline paymentusingsteganographt&Visualcryptography
Online paymentusingsteganographt&Visualcryptography
 
Secure Message Transmission using Image Steganography on Desktop Based
Secure Message Transmission using Image Steganography on Desktop BasedSecure Message Transmission using Image Steganography on Desktop Based
Secure Message Transmission using Image Steganography on Desktop Based
 
Analysis of Different Steganography Algorithms and Security Issues
Analysis of Different Steganography Algorithms and Security IssuesAnalysis of Different Steganography Algorithms and Security Issues
Analysis of Different Steganography Algorithms and Security Issues
 
Ijmet 10 01_020
Ijmet 10 01_020Ijmet 10 01_020
Ijmet 10 01_020
 
Review of Role of Digital Video in Information Security
Review of Role of Digital Video in Information SecurityReview of Role of Digital Video in Information Security
Review of Role of Digital Video in Information Security
 
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
 
ENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUD
ENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUDENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUD
ENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUD
 
A Robust Technique to Encrypt and Decrypt Confidential Data within Image
A Robust Technique to Encrypt and Decrypt Confidential Data within ImageA Robust Technique to Encrypt and Decrypt Confidential Data within Image
A Robust Technique to Encrypt and Decrypt Confidential Data within Image
 
A Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and SteganographyA Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and Steganography
 
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...
 
Authentic Data Exchange in Wireless Sensor Networks Ensuring Integrity and Co...
Authentic Data Exchange in Wireless Sensor Networks Ensuring Integrity and Co...Authentic Data Exchange in Wireless Sensor Networks Ensuring Integrity and Co...
Authentic Data Exchange in Wireless Sensor Networks Ensuring Integrity and Co...
 
IRJET- Comparative Study on Video Steganography in Spatial and IWT Domain
IRJET-  	  Comparative Study on Video Steganography in Spatial and IWT DomainIRJET-  	  Comparative Study on Video Steganography in Spatial and IWT Domain
IRJET- Comparative Study on Video Steganography in Spatial and IWT Domain
 
Nz2422822287
Nz2422822287Nz2422822287
Nz2422822287
 
Sample projectdocumentation
Sample projectdocumentationSample projectdocumentation
Sample projectdocumentation
 
TWO PHASE CLANDESTAIN IMAGE ENCRYPTION
TWO PHASE CLANDESTAIN IMAGE ENCRYPTION TWO PHASE CLANDESTAIN IMAGE ENCRYPTION
TWO PHASE CLANDESTAIN IMAGE ENCRYPTION
 
IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...
IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...
IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...
 
Design and implementation of hierarchical visual
Design and implementation of hierarchical visualDesign and implementation of hierarchical visual
Design and implementation of hierarchical visual
 
novel Approach For Data Hiding by integrating Steganography and Extended Visu...
novel Approach For Data Hiding by integrating Steganography and Extended Visu...novel Approach For Data Hiding by integrating Steganography and Extended Visu...
novel Approach For Data Hiding by integrating Steganography and Extended Visu...
 

Destacado

Hiding text in audio using lsb based steganography
Hiding text in audio using lsb based steganographyHiding text in audio using lsb based steganography
Hiding text in audio using lsb based steganographyAlexander Decker
 
Implementation of LSB-Based Image Steganography Method for effectiveness of D...
Implementation of LSB-Based Image Steganography Method for effectiveness of D...Implementation of LSB-Based Image Steganography Method for effectiveness of D...
Implementation of LSB-Based Image Steganography Method for effectiveness of D...ijsrd.com
 
Implementation of Image Steganography in Image by using FMM nested with LSB S...
Implementation of Image Steganography in Image by using FMM nested with LSB S...Implementation of Image Steganography in Image by using FMM nested with LSB S...
Implementation of Image Steganography in Image by using FMM nested with LSB S...Praneeta Dehare
 
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...iosrjce
 

Destacado (6)

03.fbis10083
03.fbis1008303.fbis10083
03.fbis10083
 
Hiding text in audio using lsb based steganography
Hiding text in audio using lsb based steganographyHiding text in audio using lsb based steganography
Hiding text in audio using lsb based steganography
 
Implementation of LSB-Based Image Steganography Method for effectiveness of D...
Implementation of LSB-Based Image Steganography Method for effectiveness of D...Implementation of LSB-Based Image Steganography Method for effectiveness of D...
Implementation of LSB-Based Image Steganography Method for effectiveness of D...
 
LSB & DWT BASED DIGITAL WATERMARKING SYSTEM FOR VIDEO AUTHENTICATION.
LSB & DWT BASED DIGITAL WATERMARKING SYSTEM FOR VIDEO AUTHENTICATION.LSB & DWT BASED DIGITAL WATERMARKING SYSTEM FOR VIDEO AUTHENTICATION.
LSB & DWT BASED DIGITAL WATERMARKING SYSTEM FOR VIDEO AUTHENTICATION.
 
Implementation of Image Steganography in Image by using FMM nested with LSB S...
Implementation of Image Steganography in Image by using FMM nested with LSB S...Implementation of Image Steganography in Image by using FMM nested with LSB S...
Implementation of Image Steganography in Image by using FMM nested with LSB S...
 
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
Audio Steganography Using Discrete Wavelet Transformation (DWT) & Discrete Co...
 

Similar a Secure Data Encryption and Authentication using Visual Cryptography in the TSVEC Algorithm

Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...IOSR Journals
 
Privacy Enhanced Online Payment System
Privacy Enhanced Online Payment SystemPrivacy Enhanced Online Payment System
Privacy Enhanced Online Payment SystemEditor IJMTER
 
Implementation of Steganographic Techniques and its Detection.
Implementation of Steganographic Techniques and its Detection.Implementation of Steganographic Techniques and its Detection.
Implementation of Steganographic Techniques and its Detection.IRJET Journal
 
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...IRJET Journal
 
tv_27_2020_6_1741-1747.pdf
tv_27_2020_6_1741-1747.pdftv_27_2020_6_1741-1747.pdf
tv_27_2020_6_1741-1747.pdfssuser50a5ec
 
Images Steganography using Pixel Value Difference and Histogram Analysis
Images Steganography using Pixel Value  Difference and Histogram AnalysisImages Steganography using Pixel Value  Difference and Histogram Analysis
Images Steganography using Pixel Value Difference and Histogram AnalysisNortheastern University
 
