SlideShare una empresa de Scribd logo
1 de 4
Descargar para leer sin conexión
S.Premkumar et al. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 4( Version 5), April 2014, pp.103-106
www.ijera.com 103 | P a g e
Optimal Contrast Grayscale Visual Cryptography with Modified
Multi-secret Sharing for Secure Application
S.Premkumar*, R.Swathiramya**
*AP/CSE, Sri Ramakrishna Engineering College, Coimbatore, Tamil Nadu.
**AP/CSE, Christ the King Engineering College, Coimbatore, Tamil Nadu.
ABSTRACT
Core banking is a set of services provided by a group of networked bank branches. Bank customers may access
their funds and perform other simple transactions from any of the member branch offices. The major issue in
core banking is the authenticity of the customer. Due to unavoidable hackingof the databases on the internet, it
is always quite difficult totrust the information on the internet. To solve this problemof authentication, we are
proposing an algorithm based onimage processing, improved steganography and visual cryptography.
This paper proposes a technique of encode the password of a customer by improved Steganography, most of the
steganographic techniques use either three or four adjacent pixels around a target pixel whereas the proposed
technique is able to utilize at most all eight adjacent neighbors so that imperceptibility value grows bigger.and
thendividing it into shares. Total number of shares to be created isdepending on the scheme chosen by the bank.
When two sharesare created, one is stored in the Bank database and the otheris kept by the customer. The
customer has to present the shareduring all of his transactions. This share is stacked with the firstshare to get the
original image. Then decoding method issued to take the hidden password on acceptance or rejection of the
output and authenticates the customer.
Keywords: Digital Image steganography, visual cryptography, Gray Scale, Secret Sharing
I. INTRODUCTION
Today, most applications are only as secure
as theirunderlying system. Since the design and
technology of middleware has improved steadily,
their detection is a difficultproblem. As a result, it is
nearly impossible to be surewhether a computer that
is connected to the internet canbe considered
trustworthy and secure or not. The questionis how
tohandle applications that require a high level
ofsecurity, such as core banking and internet banking.
In a core banking system, there is a chance
of encounteringforged signature for transaction. And
in the net bankingsystem, the password of customer
may be hacked and misused.Thus security is still a
challenge in these applications. Here, we propose a
technique to secure the customer informationand to
prevent the possible forgery of password hacking.
The concept of image processing, an
improved steganography and visual cryptography is
used. Image processing is a technique ofprocessing
an input image and to get the output as either
improved form of the same image and/or
characteristics ofthe input image. Visual
Cryptography (VC) is amethod ofencrypting a secret
image into shares such that stacking a sufficient
number of shares reveals the secret image. Naor and
Shamir [1] introduced a simple but perfectlysecure
way that allows secret sharing without
anycryptographic computation, termed as Visual
CryptographyScheme (VCS). Basically, Visual
Cryptography Scheme isan encryption method that
uses combinatorial techniques toencode secret written
materials. The idea is to convert thewritten material
into an image and encode this image into nshadow
images. The decoding requires only selecting
somesubset of these n images, making transparencies
of them, andstacking them on top of each other.The
simplest Visual Cryptography Scheme is given bythe
following setup. A secret image consists of a
collectionof black and white pixels where each pixel
is treatedindependently. To encode the secret image,
we split theoriginal image into n modified versions
(referred as shares) such that each pixel in a share
now subdivides into n blackand white sub-pixels. To
decode the image, a subset S of thosen shares are
picked and copied on separate transparencies. IfS are
a qualified subset, and then stacking all these
transparencieswill allows visual recovery of the
secret.
Most of the steganographic methods
consider human vision sensitivity as an essential
factor [4] so that the very existence of the secret bits
could not be revealed by any third party. One of the
RESEARCH ARTICLE OPEN ACCESS
S.Premkumar et al. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 4( Version 5), April 2014, pp.103-106
www.ijera.com 104 | P a g e
methods to achieve this is hiding the secret
information in the edges rather than the smooth areas
of a cover image. A method namely Multiple Base
Notational Systems (MBNS) considers the edge areas
of a cover image while re-expressing the secret bits in
multiple base notational systems [3]. Using this
technique MBNS adds more security. Furthermore
MBNS proposes a walk path through the cover image
which is not a row by row selection of target pixels.
MBNS method owns the best values in terms of
performance and quality metrics in comparison with
bit-plane complexity segmentation method (BPCS)
[5] and pixel value differencing (PVD)
This paper is organized as follows: Section
II deals withthe related work and Section III presents
the architecture andmodel. Section IV is about the
problem definition and the implementation of the
proposed algorithm and the performance analysis.
Section V contains the conclusions.
II. RELATED WORK
A brief survey of the related work in the
area of visualcryptography and its application in
banking sector ispresented in this section. Visual
cryptography schemes wereindependently introduced
by Shamir [2] and Blakley [3], and their original
motivation was to safeguard cryptographic keysfrom
loss. These schemes also have been widely employed
inthe construction of several types of cryptographic
protocols [4] and consequently, they have many
applications in differentareas such as access control,
opening a bank vault, openinga safety deposit box, or
even launching of missiles. Asegment-based visual
cryptography suggested by Borchert [5]can be used
only to encrypt the messages containing
symbols,especially numbers like bank account
number, amount etc.,
Cryptography and steganography are
cousins in the spy craft family: the former scrambles
a message so it cannot be understood; the latter hides
the message so it cannot be seen. A cipher message,
for instance, might arouse suspicion on the part of the
recipient while an invisible message created with
steganographic methods will not. In fact,
steganography can be useful when the use of
cryptography is forbidden: where cryptography and
strong encryption are outlawed, Steganography can
circumvent such policies to pass message covertly.
However, steganography and cryptography differ in
the way they are evaluated: Steganography fails when
the ”enemy” is able to access the content of the
cipher message, while cryptography fails when the
”enemy” detects that there is a secret message present
in the steganographic medium. The disciplines that
study techniques for deciphering cipher messages and
detecting hide messages are called cryptanalysis and
steganalysis. The former denotes the set of methods
for obtaining the meaning of encrypted information,
while the latter is the art of discovering covert
messages.
The aim of this paper is to describe a
method forintegrating together cryptography and
Steganography through image processing. In
particular, we present asystem able to perform
steganography and cryptographyat the same time. We
