HYBRIDIZATION OF VISUAL CRYPTOGRAPHY AND IMAGE REALIZATION STEGANOGRAPHY

Published 29 FEB 2020 •  vol 135  • 


Authors:

 

Sandeep Gurung, Department of Computer Science & Engineering, Sikkim Manipal Institute of Technology, Sikkim Manipal University, India
Pooja Rai, Department of Computer Science & Engineering, Sikkim Manipal Institute of Technology, Sikkim Manipal University, India
Harsh Sikhwal, Department of Computer Science & Engineering, Sikkim Manipal Institute of Technology, Sikkim Manipal University, India
Muksam Limboo, Department of Computer Science & Engineering, Sikkim Manipal Institute of Technology, Sikkim Manipal University, India
M K Ghose, Department of Computer Applications, Sikkim University, Sikkim, India

Abstract:

 

In the world of information technology our dependence on it have increased manifolds. The dynamic nature of the web, its complexity and communication over unsecure communication channel (internet) augments additional problems giving rise to many security concerns namely secrecy and authentication. The paper focusses on the design of a hybrid architecture combining the attributes of visual cryptography and steganography, which can be used for many applications including polling, copyright protection, biometrics, etc. The multi-tier security model offers a hierarchical tree architecture for distributing information between authenticated participants. Random grid based visual cryptography scheme is extended for multiple secret hiding, the scheme can easily be decoded by using the Human Visual System. The noisy patterns/shares generated from visual cryptography are concealed in digital carriers for storing or for distributing the information to the rightful users. The proposed system maps and embeds the shares generated through image realization steganography to one of the CMY planes of the cover image. The statistical distribution of the pixel information of the image is used as a basis for the measurement of region identification for message embedding. A variable data rate embedding is used for mapping the information in the carrier image to reduce the distortion induced on the carrier image. The multi-level security model offers increased secure and is robust towards security attacks.

Keywords:

 

Information Security, Authentication, Secrecy, Visual Cryptography Random Grids, Multiple Information Hiding, Image Realization, Hybridization

References:

 