Frequency Domain Approach of Image Steganography
Frequency Domain Approach of Image SteganographyFrequency Domain Approach of Image Steganography
Frequency Domain Approach of Image SteganographyAM Publications,India
 
Review paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and SteganographyReview paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and Steganographyvivatechijri
 
Ijaems apr-2016-24 A Brief study on Steganography techniques Author(s):
Ijaems apr-2016-24 A Brief study on Steganography techniques Author(s): Ijaems apr-2016-24 A Brief study on Steganography techniques Author(s):
Ijaems apr-2016-24 A Brief study on Steganography techniques Author(s): INFOGAIN PUBLICATION
 
ASSOCIATION OF CRYPTOGRAPHY AND STEGANOGRAPHY
ASSOCIATION OF CRYPTOGRAPHY AND STEGANOGRAPHYASSOCIATION OF CRYPTOGRAPHY AND STEGANOGRAPHY
ASSOCIATION OF CRYPTOGRAPHY AND STEGANOGRAPHYAsia Smith
 
Resourceful and protected Biometric Image Stenography using Discrete Wavelet ...
Resourceful and protected Biometric Image Stenography using Discrete Wavelet ...Resourceful and protected Biometric Image Stenography using Discrete Wavelet ...
Resourceful and protected Biometric Image Stenography using Discrete Wavelet ...AM Publications
 
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...A Survey on Enhancement of Text Security Using Steganography and Cryptographi...
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...ijtsrd
 
Review On Encrypting and Decrypting Message Via Image Slicing
Review On Encrypting and Decrypting Message Via Image SlicingReview On Encrypting and Decrypting Message Via Image Slicing
Review On Encrypting and Decrypting Message Via Image SlicingIRJET Journal
 

Similar a Secure Data Encryption and Authentication using Visual Cryptography in the TSVEC Algorithm (20)

Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
Steganography Technique of Sending Random Passwords on Receiver’s Mobile (A N...
 
4.content (stenography)
4.content (stenography)4.content (stenography)
4.content (stenography)
 
Privacy Enhanced Online Payment System
Privacy Enhanced Online Payment SystemPrivacy Enhanced Online Payment System
Privacy Enhanced Online Payment System
 
Implementation of Steganographic Techniques and its Detection.
Implementation of Steganographic Techniques and its Detection.Implementation of Steganographic Techniques and its Detection.
Implementation of Steganographic Techniques and its Detection.
 
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
 
tv_27_2020_6_1741-1747.pdf
tv_27_2020_6_1741-1747.pdftv_27_2020_6_1741-1747.pdf
tv_27_2020_6_1741-1747.pdf
 
1.doc
1.doc1.doc
1.doc
 
Images Steganography using Pixel Value Difference and Histogram Analysis
Images Steganography using Pixel Value  Difference and Histogram AnalysisImages Steganography using Pixel Value  Difference and Histogram Analysis
Images Steganography using Pixel Value Difference and Histogram Analysis
 
Frequency Domain Approach of Image Steganography
Frequency Domain Approach of Image SteganographyFrequency Domain Approach of Image Steganography
Frequency Domain Approach of Image Steganography
 
Review paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and SteganographyReview paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and Steganography
 
Ci31560566
Ci31560566Ci31560566
Ci31560566
 
A SURVEY ON IMAGE STEGANOGRAPHY TYPES AND HIDING TECHNIQUES
A SURVEY ON IMAGE STEGANOGRAPHY TYPES AND HIDING  TECHNIQUES A SURVEY ON IMAGE STEGANOGRAPHY TYPES AND HIDING  TECHNIQUES
A SURVEY ON IMAGE STEGANOGRAPHY TYPES AND HIDING TECHNIQUES
 
Ijaems apr-2016-24 A Brief study on Steganography techniques Author(s):
Ijaems apr-2016-24 A Brief study on Steganography techniques Author(s): Ijaems apr-2016-24 A Brief study on Steganography techniques Author(s):
Ijaems apr-2016-24 A Brief study on Steganography techniques Author(s):
 
ASSOCIATION OF CRYPTOGRAPHY AND STEGANOGRAPHY
ASSOCIATION OF CRYPTOGRAPHY AND STEGANOGRAPHYASSOCIATION OF CRYPTOGRAPHY AND STEGANOGRAPHY
ASSOCIATION OF CRYPTOGRAPHY AND STEGANOGRAPHY
 
V9I1202028.pdf
V9I1202028.pdfV9I1202028.pdf
V9I1202028.pdf
 
Resourceful and protected Biometric Image Stenography using Discrete Wavelet ...
Resourceful and protected Biometric Image Stenography using Discrete Wavelet ...Resourceful and protected Biometric Image Stenography using Discrete Wavelet ...
Resourceful and protected Biometric Image Stenography using Discrete Wavelet ...
 
A05510105
A05510105A05510105
A05510105
 
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...A Survey on Enhancement of Text Security Using Steganography and Cryptographi...
A Survey on Enhancement of Text Security Using Steganography and Cryptographi...
 
Review On Encrypting and Decrypting Message Via Image Slicing
Review On Encrypting and Decrypting Message Via Image SlicingReview On Encrypting and Decrypting Message Via Image Slicing
Review On Encrypting and Decrypting Message Via Image Slicing
 
F1803023843
F1803023843F1803023843
F1803023843
 

Último

why-transparency-and-traceability-are-essential-for-sustainable-supply-chains...
why-transparency-and-traceability-are-essential-for-sustainable-supply-chains...why-transparency-and-traceability-are-essential-for-sustainable-supply-chains...
why-transparency-and-traceability-are-essential-for-sustainable-supply-chains...Jack Cole
 
English-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdf
English-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdfEnglish-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdf
English-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdfblazblazml
 
6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...
6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...
6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...Dr Arash Najmaei ( Phd., MBA, BSc)
 
DATA ANALYSIS using various data sets like shoping data set etc
DATA ANALYSIS using various data sets like shoping data set etcDATA ANALYSIS using various data sets like shoping data set etc
DATA ANALYSIS using various data sets like shoping data set etclalithasri22
 