will show such system is an effective steganographic
and is also a theoretically unbreakable cryptography.
Two main issues are considered when using
the algorithm. The first issue is imperceptibility
which is the visibility of the secret information to the
human eyes. The second issue is capacity, i.e.,
amount of secret information that can be concealed in
the cover image.
In this paper the main focus is to present an
improvement made in terms of imperceptibility in
comparison with MBNS method. The proposed
method utilizes the same probability parameter to
scatter secret bits as in [9] and considers the
maximum number of surrounding pixels to achieve
the capacity of every target pixel.
The adjustment technique is discussed in
Section III. The proposed algorithm is explained step
by step in Section IV. Finally in Section V, the
desired conclusion is made based on the results
achieved.
III. ADJUSTMENT TECHNIQUE
Once a fraction of secret information is
embedded, thetarget pixel value is to be adjusted
using a kind of processwhose duty is to find the
closest gray-scale value to theoriginal value of the
target pixel so that the differencebetween the original
and modified value of a target pixelbecomes smaller.
Smaller amount of difference makes imagedistortion
become smaller as well. In terms of imperceptibility,
the value of a famous quality metric calledPeak
Signal to Noise Ratio (PSNR) grows larger as
imagedistortion gets smaller. A higher PSNR value is
regarded asan enhancement in imperceptibility and
vice versa. Thereforethe adjustment procedure can
improve the quality of the stego-image. The
adjustment procedure is as follows:
If a target pixel value is changed after
embedding, two other pixel values will be generated
by flipping the (K + 1)th
bit of the pixel Pi’{ as
follows:
where variable Pi’ is the modified value of a
target pixel i called Pi' Pi is already allowed to carry
K bits of secret information in the first K least
significant bits (K > 0). In case of finding either a
value more than 255 for a negative value for P-’, they
should be replaced with Pi.
S.Premkumar et al. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 4( Version 5), April 2014, pp.103-106
www.ijera.com 105 | P a g e
IV. ALGORITHM
The step by step embedding phase is as follows:
1. Input a secret key SK in order to find the
desired target pixels in a pseudo random
way in the secret area. A cover image
consists of two areas such as secret area and
embedding area. The secret area comprises
of the top-most row and the left-most
column of the cover image while the
embedding area consists of all the pixels
other than the reserved pixels located in the
secret area. Secret information will be
embedded in embedding area.
2. Input SN as a pseudo random number
generator seed number to make a pseudo
random selection of the target pixels located
in the embedding area. Note that both SK
and SN are seed numbers that initialize two
pseudo random number generators (PRNG).
3. Let P, PL, M and N be the cover image,
secret information size (in bits) and the
number of rows and columns of the cover
image respectively.
4. Assign the best value to the variable Mb,
which is the maximum number of bits
allowed to be embedded in a target pixel.
The initial value for Mb will be the
minimum Mb value.
5. Calculate the probability value and the
desired pseudo random numbers as below:
6. Choose the desired target pixels located in
the embedding area as follows:
7. Determine Dynamic Capacity for P(i,j) that
is the number of bits can be embedded in a
target pixel using the available surrounding
neighbors. Thus the Dynamic Capacity for a
target pixel can be calculated as follows:
8. Adjust the value of each target pixel using
adjustment technique in order to find the
closest candidate to the original value of the
target pixel. Bydoing this, the target pixel
value will be replaced with the closest
candidate and it results in anincrease in
PSNR value.
9. The embedding process needs SK shared by
both the sender and the receiver in order to
find the coordinates of the target pixels in
the secret area. Simple LSB insertion
method is applied for embedding the secret
parameters inside the secret area using one
LSB of each target pixel selected using SK
as in Step 1.
The modified cover-image is called stego image.
In order to recover secret information from the stego
image, the receiver is expected to know SK so as to
extract the rest of secret parameters. Knowing SK,
the secret parameters can be extracted easily. The
extraction procedure is as follows:
1. Extract secret parameters using SK.
2. Generate random numbers.
3. Choose the desired target pixels.
4. Compute the DynamicCapacity number
of a target pixel.
5. Extract the secret information from a
target pixelusing the corresponding
DynamicCapacity.
6. If the amount of bits extracted equals to
PL, thewhole secret information is
achieved by puttingtogether all the
extracted bits.
V. CONCLUSION
An improved steganography improves
imperceptibility in comparison with MBNS
method for the main reasons. The reason is that
reason is that AMSPU discovers more
surrounding pixels rather than utilizing four
adjacent neighbors. Fixed neighbors are
modified in previous steps so that they cause an
increasingly image distortion whereas the rest of
unselected neighbors still keep their original gray
scale values by the end of embedding process.
By using unselected neighbors as well as fixed
neighbors, every Dynamic Capacity value can be
estimated more precisely and also image
distortion will be decreased.
REFERENCES
[I] F. A. P. Petitcolas, R. J. Anderson and M. G.
Kuhn, "Information hiding-A survey," Proc.
IEEE, vol. 87, pp. 1062-1078,1999.
[2] H. Wang and S. Wang, "Cyber warfare-
Steganography vs. Steganalysis,"
Commun.ACM, vol. 47, no. 10, pp. 76-82,
2004.
[3] X. Zhang and S. Wang, "Steganography
using multiplebase notational system and
human vision sensitivity," IEEE Signal
Processing Letters, vol. 12, pp. 67-70, Jan.
2005.
[4] M. Kutter and S. Winkler, "A vision-based
masking model for spread- spectrum image
watermarking," IEEE Trans. Image
Processing, vol. II,pp. 16-25, Jan. 2002.
S.Premkumar et al. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 4( Version 5), April 2014, pp.103-106
www.ijera.com 106 | P a g e
[5] H. Noda, J. Spaulding, M. N. Shirazi, and E.
Kawaguchi, "Application of bit-plane
decomposition steganography to JPEG2000
encoded images," IEEE Signal Processing
Lett., vol. 9, no. 12, pp. 410-413, Dec. 2002.
[6] D.-C. Wu and W.-H.Tsai, "A steganographic
method for images by pixel-value
differencing," Pattern Recognit.Lett., vol. 24,
pp. 1613-1626,2003.
[7] C. K. Chan and L. M. Cheng, "Hiding data in
images by simple LSB substitution," Pattern
Recognition, pp. 469--474, Mar. 2004.
[8] O. Kurtuldu and N. Arica, "A new
steganography method using image layers,"
in Computer and Information Sciences,
2008.ISCIS '08. 23rd International
Symposium on, 2008, pp. 1-4.
[9] J. Mielikainen, "LSB matching revisited,"
Signal Processing Letters, IEEE, vol. 13, pp.
285-287, 2006.
[10] L. Xiangyang, L. Bin, L. Fenlin, "A Dynamic
Compensation LSB Steganography Resisting
RS Steganalysis," in SoutheastCon, 2006.
Proceedings of the IEEE, 2006, pp. 244-249.
[11] Provos, N. (2001). Scanning USENET for
Steganography.from
http://niels.xtdnet.nl/stego/usenet.php
[12] M. Shirali-Shahreza, "Steganography in
MMS," in Multitopic Conference, 2007.
INMIC 2007. IEEE International, 2007, pp.
1-4.
[13] C. Chin-Chen and L. Iuon-Chang, "A new (t,
n) threshold image hiding scheme for sharing
a secret color image," in Communication
Technology Proceedings, 2003.ICCT 2003.
International Conference on, 2003, pp. 196-
202 vol.1.