[1] Adi Shamir, "How to share a secret", Communications of the ACM, Volume 22 Issue 11,Nov.1979, Pages 612-613, doi :10.1145/359168.359176.
[2] A Cheddad, J Condell, K Curran and P McKevitt, “Digital Image Steganography: Survey and Analysis of Current Methods”, Signal Processing, Volume 90, Issue 3, March 2010, Pages 727-752.
[3] H C Hsu, J Chen, T S Chen, Y H Lin, “Special type of circular visual cryptography for multiple secret hiding”, The Imaging Science Journal 55(3), 2007, Pages 175-179.
[4] Jeanne Chen, Tung-Shou Chen, Hwa-Ching Hsu, Hsiao- Wen Chen, “New visual cryptography system based on circular shadow image and fixed angle segmentation”, Journal of Electronic Imaging 14(3), July 2005.
[5] Jen Beng Feng, Hesien Chu Wu, Chwei Shyong Tsai, “Visual Secret Sharing for multiple secrets”, Pattern Recognition 41,Volume 41 Issue 12, December 2008, Pages 3572-3581.
[6] Jithesh K, A V Senthil Kumar, “Multilayer Information Hiding- A Blend of Steganography and Visual Cryptography”, Journal of Theoretical and Applied Information Technology, Vol 19 No 2, 2010, Pages 109-116.
[7] O Kafri and E Keren, “Encryption of pictures and shapes by Random Grids”, Optics Letters Vol. 12, Issue 6, 1987, Pages 377-379.
[8] M Gnanaguruparan, S Kak, “Recursive Hiding Of Secrets In Visual Cryptography”, Cryptologia, vol. 26, 2002, Pages 68-76.
[9] R Wang, Y Chen, “High Payload Image Steganography Using Two-Way Block Matching”, IEEE Signal Processing Letters, 13(3), 2006, Pages 161-164.
[10] Saman Salehi, M A Balafar,”Visual Multi Secret Sharing by Cylindrical Random Grid”, Journal of Information Security and Applications, Volume 19 Issue 3, July 2014, Pages 245-255.
[11] Suvarna Patel, Gajendra Singh Chandel, “Performance Analysis of Steganography Based on 5 Wavelet Families by 4 Levels–DWT”, International Journal of Computer Science and Network Security, Vol 14 No 12, December 2014.
[12] Tanmay Bhattacharya, Nilanjan Dey, S R Bhadra Chaudhuri, “A Session based Multiple Image Hiding Technique using DWT and DCT”, International Journal of Computer Applications Volume 38. No 5, January 2012, Pages 18 – 21.
[13] Tzung-Her Chen, Kai-Hsiang Tsao,”Visual Secret sharing by Random Grids Revisited”, Pattern Recognition Volume 42 Issue 9, September 2009, Pages 2203-2217.
[14] Tsung-Lieh Lin, Shi-Jinn Horng, Kai-Hui Lee, Pei-Ling Chiu, Tzong-Wann Kao, Yuan-Hsin Chen, Ray-Shine Run, Jui-Lin Lai, Rong-Jian Chen, “A novel visual secret sharing scheme for multiple secrets without pixel expansion”, Expert Systems with Applications, Volume 37, Issue 12, December 2010, Pages 7858-7869.
[15] Tzung-Her Chen, Kuang-Che Li, “Multi-image encryption by circular random grids”, Information Sciences, Informatics and Computer Science, Intelligent Systems, Applications: An International Journal, Volume 189, April, 2012, Pages 255-265.
[16] Tzung-Her Chen, Yao-Sheng Lee, Wei-Lun Huang, Justice Su-Tzu Juan, Ying-Yu Chen, Ming-Jheng Li, “Quality-adaptive visual secret sharing by random grids”, Original Research Article Journal of Systems and Software, Volume 86, Issue 5, May 2013,Pages 1267-1274.
[17] V I Arnold, A Avez, “Ergodic Problems in Classical Mechanics”, The Mathematical Physics Monograph Series, W A Benjamin, Inc, Preis geb, NewYork, 1968.
[18] William Stallings, “Cryptography and Network Security“, Seventh Edition, Pearson Education, 2017, ISBN-10: 9789332585225.
[19] Wu, L. and Chen H. A Study On Visual Cryptography, Master Thesis, Institute of Computer and Information Science, National Chiao Tung University, Taiwan, 1998.
[20] “Pairing Function”, Source: http://mathworld.wolfram.com, Last Access: July 2013.
[21] Joy Jo-Yi Chang and Justie Su-Tzu Juan, “Two secret sharing scheme by Shifting Random Grids”, Proceeding of the 29th Workshop on Combinatorial Mathematics and Computation Theory, National Taipei College of Business, Institute of Information and Decision Sciences, Taipei, Taiwan, April 27-28, 2012.
[22] Naor M., Shamir A. (1995) Visual cryptography. In: De Santis A. (eds) Advances in Cryptology EUROCRYPT 1994. Lecture Notes in Computer Science, Vol 950. Springer, Berlin, Heidelberg.
[23] Sangita Roy, Manini Manasmita, ”A novel approach to format based text steganography”, Proceedings of the 2011 International Conference on Communication, Computing & Security, ICCCS 2011, Odisha, India, February 12-14, 2011.
[24] Shabnam Samima, Ratnakirti Roy, Suvamoy Changder, “Secure Key Based Image Realization Steganography”, 2013 IEEE Second International Conference on Image Information Processing (ICIIP-2013), December 2013, Publisher : IEEE Xplore.
[25] Shouchao Song, Jie Zhang, Xin Liao, Jiao Du, Qiaoyan Wen, “A Novel Secure Communication Protocol Combining Steganography and Cryptography”, Advanced In Control Engineering and Information Science, Procedia Engineering 15 (2011) , Page no : 2767-2772.

Citations:

 

APA:
Gurung, S., Rai, P., Sikhwal, H., Limboo, M., & Ghose, M. K. (2020). Hybridization of Visual Cryptography and Image Realization Steganography. International Journal of Advanced Science and Technology (IJAST), ISSN: 2005-4238(Print); 2207-6360 (Online), NADIA, 135, 73-88. doi: 10.33832/ijast.2020.135.07.

MLA:
Gurung, Sandeep, et al. “Hybridization of Visual Cryptography and Image Realization Steganography.” International Journal of Advanced Science and Technology, ISSN: 2005-4238(Print); 2207-6360 (Online), NADIA, vol. 135, 2020, pp. 73-88. IJAST, http://article.nadiapub.com/IJAST/Vol135/7.html.

IEEE:
[1] S. Gurung, P. Rai, H. Sikhwal, M. Limboo, and M. K. Ghose, "Hybridization of Visual Cryptography and Image Realization Steganography." International Journal of Advanced Science and Technology (IJAST), ISSN: 2005-4238(Print); 2207-6360 (Online), NADIA, vol. 135, pp. 73-88, Feb 2020.