Non Text Magic Studio Magic Design for Presentations L&P.pdf
Non Text Magic Studio Magic Design for Presentations L&P.pdfNon Text Magic Studio Magic Design for Presentations L&P.pdf
Non Text Magic Studio Magic Design for Presentations L&P.pdfPratikPatil591646
 
Statistics For Management by Richard I. Levin 8ed.pdf
Statistics For Management by Richard I. Levin 8ed.pdfStatistics For Management by Richard I. Levin 8ed.pdf
Statistics For Management by Richard I. Levin 8ed.pdfnikeshsingh56
 
IBEF report on the Insurance market in India
IBEF report on the Insurance market in IndiaIBEF report on the Insurance market in India
IBEF report on the Insurance market in IndiaManalVerma4
 
Presentation of project of business person who are success
Presentation of project of business person who are successPresentation of project of business person who are success
Presentation of project of business person who are successPratikSingh115843
 
Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...
Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...
Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...Boston Institute of Analytics
 
Decoding Movie Sentiments: Analyzing Reviews with Data Analysis model
Decoding Movie Sentiments: Analyzing Reviews with Data Analysis modelDecoding Movie Sentiments: Analyzing Reviews with Data Analysis model
Decoding Movie Sentiments: Analyzing Reviews with Data Analysis modelBoston Institute of Analytics
 
Role of Consumer Insights in business transformation
Role of Consumer Insights in business transformationRole of Consumer Insights in business transformation
Role of Consumer Insights in business transformationAnnie Melnic
 
Bank Loan Approval Analysis: A Comprehensive Data Analysis Project
Bank Loan Approval Analysis: A Comprehensive Data Analysis ProjectBank Loan Approval Analysis: A Comprehensive Data Analysis Project
Bank Loan Approval Analysis: A Comprehensive Data Analysis ProjectBoston Institute of Analytics
 
Digital Marketing Plan, how digital marketing works
Digital Marketing Plan, how digital marketing worksDigital Marketing Plan, how digital marketing works
Digital Marketing Plan, how digital marketing worksdeepakthakur548787
 
Digital Indonesia Report 2024 by We Are Social .pdf
Digital Indonesia Report 2024 by We Are Social .pdfDigital Indonesia Report 2024 by We Are Social .pdf
Digital Indonesia Report 2024 by We Are Social .pdfNicoChristianSunaryo
 

Último (17)

why-transparency-and-traceability-are-essential-for-sustainable-supply-chains...
why-transparency-and-traceability-are-essential-for-sustainable-supply-chains...why-transparency-and-traceability-are-essential-for-sustainable-supply-chains...
why-transparency-and-traceability-are-essential-for-sustainable-supply-chains...
 
English-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdf
English-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdfEnglish-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdf
English-8-Q4-W3-Synthesizing-Essential-Information-From-Various-Sources-1.pdf
 
6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...
6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...
6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...
 
DATA ANALYSIS using various data sets like shoping data set etc
DATA ANALYSIS using various data sets like shoping data set etcDATA ANALYSIS using various data sets like shoping data set etc
DATA ANALYSIS using various data sets like shoping data set etc
 
Non Text Magic Studio Magic Design for Presentations L&P.pdf
Non Text Magic Studio Magic Design for Presentations L&P.pdfNon Text Magic Studio Magic Design for Presentations L&P.pdf
Non Text Magic Studio Magic Design for Presentations L&P.pdf
 
Statistics For Management by Richard I. Levin 8ed.pdf
Statistics For Management by Richard I. Levin 8ed.pdfStatistics For Management by Richard I. Levin 8ed.pdf
Statistics For Management by Richard I. Levin 8ed.pdf
 
IBEF report on the Insurance market in India
IBEF report on the Insurance market in IndiaIBEF report on the Insurance market in India
IBEF report on the Insurance market in India
 
Insurance Churn Prediction Data Analysis Project
Insurance Churn Prediction Data Analysis ProjectInsurance Churn Prediction Data Analysis Project
Insurance Churn Prediction Data Analysis Project
 
Presentation of project of business person who are success
Presentation of project of business person who are successPresentation of project of business person who are success
Presentation of project of business person who are success
 
Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...
Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...
Data Analysis Project Presentation: Unveiling Your Ideal Customer, Bank Custo...
 
Decoding Movie Sentiments: Analyzing Reviews with Data Analysis model
Decoding Movie Sentiments: Analyzing Reviews with Data Analysis modelDecoding Movie Sentiments: Analyzing Reviews with Data Analysis model
Decoding Movie Sentiments: Analyzing Reviews with Data Analysis model
 
Role of Consumer Insights in business transformation
Role of Consumer Insights in business transformationRole of Consumer Insights in business transformation
Role of Consumer Insights in business transformation
 
Bank Loan Approval Analysis: A Comprehensive Data Analysis Project
Bank Loan Approval Analysis: A Comprehensive Data Analysis ProjectBank Loan Approval Analysis: A Comprehensive Data Analysis Project
Bank Loan Approval Analysis: A Comprehensive Data Analysis Project
 
2023 Survey Shows Dip in High School E-Cigarette Use
2023 Survey Shows Dip in High School E-Cigarette Use2023 Survey Shows Dip in High School E-Cigarette Use
2023 Survey Shows Dip in High School E-Cigarette Use
 
Data Analysis Project: Stroke Prediction
Data Analysis Project: Stroke PredictionData Analysis Project: Stroke Prediction
Data Analysis Project: Stroke Prediction
 
Digital Marketing Plan, how digital marketing works
Digital Marketing Plan, how digital marketing worksDigital Marketing Plan, how digital marketing works
Digital Marketing Plan, how digital marketing works
 
Digital Indonesia Report 2024 by We Are Social .pdf
Digital Indonesia Report 2024 by We Are Social .pdfDigital Indonesia Report 2024 by We Are Social .pdf
Digital Indonesia Report 2024 by We Are Social .pdf
 

Secure Data Encryption and Authentication using Visual Cryptography in the TSVEC Algorithm