Más contenido relacionado

La actualidad más candente

A Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and SteganographyA Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and SteganographyIJCNCJournal
 
A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...ijsptm
 
Hungarian-Puzzled Text with Dynamic Quadratic Embedding Steganography
Hungarian-Puzzled Text with Dynamic Quadratic Embedding SteganographyHungarian-Puzzled Text with Dynamic Quadratic Embedding Steganography
Hungarian-Puzzled Text with Dynamic Quadratic Embedding SteganographyIJECEIAES
 
High Capacity and Security Steganography Using Discrete Wavelet Transform
High Capacity and Security Steganography Using Discrete Wavelet TransformHigh Capacity and Security Steganography Using Discrete Wavelet Transform
High Capacity and Security Steganography Using Discrete Wavelet TransformCSCJournals
 
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITION
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITIONDUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITION
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITIONIJNSA Journal
 
Unified Approach With Neural Network for Authentication, Security and Compres...
Unified Approach With Neural Network for Authentication, Security and Compres...Unified Approach With Neural Network for Authentication, Security and Compres...
Unified Approach With Neural Network for Authentication, Security and Compres...CSCJournals
 
TWO PHASE CLANDESTAIN IMAGE ENCRYPTION
TWO PHASE CLANDESTAIN IMAGE ENCRYPTION TWO PHASE CLANDESTAIN IMAGE ENCRYPTION
TWO PHASE CLANDESTAIN IMAGE ENCRYPTION acijjournal
 
Image encryption approach for security issues
Image encryption approach for security issuesImage encryption approach for security issues
Image encryption approach for security issuesIAEME Publication
 
Secure Data Hiding System by using AES Algorithm and Indicator Based LSB Method
Secure Data Hiding System by using AES Algorithm and Indicator Based LSB MethodSecure Data Hiding System by using AES Algorithm and Indicator Based LSB Method
Secure Data Hiding System by using AES Algorithm and Indicator Based LSB Methodijtsrd
 
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...IRJET Journal
 
Survey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular FormSurvey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular Formijsrd.com
 
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...Design and Implementation of Data Hiding Technique by Using MPEG Video with C...
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...Editor IJMTER
 
Genetic Algorithm based Mosaic Image Steganography for Enhanced Security
Genetic Algorithm based Mosaic Image Steganography for Enhanced SecurityGenetic Algorithm based Mosaic Image Steganography for Enhanced Security
Genetic Algorithm based Mosaic Image Steganography for Enhanced SecurityIDES Editor
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 

La actualidad más candente (17)

A Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and SteganographyA Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and Steganography
 
T0 numtq0nju=
T0 numtq0nju=T0 numtq0nju=
T0 numtq0nju=
 
A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...
 
