13
Faculty In-charge: Prof. S.A.Dongre. Guided by: Prof. Ravikumar Sir.

novel Approach For Data Hiding by integrating Steganography and Extended Visual Cryptography

Embed Size (px)

Citation preview

Page 1: novel Approach For Data Hiding by integrating Steganography and Extended Visual Cryptography

Faculty In-charge:

Prof. S.A.Dongre.

Guided by:

Prof. Ravikumar Sir.

Page 2: novel Approach For Data Hiding by integrating Steganography and Extended Visual Cryptography

Index.

Introduction.

Existing System.

Proposed System.- Algorithm.- Block Diagram.- Hardware.

Conclusion.

Page 3: novel Approach For Data Hiding by integrating Steganography and Extended Visual Cryptography

Introduction.

Cryptography is an art of converting data into unreadable format.

Fig. Cryptography

Visual Cryptography is a special encryption technique to hide information in images in such a way that it can be decrypted by the human vision if the correct key image is used.

Page 4: novel Approach For Data Hiding by integrating Steganography and Extended Visual Cryptography

Introduction(cont..)

Steganography means hiding one piece of data within another.

Fig. Steganography Model

Page 5: novel Approach For Data Hiding by integrating Steganography and Extended Visual Cryptography

Existing System.

Existing reversible data hiding schemes the design of an encryption algorithm must provide security against unauthorized attacks.

Key oriented algorithms are very efficient but they were very bulky to manage as key handling must be done.

It provides one levels of security to the information being transmitted .

Page 6: novel Approach For Data Hiding by integrating Steganography and Extended Visual Cryptography

Proposed System.

This system overcomes the demerits of using single level of hiding. That is either using cryptography or Steganography.

And one more thing to add is it requires only the computation time of single level hiding, because visual cryptography requires no computation to decrypt the information.

To improved quality of existing system, keyless random hiding techniques can be used.

Page 7: novel Approach For Data Hiding by integrating Steganography and Extended Visual Cryptography

Framework for proposed system.

Page 8: novel Approach For Data Hiding by integrating Steganography and Extended Visual Cryptography

VCSDH Algorithm algorithm

1. considered a secrete data and Encipher the datausing receiver public key as per RSA algorithm.

2 . Select an image as cover image to embed theencipher data into the image.

3. Transmit this Data hidden image that isstenography image along with video file.

4. Recover the steno image from the video file andrecover cipher from the steno image.

5. Decipher the text using its (receiver) ownprivate key and recovered cover image and secretdata.

Page 9: novel Approach For Data Hiding by integrating Steganography and Extended Visual Cryptography

Visual Cryptography.

Overlay

Page 10: novel Approach For Data Hiding by integrating Steganography and Extended Visual Cryptography

System Implementation.

Page 11: novel Approach For Data Hiding by integrating Steganography and Extended Visual Cryptography

System Methodology.

1.Continuous Tone 2. Halftone

Fig. Share 1 Fig. Share 2

Decrypted Image

Page 12: novel Approach For Data Hiding by integrating Steganography and Extended Visual Cryptography

References.

Visual Cryptography for General Access Structures,Carlo Blonde and Alfredo De Santis, Douglas R. Stinson.

Survey of Visual Cryptography Schemes,P.S.Revenkar, Anisa Anjum, W .Z.Gandhare.

Hiding data in images by simple LSB substitution,Chi-Kwong Chan∗, L.M. Cheng.

SECURED DATA HIDING BY USING EXTENDED VISUAL CRYPTOGRAPHY ,Megha Goel1, M. Chaudhari

Page 13: novel Approach For Data Hiding by integrating Steganography and Extended Visual Cryptography