Secured Data Hiding by Using Extended Visual
Secured Data Hiding by Using Extended Visual
Abstract
Due to the rapid advancement of the internet large amount of data is transmitted over the internet. Some of the transmitted
information is very important like password, confidential file, security codes etc. so it is very important to provide security to
these data. In computer technology there are two ways to provide security to the data they are cryptography & steganography.
Although, in the past, there has been various research related to cryptography & steganography but neither of them provide
enough & strong security. So this paper proposes a novel approach for data hiding by combining steganography & extended
visual cryptography. Visual cryptography was invented by Moni Naor & Adi Shamir in 1994. Visual cryptography hide secret
image within one or more images & then generate shares. For share generation this paper uses Visual Information Pixel (VIP) &
error diffusion technique.
Keywords: Steganography, Visual Cryptography, Share Generation, VIP, Extended Visual cryptography,
Cryptography
--------------------------------------------------------------------***---------------------------------------------------------------------1. INTRODUCTION
1.1 Visual Cryptography
Visual cryptography is a secret sharing scheme proposed by
Naor & Shamir [1] in 1994. In Visual cryptography secret
images are divided into n number of shares & separately
shares reveal no information about the secret image. Each
share looks like a collection of random pixels & appear
meaningless. These shares are distributed to k participants &
recovery of the secret image is done by superimposing these
shares. For decryption in traditional cryptography, require a
key, but in visual cryptography it is done by the human
visual system. In other words, visual cryptography does not
require any software or complex computation technique for
decryption. The summary of Naor and Shamirs schemes is
(1) The secret data is separated into n shares.
(2) Any k or more than k shares can recover the secret.
(3) Any k-1 or fewer than k shares cannot recover the secret
data.
_______________________________________________________________________________________
Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org
32
2.
3.
Fig 2
(d) Share1
(e) Share 2
1.5 Steganography
Steganography is the art & science of passing information or
hiding information in such a manner that the existence of
information is known to the intended recipient only. The
word steganography derived from Greek means Covered
Writing.
_______________________________________________________________________________________
Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org
33
First retrive the pixel info i.e the R,G,B values of the
pixel.
2. RELATED WORK
Visual Cryptography is proposed by Naor & Shamir [1] in
1994. In Visual Cryptography, secret image is encoded into
two or more images called as shares. These shares are
similar to random noise like images. (2,2) is the masic
model of visual cryptography.
Ateniese, Blundo & Stinson[2] in 1996 proposed Extended
Visual cryptography which contain meaningful share
images.
Upto 1997, Visual Cryptography schemes developed for
black & white images only. Verheul & Tilborg[3] developed
the first colored Visual Cryptography Scheme. But in this
scheme share generated is meaningless.
Chang & Tsai [5] develop a color visual cryptography
scheme & also generate meaningful share. In this scheme,
secret color image is encoded in two color image called as
cover images. This scheme uses predefined color Index
Table. The disadvantage of this scheme is that it requires
more storage space to store color index table. This
disadvantage is overcome by Chin-Chen Chang et al. [6].
Nakajima & Yamaguchi [7] proposed Extended Visual
Cryptography for natural images. This scheme produces
meaningful binary shares.
4. SIMULATED RESULTS
3. PROPOSED WORK
_______________________________________________________________________________________
Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org
34
_______________________________________________________________________________________
Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org
35
Color
image
shares
PSNR
MSE
Lena
30.6898 dB
55.4758
Baboon
31.1892 dB
49.4488
Pepper
30.6303 dB
56.242
6. CONCLUSION
This paper presents a novel approach for hiding data in color
images by integrating steganography & extended visual
cryptography. In Visual cryptography secret images are
divided into n number of shares
For hiding data in color images, this paper uses text
embedding algorithm & then for share generation which is a
visual cryptography part, uses VIP synchronization & error
diffusion technique. VIP synchronization, this method, keep
possession of place of pixels having visual information of
original images & error diffusion technique is used to
produce share of good quality.
REFERENCES
[1]. M. Naor & A. Shamir, Visual Cryptography, advances
in cryptology Eurocrypt94. Lecture notes in computer
science, 1-12, 1994.
[2]. G. Ateniese, C. Blundo, A. Santis & D. R. Stinson,
Extended capabilities for visual cryptography, ACM Theor.
Comput. Sci., Vol.250,pp. 143-161,2001.
[3]. E. R. Verheul & H.C.A. van Tilborg, Construction &
properties of k out of n visual secret sharing schemes,
Designs, codes & cryptography, vol.11, no. 2, pp.179-196,
1997.
[4]. C. Yang and C. Laih, New Colored Visual Secret
Sharing Schemes. Designs, Codes and cryptography, 20,
pp. 325335, 2000.
[5]. C. Chang, C. Tsai, and T. Chen. A New Scheme For
Sharing Secret Color Images In Computer Network,
Proceedings of International Conference on Parallel and
Distributed Systems, pp. 2127, July 2000.
[6]. Chin-Chen Chang , Tai-Xing Yu , Sharing A Secret
Gray Image In Multiple Images, Proceedings of the First
International Symposium on Cyber Worlds (CW.02), 2002.
[7]. M. Nakajima, Y. Yamaguchi, Extended visual
cryptography for natural images, in Proc. WSCG Conf.
2002, pp303-412.
_______________________________________________________________________________________
Volume: 03 Issue: 11 | Nov-2014, Available @ http://www.ijret.org
36