Hungarian-Puzzled Text with Dynamic Quadratic Embedding Steganography
Hungarian-Puzzled Text with Dynamic Quadratic Embedding SteganographyHungarian-Puzzled Text with Dynamic Quadratic Embedding Steganography
Hungarian-Puzzled Text with Dynamic Quadratic Embedding Steganography
 
High Capacity and Security Steganography Using Discrete Wavelet Transform
High Capacity and Security Steganography Using Discrete Wavelet TransformHigh Capacity and Security Steganography Using Discrete Wavelet Transform
High Capacity and Security Steganography Using Discrete Wavelet Transform
 
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITION
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITIONDUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITION
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITION
 
Unified Approach With Neural Network for Authentication, Security and Compres...
Unified Approach With Neural Network for Authentication, Security and Compres...Unified Approach With Neural Network for Authentication, Security and Compres...
Unified Approach With Neural Network for Authentication, Security and Compres...
 
TWO PHASE CLANDESTAIN IMAGE ENCRYPTION
TWO PHASE CLANDESTAIN IMAGE ENCRYPTION TWO PHASE CLANDESTAIN IMAGE ENCRYPTION
TWO PHASE CLANDESTAIN IMAGE ENCRYPTION
 
K0815660
K0815660K0815660
K0815660
 
Image encryption approach for security issues
Image encryption approach for security issuesImage encryption approach for security issues
Image encryption approach for security issues
 
PVD BASED STEGNO.
PVD BASED STEGNO.PVD BASED STEGNO.
PVD BASED STEGNO.
 
Secure Data Hiding System by using AES Algorithm and Indicator Based LSB Method
Secure Data Hiding System by using AES Algorithm and Indicator Based LSB MethodSecure Data Hiding System by using AES Algorithm and Indicator Based LSB Method
Secure Data Hiding System by using AES Algorithm and Indicator Based LSB Method
 
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
 
Survey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular FormSurvey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular Form
 
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...Design and Implementation of Data Hiding Technique by Using MPEG Video with C...
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...
 
Genetic Algorithm based Mosaic Image Steganography for Enhanced Security
Genetic Algorithm based Mosaic Image Steganography for Enhanced SecurityGenetic Algorithm based Mosaic Image Steganography for Enhanced Security
Genetic Algorithm based Mosaic Image Steganography for Enhanced Security
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 

Destacado

Thermo catalytic decomposition of methane over Pd/AC and Pd/CB catalysts for ...
Thermo catalytic decomposition of methane over Pd/AC and Pd/CB catalysts for ...Thermo catalytic decomposition of methane over Pd/AC and Pd/CB catalysts for ...
Thermo catalytic decomposition of methane over Pd/AC and Pd/CB catalysts for ...IJERA Editor
 
Review on Identify Kin Relationship Technique in Image
Review on Identify Kin Relationship Technique in ImageReview on Identify Kin Relationship Technique in Image
Review on Identify Kin Relationship Technique in ImageIJERA Editor
 
Electroelastic Response of a Piezoelectric Semi-infinite Body with D∞ Symmetr...
Electroelastic Response of a Piezoelectric Semi-infinite Body with D∞ Symmetr...Electroelastic Response of a Piezoelectric Semi-infinite Body with D∞ Symmetr...
Electroelastic Response of a Piezoelectric Semi-infinite Body with D∞ Symmetr...IJERA Editor
 
Preprocessing and Classification in WEKA Using Different Classifiers
Preprocessing and Classification in WEKA Using Different ClassifiersPreprocessing and Classification in WEKA Using Different Classifiers
Preprocessing and Classification in WEKA Using Different ClassifiersIJERA Editor
 
Brain Fingerprinting Technology
Brain Fingerprinting TechnologyBrain Fingerprinting Technology
Brain Fingerprinting TechnologyIJERA Editor
 
Improved Low Voltage High Speed FVF Based Current Comparator with Logical Eff...
Improved Low Voltage High Speed FVF Based Current Comparator with Logical Eff...Improved Low Voltage High Speed FVF Based Current Comparator with Logical Eff...
Improved Low Voltage High Speed FVF Based Current Comparator with Logical Eff...IJERA Editor
 
Investigation on Divergent Exit Curvature Effect on Nozzle Pressure Ratio of ...
Investigation on Divergent Exit Curvature Effect on Nozzle Pressure Ratio of ...Investigation on Divergent Exit Curvature Effect on Nozzle Pressure Ratio of ...
Investigation on Divergent Exit Curvature Effect on Nozzle Pressure Ratio of ...IJERA Editor
 
An Automated Input Data Management Approach for Discrete Event Simulation App...
An Automated Input Data Management Approach for Discrete Event Simulation App...An Automated Input Data Management Approach for Discrete Event Simulation App...
An Automated Input Data Management Approach for Discrete Event Simulation App...IJERA Editor
 
Fixed points of contractive and Geraghty contraction mappings under the influ...
Fixed points of contractive and Geraghty contraction mappings under the influ...Fixed points of contractive and Geraghty contraction mappings under the influ...
Fixed points of contractive and Geraghty contraction mappings under the influ...IJERA Editor
 

Destacado (20)

Thermo catalytic decomposition of methane over Pd/AC and Pd/CB catalysts for ...
Thermo catalytic decomposition of methane over Pd/AC and Pd/CB catalysts for ...Thermo catalytic decomposition of methane over Pd/AC and Pd/CB catalysts for ...
Thermo catalytic decomposition of methane over Pd/AC and Pd/CB catalysts for ...
 
