novel Approach For Data Hiding by integrating Steganography and Extended Visual Cryptography

Preview:

Citation preview

Faculty In-charge:

Prof. S.A.Dongre.

Guided by:

Prof. Ravikumar Sir.

Index.

Introduction.

Existing System.

Proposed System.- Algorithm.- Block Diagram.- Hardware.

Conclusion.

Introduction.

Cryptography is an art of converting data into unreadable format.

Fig. Cryptography

Visual Cryptography is a special encryption technique to hide information in images in such a way that it can be decrypted by the human vision if the correct key image is used.

Introduction(cont..)

Steganography means hiding one piece of data within another.

Fig. Steganography Model

Existing System.

Existing reversible data hiding schemes the design of an encryption algorithm must provide security against unauthorized attacks.

Key oriented algorithms are very efficient but they were very bulky to manage as key handling must be done.

It provides one levels of security to the information being transmitted .

Proposed System.

This system overcomes the demerits of using single level of hiding. That is either using cryptography or Steganography.

And one more thing to add is it requires only the computation time of single level hiding, because visual cryptography requires no computation to decrypt the information.

To improved quality of existing system, keyless random hiding techniques can be used.

Framework for proposed system.

VCSDH Algorithm algorithm

1. considered a secrete data and Encipher the datausing receiver public key as per RSA algorithm.

2 . Select an image as cover image to embed theencipher data into the image.

3. Transmit this Data hidden image that isstenography image along with video file.

4. Recover the steno image from the video file andrecover cipher from the steno image.

5. Decipher the text using its (receiver) ownprivate key and recovered cover image and secretdata.

Visual Cryptography.

Overlay

System Implementation.

System Methodology.

1.Continuous Tone 2. Halftone

Fig. Share 1 Fig. Share 2

Decrypted Image

References.

Visual Cryptography for General Access Structures,Carlo Blonde and Alfredo De Santis, Douglas R. Stinson.

Survey of Visual Cryptography Schemes,P.S.Revenkar, Anisa Anjum, W .Z.Gandhare.

Hiding data in images by simple LSB substitution,Chi-Kwong Chan∗, L.M. Cheng.

SECURED DATA HIDING BY USING EXTENDED VISUAL CRYPTOGRAPHY ,Megha Goel1, M. Chaudhari

Recommended