  • 1. International Journal of Innovative Research in Information Security (IJIRIS) ISSN: 2349-7017(O) Issue 01, Volume 3 (January 2016) ISSN: 2349-7009(P) www.ijiris.com _______________________________________________________________________________________________________ IJIRIS- Impact Factor Value - ISEAJIF: 0.351 | Innospace SJIF: 1.695 © 2014-16, IJIRIS- All Rights Reserved Page -1 Secure Data Encryption and Authentication using Visual Cryptography in the TSVEC Algorithm G.Kanimozhi Assistant Professor, Department of computer science, Bharathidasan University Constituent College (W), Orathanadu, Thanjavur (Dt), Tamil Nadu, India Dr.A.Shaik Abul khadir, Associate Professor, Department of computer science, Khadir Mohideen College, Adirampattinam, Thanjavur (Dt), Tamil Nadu,India Abstract - In today’s nature transmitting message in a safe and protected miniature is difficult, especially when decidedly conscious message is involved. The system aspiration at suggested a methodology which employs dual stage of examination getting cryptography and steganography to cover the mysterious document message. The Visual cryptography system (VCS) is a protected mode that encoded a mysterious image into shares. The key design behind the suggested access deals with message hiding in image getting Zigzag scanning pattern which is more complex method Z2 H in steganography again encoded as shares by VC technique for hidden in separate cover images to present authentication for the VC shares which makes these mysterious shares invisible by hidden them into cover images getting TSVCE method. The mysterious shares generated from VC encryption are watermarked into some cover images getting digitized watermarking. Digitized watermarking is used for providing the dual examination of image shares. The share is embedded into the cover image getting Least Significant Bit Insertion Technique (LSB). The system presents more protected and meaningful mysterious shares that are robust against a total of attacks. The performance of the suggested system is evaluated getting peak signal to noise ratio (PSNR), histogram analysis and also numerical experimentation suggests that hidden time varies linearly with message length. The simulation results show that, the suggested system presents high stage of examination. Index Terms- Zigzag, Mysterious shares, Visual cryptography, Watermarking, Cover images. 1. INTRODUCTION Digitized machinery has leading immensely [1]. This has put forth lot of opportunities as well as challenges to protect the digitized content. Protected message transmission refers to confidential message being transferred over a protected carrier such that it is not infiltrated or intercepted by any other party other than the expected receiver. As machinery progresses more and more messages is digitized, there is even more emphasis required on message examination today than there has ever been. Protecting this message in a safe and protected way which does not impede the access of an authorized authority is an immensely difficult and very interesting research complication. Uncounted attempts have been made to solve this complication within the cryptographic center. Steganography is the art and science of encoding a mysterious message into an current communication carrier in such a way that only the sender and intended receiver are aware of its pronounce [1]. The ongoing development of computer and technologies presents an excellent new carrier for steganography. Images do not convey any significant message and they can be used to cover a mysterious message [2].Also, some pixels of the image can be modified to carry a small total of mysterious bits as small alteration (e.g. least significant bit of pixels) will not be noticeable to an unsuspecting user [2].One of the new approach in message examination modes is visual cryptography allow us to effectively share mysterious between a total of trusted parties [3] [4]. As with uncounted cryptographic arrangement, trust is the most difficult part. Visual cryptography presents a very powerful access by which one mysterious can be distributed into two or more shares [5].When the shares are superimposed exactly stable; the original mysterious can be discovered. A mysterious is something which is kept from the knowledge of any but the initiated or privileged. Mysterious sharing is a mode by which a mysterious can be distributed between factions of participant is allocated a piece of mysterious [6]. This piece of the mysterious is known as a share. The mysterious can be reconstructed when a sufficient total of shares are combined stable. While these shares are separate, no message about the mysterious can be accessed. That is shares are completely useless while they are separated. Pixel expansion and low contrast of the recovered image is the most important drawback in visual cryptography [7]. Watermarking is the access of hidden mysterious image into a cover image without affecting its perceptual quality so that mysterious image can be revealed by some process [8]. One significant improvement of watermarking is the inseparability of the watermark (mysterious image) from the cover image.
  • 2. International Journal of Innovative Research in Information Security (IJIRIS) ISSN: 2349-7017(O) Issue 01, Volume 3 (January 2016) ISSN: 2349-7009(P) www.ijiris.com _______________________________________________________________________________________________________ IJIRIS- Impact Factor Value - ISEAJIF: 0.351 | Innospace SJIF: 1.695 © 2014-16, IJIRIS- All Rights Reserved Page -2 Some of the vital characteristics of the watermark are hard to perceive, resists typical distortions, endures malevolent attacks, carries numerous bits of message, capable of coexisting with other watermarks, and demands little computation to insert and extract Watermarks [9]. Generally, robust watermarking is used to resist un-malicious or malicious attacks like scaling, cropping, loss squeeze, and so forth. Watermarking approach can be categorized into different types based on a total of ways. Watermarking can be divided into Non-blind, Semi-Blind and Blind arrangement based on the requisite for watermark extraction or detection [10]. Non-blind watermarking arrangement necessitates the original image and mysterious keys for watermark detection. The Semi-Blind arrangement require the mysterious keys and the watermark bit sequence for extraction, whereas, the Blind arrangement need only the mysterious keys for extraction. Another categorization of watermarks based on the embedded message (watermark) is: visible and invisible. With visible watermarking of images, a secondary image (the watermark) is embedded in a primary image in such that it is perceptible to a human observer, whereas the embedded message is not detectable in case of invisible watermarking; nevertheless, it can be extracted by a computer program. Pixel expansion and low comparison stage is the most important drawback in visual cryptography. In our suggested access these drawbacks are overcome by getting xor operation for stacking those