U04405117121
U04405117121U04405117121
U04405117121
 
B43040610
B43040610B43040610
B43040610
 
G0443640
G0443640G0443640
G0443640
 
F044043741
F044043741F044043741
F044043741
 
Review on Identify Kin Relationship Technique in Image
Review on Identify Kin Relationship Technique in ImageReview on Identify Kin Relationship Technique in Image
Review on Identify Kin Relationship Technique in Image
 
I045075155
I045075155I045075155
I045075155
 
O44097379
O44097379O44097379
O44097379
 
R0450697101
R0450697101R0450697101
R0450697101
 
W4502140150
W4502140150W4502140150
W4502140150
 
Electroelastic Response of a Piezoelectric Semi-infinite Body with D∞ Symmetr...
Electroelastic Response of a Piezoelectric Semi-infinite Body with D∞ Symmetr...Electroelastic Response of a Piezoelectric Semi-infinite Body with D∞ Symmetr...
Electroelastic Response of a Piezoelectric Semi-infinite Body with D∞ Symmetr...
 
Bu4201474480
Bu4201474480Bu4201474480
Bu4201474480
 
Preprocessing and Classification in WEKA Using Different Classifiers
Preprocessing and Classification in WEKA Using Different ClassifiersPreprocessing and Classification in WEKA Using Different Classifiers
Preprocessing and Classification in WEKA Using Different Classifiers
 
F045033440
F045033440F045033440
F045033440
 
J44085557
J44085557J44085557
J44085557
 
Brain Fingerprinting Technology
Brain Fingerprinting TechnologyBrain Fingerprinting Technology
Brain Fingerprinting Technology
 
Improved Low Voltage High Speed FVF Based Current Comparator with Logical Eff...
Improved Low Voltage High Speed FVF Based Current Comparator with Logical Eff...Improved Low Voltage High Speed FVF Based Current Comparator with Logical Eff...
Improved Low Voltage High Speed FVF Based Current Comparator with Logical Eff...
 
Investigation on Divergent Exit Curvature Effect on Nozzle Pressure Ratio of ...
Investigation on Divergent Exit Curvature Effect on Nozzle Pressure Ratio of ...Investigation on Divergent Exit Curvature Effect on Nozzle Pressure Ratio of ...
Investigation on Divergent Exit Curvature Effect on Nozzle Pressure Ratio of ...
 
An Automated Input Data Management Approach for Discrete Event Simulation App...
An Automated Input Data Management Approach for Discrete Event Simulation App...An Automated Input Data Management Approach for Discrete Event Simulation App...
An Automated Input Data Management Approach for Discrete Event Simulation App...
 
Fixed points of contractive and Geraghty contraction mappings under the influ...
Fixed points of contractive and Geraghty contraction mappings under the influ...Fixed points of contractive and Geraghty contraction mappings under the influ...
Fixed points of contractive and Geraghty contraction mappings under the influ...
 

Similar a R04405103106

MESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHYMESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHYIRJET Journal
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...IDES Editor
 
Image Steganography With Encryption
Image Steganography With EncryptionImage Steganography With Encryption
Image Steganography With Encryptionvaishali kataria
 
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...IRJET Journal
 
Transmission of cryptic text using rotational visual cryptography
Transmission of cryptic text using rotational visual cryptographyTransmission of cryptic text using rotational visual cryptography
Transmission of cryptic text using rotational visual cryptographyeSAT Journals
 
Transmission of cryptic text using rotational visual
Transmission of cryptic text using rotational visualTransmission of cryptic text using rotational visual
Transmission of cryptic text using rotational visualeSAT Publishing House
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansionSreeda Perikamana
 
Implementation of Image Steganography in Image by using FMM nested with LSB S...
Implementation of Image Steganography in Image by using FMM nested with LSB S...Implementation of Image Steganography in Image by using FMM nested with LSB S...
Implementation of Image Steganography in Image by using FMM nested with LSB S...Praneeta Dehare
 
Review On Encrypting and Decrypting Message Via Image Slicing
Review On Encrypting and Decrypting Message Via Image SlicingReview On Encrypting and Decrypting Message Via Image Slicing
Review On Encrypting and Decrypting Message Via Image SlicingIRJET Journal
 
An Architectural Approach of Data Hiding In Images Using Mobile Communication
An Architectural Approach of Data Hiding In Images Using Mobile CommunicationAn Architectural Approach of Data Hiding In Images Using Mobile Communication
An Architectural Approach of Data Hiding In Images Using Mobile Communicationiosrjce
 
Image Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime PixelsImage Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime Pixelsmuhammed jassim k
 
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEMEDESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEMEIJNSA Journal
 
RSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT ApproachRSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT ApproachIJERA Editor
 
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY IJCNCJournal
 
SECURE E-BANKING APPLICATION BASED ON VISUAL CRYPTOGRAPHY
SECURE E-BANKING APPLICATION BASED ON VISUAL CRYPTOGRAPHYSECURE E-BANKING APPLICATION BASED ON VISUAL CRYPTOGRAPHY
SECURE E-BANKING APPLICATION BASED ON VISUAL CRYPTOGRAPHYIRJET Journal
 
