Introducing a New Approach to increase the security of information transmission by combining Steganography and visual cryptography in the levels of gray images

Document Type : Original Article

Authors

1 PhD Candidate, Faculty of Electrical Engineering Department, Imam Hossein University,.

2 Electrical Engineering Department, IHU University, Tehran, Iran

Abstract

The security of concealed information transfer can be ensured by both Steganography and Cryptography. The combination of these two methods can be used to enhance information security. In Cryptography because the message is encrypted, if the message is received by an attacker in the middle of the message, the original message is not disclosed. While Steganography the message information, the hidden message is embedded in an image called the cover image and then sent to the recipient. The proposed method uses Steganography to add Wavelet conversion coefficients that solves the problem of zigzagging the information histogram with LSB of the host image to increase resistance to other methods. Therefore, in this method the correlation between adjacent pixels of the image is minimized, which makes the image histogram not hide in the zigzag cover media despite the four messages being undercover. And to increase the security of undercover file encrypted by visual Cryptography with four subscriptions that even if the hidden media content is encrypted, the key information is not unauthorized. The combination of these two methods is highly secure and the results show that the computational complexity of this method is very low, it has simple algorithm implementation, very short time to run the implemented algorithm, and the recovery of the encrypted image is very easy.

Keywords


##[1] Poonam Bidgar, Neha Shahare “Key based Visual Cryptography Scheme using Novel Secret Sharing Technique with Steganography” IOSR Journal of Electronics and Communication Engineering, Volume 8, Issue 2, Dec. 2013.##[2] Dr M. Umamaheswari, Prof. S. Sivasubramanian, S. Pandiarajan “Analysis of Different Steganographic Algorithms for Secured DataHiding”, IJCSNS International Journal of Computer Science andNetwork Security, VOL.10 No.8, Aug 2010.##[3] Siddaram Shetty, Minu P. Abraham “A Proposal to Secure Visual Cryptographic Shares of Secret Image using RSA” International Journal of Advanced Research in Computer Science and Software Engineering Volume 4, Issue 12,Dec 2014.##[4] Biswapati lana, Partha Chowdhuri, Madhumita Mallick, Shyamal Kumar Mondal “Cheating Prevention in Visual Cryptography using Steganographic Scheme” IEEE Conference 2014.##[5] Mehdi Hussain and Mureed Hussain” A Survey of Image Steganography Techniques” International Journal of Advanced Science and Technology Vol. 54, May 2013.##[6] Mr. Deepak S. Bhiogade, Prof. Shaikh Phiroj Chhaware” Steganography and Visual Cryptography for Secured Data Hiding” International Conference on Industrial Automation and Computing (ICIAC),13th Apr 2014.##[7] Shaveta Mahajan, Arpinder Singh” A Review of Methods and Approach for Secure Stegnography” International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE),Volume 2, Issue 10, Oct 2012.##[8] Khalil Challita and Hikmat Farhat “Combining Steganography and Cryptography: New Directions” International Journal on New Computer Architectures and Their Applications (IJNCAA), 2011.##[9] Ravindra Gupta, Akanksha Jain, Gajendra Singh ” Combine use of Steganography and Visual Cryptography for Secured Data hiding in Computer Forensics” (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 3 (3) , 2012.##[10] Rita Rana, Dheerendra Singh, Steganography-Concealing Messages in Images Using LSB Replacement Technique with Pre-Determined Random Pixel and Segmentation of Image, International Journal ofComputer Science & CommunicationVol. 1, No. 2, pp. 113-116,JuL-Dec 2010.##[11] Rehana Begum R.D and Sharayu Pradeep “Best Approach for LSB Based Steganography Using Genetic Algorithm and Visual Cryptography for Secured Data Hiding and Transmission over Networks” International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 6, Jun 2014.##[12] Der-Chyuan Lou, Hong-Hao Chen, Hsien-Chu Wu, and Chwei-Shyong Tsai. A novel authenticable color visual secret sharing scheme using non-expanded meaningful shares. Displays, 32:118{134, Feb 2011.##[13] Moni Naor, Adi Shamir. Visual cryptography II: Improving the contrast via the cover base Security Protocols Security Protocols pp 197-202, 1996.##[14] Moni Naor, Adi Shamir. Visual cryptography, Security Protocols: Advances in Cryptology, EUROCRYPT'94, pp 1-12, 1994.##[15] Mitsuru Nakai,A Measure on the Harmonic Boundary of a Riemann Surface. Nagoya Mathematical Journal, Volume 17, pp. 181-218, August 1960.##[16] Kumar C, Singh AK, Kumar Pu”Improved wavelet-based image watermarking through SPIHT”, Multimedia Tools and Applications, vol. 79, no.15, pp.11069-11082.##[17] Zheng Z, Saxena N, Mishra KK, Sangaiah AK, ,” Guided Dynamic Particle Swarm Optimization for Optimizing Digital Image Watermarking in Industry Applications”,  vol.88, pp.92–106, 2018.##[18] M. Islam, A. Roy, R.H. Laskar, “Neural network based robust image watermarking technique in LWT domain”, Journal of Intelligent & Fuzzy Systems, vol.u34, pp.u1691– 1700, 2018.##[20] I. Shafi, M. Noman, M. Gohar, A. Ahmad, M. Khan, S. Din, S.H. Ahmad, J. Ahmad, “An adaptive hybrid fuzzy-wavelet approach for image steganography  using bit reduction and pixel adjustment”, Soft Computing, vol.u22, no.5, pp.1555–1567, 2018.##[21] P.D. Shah, R.S. Bichkar, A Sec re Spatial Domain Image Steganography u using Genetic Algorithm and Linear Congr ential Generator, In International conference on intelligent computing and applications, pp.119-129, 2018.##[22] Emad,  E.,  Safey,  A.,  Refaat,  A.,  Osama,  Z.,  Sayed,  E.,  &  Mohamed,  E.  ”A usec ureu image  steganography  algorithm  based  on  least  significant  bit  and  integer  wavelet  transform”,  Journal of Systems Engineering and Electronics, vol.29, no.3,uupp.639– 649, 2018.##