shares and also present very strong stage of examination. Here our suggested system will add the merits of Steganography getting zigzag pattern, visual cryptography as well as Invisible and blind watermarking approach, where we will cover the message getting Steganography and generate the mysterious shares getting basic visual cryptography miniature and then we will watermark these shares into some cover images getting invisible watermarking. Thus the mysterious shares are protected from cheating attacks. The decryption will be same as in the visual cryptographic miniature i.e. by stacking of the shares after the mysterious shares have been extracted by a simple watermark extraction access. The experimental results have been demonstrated for efficiency of the suggested Invisible Watermarking system for Binary images. The remainder of this system is organized as follows: Section II presents a review of background and related work. In Section III, we introduce our suggested miniature with four phases with the simulated results and also the suggested miniature is evaluated by PSNR and histogram analysis. In Section IV, we show the results of an experiment that was performed to evaluate the performance of the suggested mode. 2. LITERATURE REVIEW A. Steganography: Steganography is the art of hiding messages inside unsuspicious medium. The purpose of steganography is to cover the existence of a message from a third party. Cryptography is widely used with steganography. A major drawback of cryptography is that the existence of the message is not hidden, whereas, steganography covers the existence of the message. Steganography works in two stages, hidden then extracting. During the hidden stage, a key is used to embed a message in a cover medium resulting in a hidden object. The hidden-object is then transmitted along public carriers to its destination. When the hidden-object is received, the embedded message is extracted from hidden-object getting the known hidden-key. steganalysis is the art of discovering and rendering useless such covert message. Its goal is to avoid drawing suspicion to the transmission of a hidden message. steganalysis contains two main issues: Detection and Distortion. Drawback of Steganography is if the key is known then the message can be retrieved easily. Therefore no examination for the encoded image. The encoded image can be protected by combining these steganography with visual cryptography and digitized watermarking. B. Visual Cryptography System Visual Cryptography (VC) was first introduced by Moni Noar and Shamir at Eurocrypt'94. In the above basic VC system each pixel 'p' of the mysterious image is encoded into a pair of sub pixels in each of the two shares [11]. If 'p' is white, one of the two columns under the white pixel in Fig. 1 is selected. If p is black, one of the two columns under the black pixel is selected. In each case, the selection is performed randomly such that each column has 50% probability to be chosen [12]. Then, the first two pairs of sub pixels in the selected column are assigned to share 1 and share 2, respectively. Since, in each share, p is encoded into a black white or white-black pair of sub pixels, an individual share gives no clue about the mysterious image. By stacking the two shares as shown in the last row of Fig. 1, if 'p' is white it always outputs one black and one white sub pixel, irrespective of which column of the sub pixel pairs is chosen during encryption. If 'p' is black, it outputs two black sub pixels. Anyone who holds only one share will not be able to reveal any message about the mysterious. Stacking both these transparencies will permit visual recovery of the mysterious. The pixel-expansion complication is a major drawback with most VCSs that use the VC-based access. The pixel-expansion complication affects the practicability of a VC system because it increases the storage and/or transmission costs. VCS access for GASs also suffers from the pixel-expansion complication [13]. When used standalone steganography and cryptography approach are vulnerable to attacks. Attacks on steganography and cryptography lead to detection and destruction of the mysterious message. Steganography attacks focus on detecting the changes in the cover that has been used to send the mysterious message. Cryptography attacks focus on de-scrambling the mysterious message. Examination breaches can be overcome when the improvements of both these approach are combined stable. Steganography methods applied on cryptography approach results into a robust system. The objective of getting two approaches in combination in the existed system is such that benefits of the two approaches can be combined and a more protected and robust system can be built.
  • 3. International Journal of Innovative Research in Information Security (IJIRIS) ISSN: 2349-7017(O) Issue 01, Volume 3 (January 2016) ISSN: 2349-7009(P) www.ijiris.com _______________________________________________________________________________________________________ IJIRIS- Impact Factor Value - ISEAJIF: 0.351 | Innospace SJIF: 1.695 © 2014-16, IJIRIS- All Rights Reserved Page -3 Three layers of examination are added to the mysterious message that is hidden in the video the first stage being arrangement of message in a random miniature that is the frame selection logic. If this stage of examination is broken still the steganography message has to be recovered and later the message has to be decrypted to obtain the original message. This makes it difficult to the attacker to obtain the mysterious message quickly and correctly. Figure .l. Visual Cryptography system Cryptography can be classified broadly into three main factions’ asymmetric encryption method, digitized signature and hash function [8].In asymmetric encryption methods two keys are used. Public key for encryption process and private key for decryption process. Digitized process is a mathematical access to check the authenticity of a digitized message. Digitized signatures prevent message from being tampered or forged. Hashing is only a one way mathematical function and hashed value is only a message digest of the message. An overview is presented in section II. The section III describes the suggested methodology. Section IV briefs about the methodic view and results. Section V illustrates about the performance evaluation and section VI describes the future work and the system is concluded. C. Digitized Watermarking A digitized watermark is a kind of marker covertly embedded in a noise-tolerant signal such as audio or image message. It is typically used to identify ownership of the copyright of such signal. "Watermarking" is the process of hiding digitized message in a carrier signal the hidden message should, but does not need to contain a relation to the carrier signal. Digitized watermarks may be used to verify the authenticity or integrity of the carrier signal or to show the identity of its owners. Digitized watermarking is the act of hiding a message related to a digitized signal (i.e. an image, song, and video) within the signal itself [14]. It is a concept closely related to steganography, in that they both cover a message inside a digitized signal. In this system the mysterious message has been hidden in image and then the shares have been generated by Visual Cryptography. VC system was used for generating shares. After that both shares were embedded into separate cover images with the help of invisible watermarking [15]. In this research, we existed an innovative Invisible system, applied to VC shares to protect them against cheating attacks by the adversaries. III. THE SUGGESTED MINIATURE A. Phases of Suggested Scheme This suggested miniature for protected the message communication getting steganography, visual cryptography which will use watermarking access to embed the generated shares into any cover image. The suggested access has tested getting various image size and message length with hidden time getting TSVCE method. Suggested system consists of four phases which are described in the following subsections. The performance is evaluated by getting peak to noise signal ratio (PSNR) and also by histogram of image before and after hidden. In our suggested system the histogram of the image before and after hidden will be same. Phase1- steganographic Access in this very first phase, the mysterious message is hidden getting steganographic access. The suggested access is based on the (Z2 H) Zigzag hiding sequence applied on binary images. Image would be divided into 8x8 blocks and in each pixel; message will be covered in zigzag manner. It presents more examination comparing to other hiding sequence. B. Z2 h (Zigzag Hiding) Method for Steganographic Technique Stride 1: Zigzag hiding sequence applied on binary images Input: 3 greyscale images Output: divided into 8x8 blocks and in each pixel Action: The hidden process starts from any pixel and covers the message in Z2 H pattern as the diagram illustrates. In suggested scanning sequence Z2 H sequence is used which is very complex so the hacker find it difficult to hack the message. The message is covered in Z2 H manner so the message covered path cannot be easily predicted by the hacker. The test images taken for system testing with various sizes End
  • 4. International Journal of Innovative Research in Information Security (IJIRIS) ISSN: 2349-7017(O) Issue 01, Volume 3 (January 2016) ISSN: 2349-7009(P) www.ijiris.com _______________________________________________________________________________________________________ IJIRIS- Impact Factor Value - ISEAJIF: 0.351 | Innospace SJIF: 1.695 © 2014-16, IJIRIS- All Rights Reserved Page -4 Figure.2. Zigzag Pattern TABLE 1: IMAGES IMAGE SIZE WIDTH HEIGHT 1 108KB 192 192 2 300KB 320 320 3 588KB 448 448 4 768KB 512 512 The hidden time for zigzag pattern IS shown with various message lengths in Table 2 Stride 2: the depth of the 3 dimensional Effect of message length on hidden time for zigzag pattern images Input: greyscale images Output: test images 1, 2, 3 and 4 by zigzag Action: established on the projection TABLE 2: HIDDEN TIME The above Table 2 shows different message lengths and hidden time in seconds for test images 1, 2, 3 and 4 by zigzag scanning pattern. For image 1 it was observed that the hidden process failed for message length of value 12KB or greater. Figure.3. Effect of message length on hidden time for zigzag pattern. End Stride 3: image and pixel size calculation Input: greyscale images Output: test images MESSAGE LENGTH HIDDEN TIME IMAGE 1 IMAGE 2 IMAGE 3 IMAGE 4 1KB 0.055 0.056 0.056 0.025 4KB 0.215 0.219 0.217 0.222 8KB 0.432 0.435 0.436 0.441 12KB 0.648 0.654 0.653 0.651 16KB 0.862 0.879 0.871 32KB 1.734 1.757 1.742 64KB 3.521 3.495 74KB 4.002 84KB 4.558 94KB 4.919
  • 5. International Journal of Innovative Research in Information Security (IJIRIS) ISSN: 2349-7017(O) Issue 01, Volume 3 (January 2016) ISSN: 2349-7009(P) www.ijiris.com _______________________________________________________________________________________________________ IJIRIS- Impact Factor Value - ISEAJIF: 0.351 | Innospace SJIF: 1.695 © 2014-16, IJIRIS- All Rights Reserved Page -5 Action: image size Ll xL2 pixels, it is possible to cover (LlxL2x3) bits So for an image size Ll xL2 pixels, it is possible to cover (LlxL2x3) bits, that is (LlxL2x3) / (8xl024) KB. From the above analysis it is clearly shown that, when the image size is smaller only less amount of message can be stored. When the image size increases the amount of message length stored can also be increased. End Larger the image, larger the message length can be stored. So, mostly large size of image is used for protected transmission of message where huge amount of message can be stored. The above Figure.3 shows the hidden time performance for Zigzag hiding sequence which is applied in four test images as function of message length. The result suggests that the hidden time varies linearly with the message length. For experimentation message taken and the binary image Fig.4. (a) Document with message length of 194 needs to cover (b) Message covered binary image with the message length of 194 and hidden time of 0.025737 seconds. C. Visual Cryptographic Encryption Getting TSVCE (Two Shares Visual Cryptographic Encryption) METHOD In this second phase they will do visual cryptography (VC) encryption. The message encoded image is generated as two shares by VC access. In our suggested system, VC share creation is performed. Stride 1: message encoded image is generated as two shares Input: encoded images Output: VC share Action: A white pixel is shared into two identical blocks of four sub pixels. A black pixel is shared into two complementary blocks of four sub pixels. All the pixels in the mysterious image are encoded similarly getting this system. End Stride 2: two shares are stacked stable Input: VC share Output: medium grey or completely black Action: When two shares are stacked stable, the result is either medium grey (which represents white) or completely black (which represents black). In general, a (k, and n) mysterious sharing system is a mode to share a mysterious K among n participants such that the following conditions hold. Any k participants stable can compute K. Any t participants, t < k, gain no message about K. Here is an example of a (2,2) mysterious sharing system. End Stride 3: two shares can be constructed Input: VC share Output: constructed Action: Assume that the mysterious K is a binary sequence of length m, i.e. K = (kp kz, "', km) the two shares, 8, and 82 can be constructed as follow. The first share is chosen to be a random binary sequence of length m, say 8, = (8",512,'" ,Slm ) 'Then, we can compute the second share by doing "exclusive or" on K and S1. S2i = ki EB S1i, i = l,···,m equation(l) 21 f II ' For example, assume that m = 2, k = (0, 1). Then the two shares can be constructed as follow: S1 = (0, 0), S2 = S1 EB K = (0, 1) S1 = (0, 1), S2 = S1, EB K = (0, 0) S1 = (1, 0), S2 = S1 EB K = (1, 1) S1 = (1, 1), S2 = S1, EB K = (1, 0) End However, looking only at one share, say SI' any four values of K is possible. In other words, it gains no message about K if another share S2 is unknown. Generally, the black-and white (2, 2) visual cryptography decomposes every pixel in a mysterious image into a 2x2 block in the two transparencies according to the rules in figure 1, two of them black and white. If pixel is white (black) one of the above six columns of figure 1 is chosen to generate Share 1 and Share 2.