Review on Implementation Visual Cryptography & Steganography for Secure Authe...
Review on Implementation Visual Cryptography & Steganography for Secure Authe...Review on Implementation Visual Cryptography & Steganography for Secure Authe...
Review on Implementation Visual Cryptography & Steganography for Secure Authe...IRJET Journal
 
Review paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and SteganographyReview paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and Steganographyvivatechijri
 
IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...
IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...
IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...IJCSEA Journal
 
IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...
IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...
IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...IJCSEA Journal
 

Similar a R04405103106 (20)

MESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHYMESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHY
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
 
Image Steganography With Encryption
Image Steganography With EncryptionImage Steganography With Encryption
Image Steganography With Encryption
 
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
 
Transmission of cryptic text using rotational visual cryptography
Transmission of cryptic text using rotational visual cryptographyTransmission of cryptic text using rotational visual cryptography
Transmission of cryptic text using rotational visual cryptography
 
Transmission of cryptic text using rotational visual
Transmission of cryptic text using rotational visualTransmission of cryptic text using rotational visual
Transmission of cryptic text using rotational visual
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansion
 
Implementation of Image Steganography in Image by using FMM nested with LSB S...
Implementation of Image Steganography in Image by using FMM nested with LSB S...Implementation of Image Steganography in Image by using FMM nested with LSB S...
Implementation of Image Steganography in Image by using FMM nested with LSB S...
 
Review On Encrypting and Decrypting Message Via Image Slicing
Review On Encrypting and Decrypting Message Via Image SlicingReview On Encrypting and Decrypting Message Via Image Slicing
Review On Encrypting and Decrypting Message Via Image Slicing
 
P017329498
P017329498P017329498
P017329498
 
An Architectural Approach of Data Hiding In Images Using Mobile Communication
An Architectural Approach of Data Hiding In Images Using Mobile CommunicationAn Architectural Approach of Data Hiding In Images Using Mobile Communication
An Architectural Approach of Data Hiding In Images Using Mobile Communication
 
Image Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime PixelsImage Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime Pixels
 
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEMEDESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
 
RSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT ApproachRSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT Approach
 
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
 
SECURE E-BANKING APPLICATION BASED ON VISUAL CRYPTOGRAPHY
SECURE E-BANKING APPLICATION BASED ON VISUAL CRYPTOGRAPHYSECURE E-BANKING APPLICATION BASED ON VISUAL CRYPTOGRAPHY
SECURE E-BANKING APPLICATION BASED ON VISUAL CRYPTOGRAPHY
 
Review on Implementation Visual Cryptography & Steganography for Secure Authe...
Review on Implementation Visual Cryptography & Steganography for Secure Authe...Review on Implementation Visual Cryptography & Steganography for Secure Authe...
Review on Implementation Visual Cryptography & Steganography for Secure Authe...
 
Review paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and SteganographyReview paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and Steganography
 
IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...
IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...
IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...
 
IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...
IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...
IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...
 

Último

Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKJago de Vreede
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 

Último (20)

Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 

R04405103106

  • 1. S.Premkumar et al. Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 4( Version 5), April 2014, pp.103-106 www.ijera.com 103 | P a g e Optimal Contrast Grayscale Visual Cryptography with Modified Multi-secret Sharing for Secure Application S.Premkumar*, R.Swathiramya** *AP/CSE, Sri Ramakrishna Engineering College, Coimbatore, Tamil Nadu. **AP/CSE, Christ the King Engineering College, Coimbatore, Tamil Nadu. ABSTRACT Core banking is a set of services provided by a group of networked bank branches. Bank customers may access their funds and perform other simple transactions from any of the member branch offices. The major issue in core banking is the authenticity of the customer. Due to unavoidable hackingof the databases on the internet, it is always quite difficult totrust the information on the internet. To solve this problemof authentication, we are proposing an algorithm based onimage processing, improved steganography and visual cryptography. This paper proposes a technique of encode the password of a customer by improved Steganography, most of the steganographic techniques use either three or four adjacent pixels around a target pixel whereas the proposed technique is able to utilize at most all eight adjacent neighbors so that imperceptibility value grows bigger.and thendividing it into shares. Total number of shares to be created isdepending on the scheme chosen by the bank. When two sharesare created, one is stored in the Bank database and the otheris kept by the customer. The customer has to present the shareduring all of his transactions. This share is stacked with the firstshare to get the original image. Then decoding method issued to take the hidden password on acceptance or rejection of the output and authenticates the customer. Keywords: Digital Image steganography, visual cryptography, Gray Scale, Secret Sharing I. INTRODUCTION Today, most applications are only as secure as theirunderlying system. Since the design and technology of middleware has improved steadily, their detection is a difficultproblem. As a result, it is nearly impossible to be surewhether a computer that is connected to the internet canbe considered trustworthy and secure or not. The questionis how tohandle applications that require a high level ofsecurity, such as core banking and internet banking. In a core banking system, there is a chance of encounteringforged signature for transaction. And in the net bankingsystem, the password of customer may be hacked and misused.Thus security is still a challenge in these applications. Here, we propose a technique to secure the customer informationand to prevent the possible forgery of password hacking. The concept of image processing, an improved steganography and visual cryptography is used. Image processing is a technique ofprocessing an input image and to get the output as either improved form of the same image and/or characteristics ofthe input image. Visual Cryptography (VC) is amethod ofencrypting a secret image into shares such that stacking a sufficient number of shares reveals the secret image. Naor and Shamir [1] introduced a simple but perfectlysecure way that allows secret sharing without anycryptographic computation, termed as Visual CryptographyScheme (VCS). Basically, Visual Cryptography Scheme isan encryption method that uses combinatorial techniques toencode secret written materials. The idea is to convert thewritten material into an image and encode this image into nshadow images. The decoding requires only selecting somesubset of these n images, making transparencies of them, andstacking them on top of each other.The simplest Visual Cryptography Scheme is given bythe following setup. A secret image consists of a collectionof black and white pixels where each pixel is treatedindependently. To encode the secret image, we split theoriginal image into n modified versions (referred as shares) such that each pixel in a share now subdivides into n blackand white sub-pixels. To decode the image, a subset S of thosen shares are picked and copied on separate transparencies. IfS are a qualified subset, and then stacking all these transparencieswill allows visual recovery of the secret. Most of the steganographic methods consider human vision sensitivity as an essential factor [4] so that the very existence of the secret bits could not be revealed by any third party. One of the RESEARCH ARTICLE OPEN ACCESS
  • 2. S.Premkumar et al. Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 4( Version 5), April 2014, pp.103-106 www.ijera.com 104 | P a g e methods to achieve this is hiding the secret information in the edges rather than the smooth areas of a cover image. A method namely Multiple Base Notational Systems (MBNS) considers the edge areas of a cover image while re-expressing the secret bits in multiple base notational systems [3]. Using this technique MBNS adds more security. Furthermore MBNS proposes a walk path through the cover image which is not a row by row selection of target pixels. MBNS method owns the best values in terms of performance and quality metrics in comparison with bit-plane complexity segmentation method (BPCS) [5] and pixel value differencing (PVD) This paper is organized as follows: Section II deals withthe related work and Section III presents the architecture andmodel. Section IV is about the problem definition and the implementation of the proposed algorithm and the performance analysis. Section V contains the conclusions. II. RELATED WORK A brief survey of the related work in the area of visualcryptography and its application in banking sector ispresented in this section. Visual cryptography schemes wereindependently introduced by Shamir [2] and Blakley [3], and their original motivation was to safeguard cryptographic keysfrom loss. These schemes also have been widely employed inthe construction of several types of cryptographic protocols [4] and consequently, they have many applications in differentareas such as access control, opening a bank vault, openinga safety deposit box, or even launching of missiles. Asegment-based visual cryptography suggested by Borchert [5]can be used only to encrypt the messages containing symbols,especially numbers like bank account number, amount etc., Cryptography and steganography are cousins in the spy craft family: the former scrambles a message so it cannot be understood; the latter hides the message so it cannot be seen. A cipher message, for instance, might arouse suspicion on the part of the recipient while an invisible message created with steganographic methods will not. In fact, steganography can be useful when the use of cryptography is forbidden: where cryptography and strong encryption are outlawed, Steganography can circumvent such policies to pass message covertly. However, steganography and cryptography differ in the way they are evaluated: Steganography fails when the ”enemy” is able to access the content of the cipher message, while cryptography fails when the ”enemy” detects that there is a secret message present in the steganographic medium. The disciplines that study techniques for deciphering cipher messages and detecting hide messages are called cryptanalysis and steganalysis. The former denotes the set of methods for obtaining the meaning of encrypted information, while the latter is the art of discovering covert messages. The aim of this paper is to describe a method forintegrating together cryptography and Steganography through image processing. In particular, we present asystem able to perform steganography and cryptographyat the same time. We will show such system is