  • 6. International Journal of Innovative Research in Information Security (IJIRIS) ISSN: 2349-7017(O) Issue 01, Volume 3 (January 2016) ISSN: 2349-7009(P) www.ijiris.com _______________________________________________________________________________________________________ IJIRIS- Impact Factor Value - ISEAJIF: 0.351 | Innospace SJIF: 1.695 © 2014-16, IJIRIS- All Rights Reserved Page -6 Figure.5. VC share D. Hiding The Shares Getting Digitized Watermarking: This phase embeds image shares into some cover images getting digitized watermarking. Result of this phase will be different meaningful shares consist some cover image. The shares generated by VC (2, 2) were hidden into the separate cover images by Least Significant Bit (LSB) insertion access. A digitized image consists of a matrix of color and intensity values. In a typical gray scale image, 8 bits per pixel are used [16]. In a typical full color image, there are 24 bits per pixel, 8bits assigned to each color components. Modulating the least-significant bit does not result in a human perceptible difference because the amplitude of the change is small. Improvement of LSB is its simplicity and uncounted approach uses these modes. LSB hidden also allows high perceptual transparency. LSB encoding is extremely conscious to any kind of filtering or manipulation of the watermarked image. One of the most common approaches used in watermarking is called least significant bit (LSB) insertion. The least significant bits of the cover-image are altered so that they form the embedded message [17]. The experimentation results for hiding shares into cover image were shown below. Fig.6. Cover image 1 before and after encoding with PSNR =55.9110 and corresponding histogram analysis. Figure.7. Cover image 2 before and after encoding with PSNR =55.9045 and corresponding histogram analysis. Thus share 1 embedded into the cover image 'Lena' and share2 in 'Baboon'.
  • 7. International Journal of Innovative Research in Information Security (IJIRIS) ISSN: 2349-7017(O) Issue 01, Volume 3 (January 2016) ISSN: 2349-7009(P) www.ijiris.com _______________________________________________________________________________________________________ IJIRIS- Impact Factor Value - ISEAJIF: 0.351 | Innospace SJIF: 1.695 © 2014-16, IJIRIS- All Rights Reserved Page -7 IV. PEKFORMANCE EVALUATION Peak signal to noise ratio (PSNR) is employed to measure the difference between the cover image and the watermarked image. PSNR can be calculated getting P, 'IiVR IOiop: .t MRSL is the maximum value the samples and MES is the mean error square. The evaluation of performance of any visual cryptography arrangement, which can done by considering the parameters such as PSNR (peak signal-to-noise ratio)PSNR is used to compare between the cover image and the watermarked image. It is measured in decibels (dB). It is used to assess the quality of the hidden image. If PSNR of gray scale image larger than 36 dB then the human cannot distinguish between the cover image and the watermarked image. PSNR results as shown below prove the visual quality of the image after hidden. TABLE 3 RESULTS SHARES COVER IMAGES PSNR % MSR % BER % SHARE 1 LENA 55.9110 0.09 1 SHARE 2 BABOON 55.9045 0.12 1 Histogram analysis can be used to evaluate the efficiency of the embedded method. If the histogram remains the same after the hidden, then the embedded method is efficient. Note that the histograms of the cover images and the watermarked images do not have any significant change. The stability of the watermarked images histograms means that the suggested system can resist the attacks and statistical changes. Histogram of original and the embedded image remains the same which prove efficiency of image before and after hidden in suggested system. Histogram of the two cover images are shown in figure A. Robustness to Attacks: To evaluate the robustness of the suggested mode, several attacks have been applied to the watermarked image and also to share 1 & 2. Fig.8 shows watermarked image and share 1 &2 under different attacks (a) (b) (c) (d) Figure 8. Watermarked Image 1 under different attacks. (a) Salt & Pepper Noise (PSNR = 9.S9db) (b) Comparison (PSNR =6.78db) (c) Luminance (PSNR=16.99 db) (d) Tamper (PSNR=12.S4 db) (a) (b) (c) (d) Fig 9.Share 1 under different (a) Salt & Pepper Noise (b) Contrast (c) Luminance (d) Tamper (a) (b) (c) (d) Figure.10. Watermarked Image 2 under different attacks. (a) Salt& Pepper Noise (PSNR = 10.69db) (b) Contrast (PSNR =9.78db) (c) Luminance (PSNR=I1.59 db) (d) Tamper (PSNR=19.43 db) (a) (b) (c) (d) Figure.11. Share 2 under different attacks. (a) Salt & Pepper Noise (b) Contrast (b) (c) Luminance (d) Tamper
  • 8. International Journal of Innovative Research in Information Security (IJIRIS) ISSN: 2349-7017(O) Issue 01, Volume 3 (January 2016) ISSN: 2349-7009(P) www.ijiris.com _______________________________________________________________________________________________________ IJIRIS- Impact Factor Value - ISEAJIF: 0.351 | Innospace SJIF: 1.695 © 2014-16, IJIRIS- All Rights Reserved Page -8 V. VISUAL CRYPTOGRAPHIC DECRYPTION: In this phase the binary watermarked shares extracted from the cover images. The suggested watermarking system doesn't necessitate the original image or any of its characteristics for the extraction of watermark, and hence the suggested system is blind. Then they apply the visual cryptographic decryption. It uses human visual system for decryption which is the core improvement for which visual cryptography was developed. Now they can decrypt the original mysterious image by overlapping or stacking the shares. Then the mysterious message has been recovered from the overlapped share getting length of the message as key. (a) (b) (c) Figure.12. (a) Recovered Share1 and Share2 b) Recovered image (c) Extracted message The message is extracted from the recovered image with message length of 194 as a key VI. EXPERIMENTAL RESULTS For simulation they have used MATLAB 7.0 tool and tested with images of different sizes as shown in Table 1. The mysterious image used for experimentation of steganography is the size of Test Image 4. The suggested system achieves effective embedment of the binary share images into the cover images. Also, the suggested system depicts efficient extraction of the embedded watermarks from the watermarked images. The watermarked images possess good Peak Signal to Noise Ratio (PSNR) and good visual quality. Fig. 4, S, 6, 7, 8, 9, 10, 11, 12depicts the results obtained on experimentation of the entire suggested Visual Cryptography system. The results include original mysterious image, encoded mysterious shares, cover image, watermarked images and the decoded mysterious image. VII. PERFORMANCE EVALUATION A. Less computational time The suggested system contains a frame selection logic which uses an index, hence retrieval of the mysterious message from then hidden -crypto message becomes easy and fast. Retrieval time for the decrypted message is 6.44 seconds for the implemented access. B. Decidedly protected Dual stage of examination is obtained by the use of steganography as well as cryptography. In addition to it there is a frame selection logic used which embeds the message in random frames, which becomes difficult to gauge. C. High availability Message is used widely across uncounted social networking sites and applications. The avi format used is also a well-known and frequently used format in videos. Thus the usage of video will not arouse any suspicion since they are commonly used these days. Confidential message can such as banking or military message can be transmitted across an unprotected communication carrier too, since it won’t gross attention. VIII. CONCLUSION In this work a general design of the suggested work was put forth in brief and a simple access was implemented to conduct an efficiency check of the suggested work. Currently the focus is restricted to one access. The suggested concept can be extended for several novel crypto-hidden approaches. A wide variety of combinations can be used to design more robust and efficient arrangement. Various approach can be compared and caparisoned to evaluate and analyze the best one with respect to message hiding capacity, visual perceptibility, efficient retrieval of message and uncounted more factors. Steganography and Watermarking is the current area of research where lot of scope exists. Currently the particular cryptographic access called Visual Cryptography is being used by several countries for mysteriously transfer of hand written documents, facial documents, document images, internet voting etc.
  • 9. International Journal of Innovative Research in Information Security (IJIRIS) ISSN: 2349-7017(O) Issue 01, Volume 3 (January 2016) ISSN: 2349-7009(P) www.ijiris.com _______________________________________________________________________________________________________ IJIRIS- Impact Factor Value - ISEAJIF: 0.351 | Innospace SJIF: 1.695 © 2014-16, IJIRIS- All Rights Reserved Page -9 Therefore combining these three phases of message hiding access present high stage of examination. The Zigzag hiding sequence was implemented which presents more examination than any other hiding sequence in Steganography. The result suggests that the hidden time varies linearly with the message length. In our suggested system the vulnerability of binary mysterious shares is overcome by hiding them invisibly into some cover images. During the decryption phase, the mysterious shares are extracted from their cover images. The overlapping f these shares reveal the original mysterious image from which the message has been decrypted getting message length as a key. Yet uncounted possible enhancements and extensions can be made to improve further. XI. FUTURE WORK: In future this miniature concept can be extended for several novel crypto-hidden approaches. A wide variety of combinations can be used to design more robust and efficient arrangement. Various approach can be compared and caparisoned to evaluate and analyze the best one with respect to message hiding capacity, visual perceptibility, efficient retrieval of message and uncounted more factors. REFERENCES [1]. Hassan Mathkour .Ghazy M. R. Assassa Abdulaziz AI Muharib Ibrahim Kiady" A Novel Approach for Hiding Messages in Images" 2009 International Conference on Signal Acquisition and Processing [2]. P. S. Revenkar, Anisa Anjum, W .Z. Gandhare "Survey of Visual Cryptography Schemes" International Journal of Security and Its Applications Vol. 4, No. 2, April, 2010 [3]. M.Naor and A. Shamir, 1995. Visual cryptography. Advances in Cryptology EUROCRYPT '94. Lecture Notes in Computer Science, (950): 1-12. [4]. Neelima. Guntupalli, Mr: P. D. Ratna Raju, Mr.Suresh cheekaty "An Introduction to Different Types of Visual Cryptography Schemes" International Journal of Science and Advanced Technology Volume I No 7 September 2011. [5]. B Surekha , Dr GN Swamy , Dr K Srinivasa Rao , A Ravi Kumar "A Watermarking Technique based on Visual Cryptography" Journal of Information Assurance and Security 4 (2009) [6]. Saleh Saraireh "A Secure Data Communication System using Cryptography and Steganography" International Journal of Computer Networks & Communications (IJCNC) Vo1.5, No.3, May 2013. [7]. Chih-Ming Hu and Wen-Guey Tzeng "Cheating Prevention in Visual Cryptography" IEEE transactions on image processing, vol. 16, no. I, january 2007. [8]. Zhi-hui Wang, Chin-Chen Chang, Huynh Ngoc Tu, Ming-Chu Li: "Sharing a Secret Image in Binary Images with Verification" Journal of Information Hiding and Multimedia Signal Processing 2011 ISSN 2073-4212 Volume 2, Number 1, January 2011 [9]. Ravindra Gupta, Akanksha Jain, Gajendra Singh "Combine use of Steganography and Visual Cryptography for Secured Data hiding in Computer Forensics" International Journal of Computer Science and Information Technologies, Vol. 3 (3) , 2012,4366 - 4370 [10]. Zhi Zhou, Gonzalo R. Arce, and Giovanni Di Crescenzo "Halftone Visual Cryptography" IEEE transactions on image processing, VOL. 15, NO. 8, AUGUST 2006 2441 [11]. C. M. Hu and W. G. Tzeng, "Cheating prevention in visual cryptography," IEEE Transactions on Image Processing, vol. 16, no. I, pp. 36-45, 2007. [12]. Sian-Jheng Lin and Wei-Ho Chung "A Probabilistic Model of Visual Cryptography Scheme With Dynamic Group" IEEE transactions on information forensics and security, vol. 7, no. 1, february 2012 [13]. P. F. Tsai and M. S. Wang, "An (3,3)-visual secret sharing scheme for hiding three secret data," Proceedings of the 2006 Joint Conference on Information Sciences, 2006. [14]. Jen-Bang Fenga, Hsien-Chu Wub, Chwei-Shyong Tsaic, Ya-Fen Changb, Yen-Ping Chud, "Visual secret sharing for mUltiple secrets," Pattern Recognition, vol. 40, pp. 3633-3651, 2007. [15]. Nazanin Askari, Cecilia Moloney, H.M. Heys "A Novel Visual Secret Sharing Scheme without Image Size Expansion. " [16]. Y.Bani, Dr.B. Majhi and R. S. Mangrulkar, 2008. “A Novel Approach for Visual Cryptography Using a Watermarking Technique”. In Proceedings of 2nd National Conference, IndiaCom 2008. Computing for national development, February 08-09, New Delhi. [17]. Jagdeep Verma, Dr.Vineeta Khemchandani "A Visual Cryptographic Technique to Secure Image Shares" International Journal of Engineering Research and Applications Vol. 2, Issue I, Jan-Feb 2012, pp. 1121-1125 [18]. A. Markman and B. Javidi. Full-phase photon-counting double-random-phase encryption. J. Opt. Soc. Am. A, 31(2):394– 403, 2014. [19]. M.S.Millan and E.P´erez-Cabr´e. Optical data encryption. In Optical and Digital Image Processing: Fundamentals and Applications, pages 739–767. Wiley-VCH Verlag GmbH & Co., 2011. [20]. E. Perez-Cabre, H. C. Abril, M. S. Mill an, and B. Javidi. Photon-counting double-random-phase encoding for secure image verification and retrieval. J.Opt., 14(9):094001, 2012.