an effective steganographic and is also a theoretically unbreakable cryptography. Two main issues are considered when using the algorithm. The first issue is imperceptibility which is the visibility of the secret information to the human eyes. The second issue is capacity, i.e., amount of secret information that can be concealed in the cover image. In this paper the main focus is to present an improvement made in terms of imperceptibility in comparison with MBNS method. The proposed method utilizes the same probability parameter to scatter secret bits as in [9] and considers the maximum number of surrounding pixels to achieve the capacity of every target pixel. The adjustment technique is discussed in Section III. The proposed algorithm is explained step by step in Section IV. Finally in Section V, the desired conclusion is made based on the results achieved. III. ADJUSTMENT TECHNIQUE Once a fraction of secret information is embedded, thetarget pixel value is to be adjusted using a kind of processwhose duty is to find the closest gray-scale value to theoriginal value of the target pixel so that the differencebetween the original and modified value of a target pixelbecomes smaller. Smaller amount of difference makes imagedistortion become smaller as well. In terms of imperceptibility, the value of a famous quality metric calledPeak Signal to Noise Ratio (PSNR) grows larger as imagedistortion gets smaller. A higher PSNR value is regarded asan enhancement in imperceptibility and vice versa. Thereforethe adjustment procedure can improve the quality of the stego-image. The adjustment procedure is as follows: If a target pixel value is changed after embedding, two other pixel values will be generated by flipping the (K + 1)th bit of the pixel Pi’{ as follows: where variable Pi’ is the modified value of a target pixel i called Pi' Pi is already allowed to carry K bits of secret information in the first K least significant bits (K > 0). In case of finding either a value more than 255 for a negative value for P-’, they should be replaced with Pi.
  • 3. S.Premkumar et al. Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 4( Version 5), April 2014, pp.103-106 www.ijera.com 105 | P a g e IV. ALGORITHM The step by step embedding phase is as follows: 1. Input a secret key SK in order to find the desired target pixels in a pseudo random way in the secret area. A cover image consists of two areas such as secret area and embedding area. The secret area comprises of the top-most row and the left-most column of the cover image while the embedding area consists of all the pixels other than the reserved pixels located in the secret area. Secret information will be embedded in embedding area. 2. Input SN as a pseudo random number generator seed number to make a pseudo random selection of the target pixels located in the embedding area. Note that both SK and SN are seed numbers that initialize two pseudo random number generators (PRNG). 3. Let P, PL, M and N be the cover image, secret information size (in bits) and the number of rows and columns of the cover image respectively. 4. Assign the best value to the variable Mb, which is the maximum number of bits allowed to be embedded in a target pixel. The initial value for Mb will be the minimum Mb value. 5. Calculate the probability value and the desired pseudo random numbers as below: 6. Choose the desired target pixels located in the embedding area as follows: 7. Determine Dynamic Capacity for P(i,j) that is the number of bits can be embedded in a target pixel using the available surrounding neighbors. Thus the Dynamic Capacity for a target pixel can be calculated as follows: 8. Adjust the value of each target pixel using adjustment technique in order to find the closest candidate to the original value of the target pixel. Bydoing this, the target pixel value will be replaced with the closest candidate and it results in anincrease in PSNR value. 9. The embedding process needs SK shared by both the sender and the receiver in order to find the coordinates of the target pixels in the secret area. Simple LSB insertion method is applied for embedding the secret parameters inside the secret area using one LSB of each target pixel selected using SK as in Step 1. The modified cover-image is called stego image. In order to recover secret information from the stego image, the receiver is expected to know SK so as to extract the rest of secret parameters. Knowing SK, the secret parameters can be extracted easily. The extraction procedure is as follows: 1. Extract secret parameters using SK. 2. Generate random numbers. 3. Choose the desired target pixels. 4. Compute the DynamicCapacity number of a target pixel. 5. Extract the secret information from a target pixelusing the corresponding DynamicCapacity. 6. If the amount of bits extracted equals to PL, thewhole secret information is achieved by puttingtogether all the extracted bits. V. CONCLUSION An improved steganography improves imperceptibility in comparison with MBNS method for the main reasons. The reason is that reason is that AMSPU discovers more surrounding pixels rather than utilizing four adjacent neighbors. Fixed neighbors are modified in previous steps so that they cause an increasingly image distortion whereas the rest of unselected neighbors still keep their original gray scale values by the end of embedding process. By using unselected neighbors as well as fixed neighbors, every Dynamic Capacity value can be estimated more precisely and also image distortion will be decreased. REFERENCES [I] F. A. P. Petitcolas, R. J. Anderson and M. G. Kuhn, "Information hiding-A survey," Proc. IEEE, vol. 87, pp. 1062-1078,1999. [2] H. Wang and S. Wang, "Cyber warfare- Steganography vs. Steganalysis," Commun.ACM, vol. 47, no. 10, pp. 76-82, 2004. [3] X. Zhang and S. Wang, "Steganography using multiplebase notational system and human vision sensitivity," IEEE Signal Processing Letters, vol. 12, pp. 67-70, Jan. 2005. [4] M. Kutter and S. Winkler, "A vision-based masking model for spread- spectrum image watermarking," IEEE Trans. Image Processing, vol. II,pp. 16-25, Jan. 2002.
  • 4. S.Premkumar et al. Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 4( Version 5), April 2014, pp.103-106 www.ijera.com 106 | P a g e [5] H. Noda, J. Spaulding, M. N. Shirazi, and E. Kawaguchi, "Application of bit-plane decomposition steganography to JPEG2000 encoded images," IEEE Signal Processing Lett., vol. 9, no. 12, pp. 410-413, Dec. 2002. [6] D.-C. Wu and W.-H.Tsai, "A steganographic method for images by pixel-value differencing," Pattern Recognit.Lett., vol. 24, pp. 1613-1626,2003. [7] C. K. Chan and L. M. Cheng, "Hiding data in images by simple LSB substitution," Pattern Recognition, pp. 469--474, Mar. 2004. [8] O. Kurtuldu and N. Arica, "A new steganography method using image layers," in Computer and Information Sciences, 2008.ISCIS '08. 23rd International Symposium on, 2008, pp. 1-4. [9] J. Mielikainen, "LSB matching revisited," Signal Processing Letters, IEEE, vol. 13, pp. 285-287, 2006. [10] L. Xiangyang, L. Bin, L. Fenlin, "A Dynamic Compensation LSB Steganography Resisting RS Steganalysis," in SoutheastCon, 2006. Proceedings of the IEEE, 2006, pp. 244-249. [11] Provos, N. (2001). Scanning USENET for Steganography.from http://niels.xtdnet.nl/stego/usenet.php [12] M. Shirali-Shahreza, "Steganography in MMS," in Multitopic Conference, 2007. INMIC 2007. IEEE International, 2007, pp. 1-4. [13] C. Chin-Chen and L. Iuon-Chang, "A new (t, n) threshold image hiding scheme for sharing a secret color image," in Communication Technology Proceedings, 2003.ICCT 2003. International Conference on, 2003, pp. 196- 202 vol.1.