Numerous algorithms have been proposed in the
fields of visual cryptography and steganography with the goals
of improving security, reliability, and efficiency. Visual
cryptography involves dividing the image into random shares
without the use of keys. Since it can be employed by anyone
without any cryptographic knowledge and does not require any
computations while decrypting, many researches’ have been
focused on it. Steganography is the art, science, or practice in
which messages, images, or files are hidden inside other
messages, images, or files. The person sending the hidden data
and the person meant to receive the data are the only ones who
know about it; but to everyone else, the object containing the
hidden data just seems like an everyday normal object.
Ultimately they both are ways of hiding data from prying eyes.
This paper proposes a method to combine these two strong
methodologies of keeping the image and the data secret from the
prying eyes. We can develop an algorithm which uses the LSB
method of steganography to hide text data inside an image, and
then use that image as a secret image for visual cryptography
method. The secret image with hidden data will be split up into
shares using RKO technique for Visual Cryptography. Then
when these shares are re-assembled or decoded to reconstruct
the original image the revealed image will still contains the
hidden data. The receiver then extracts the hidden data from the
revealed image using reverse LSB.
Published In : IJCAT Journal Volume 1, Issue 4
Date of Publication : 31 May 2014
Pages : 32 - 36
Figures : 01
Tables : 01
Publication Link : Steganography Combined with RKO Technique
for Visual Cryptography
Ms. Moushmee Kuri : has received B.E.(Computer Engg)
dfrom Goa University in 1998, pursuing M. E. Compter Engg
from Thadomal Shahani College of Engineering, Bandra,
Mumbai, Working as Assistant Professor in Computer Dept. at
Watumull Institute of Electronics Engg and Computer
Technology., Worli Mumbai. She has more than 10 years of
experience in teaching. Has published two papers in the field of
Visual Cryptography. Her areas of interest are system Security,
system programming and Image Processing.
Dr. Tanuja Sarode : has Received Bsc.(Mathematics) from
Mumbai University in 1996, Bsc.Tech.(Computer Technology)
from Mumbai University in 1999, M.E. (Computer Engineering)
from Mumbai University in 2004, Ph.D. from Mukesh Patel
School of Technology, Management and Engineering, SVKM’s
NMIMS University, papers in National /International Vile-Parle
(W), Mumbai, INDIA. She has more than 14 years of experience
in teaching. Currently working as Associate Professor in Dept. of
Computer Engineering at Thadomal Shahani Engineering
College, Mumbai. She is life member of IETE, member of
International Association of Engineers (IAENG) and International
Association of Computer Science and Information Technology
(IACSIT), Singapore. Her areas of interest are Image
Processing, Signal Processing and Computer Graphics. She has
55 Conferences/journal to her credit.
[1] M. Naor and A. Shamir, “Visual cryptography,” in
Proc. EUROCRYPT’ 94, Berlin, Germany, 1995, vol.
950, pp. 1–12, Springer-Verlag, LNCS
[2] F. Liu1, C.K. Wu X.J. Lin , “Colour Visual
Cryptography Schemes”, IET Information Security, vol.
2, No. 4, pp 151-165, 2008.
[3] Y. C. Hou, “Visual cryptography for color images,”
Pattern Recognition, vol. 36, pp. 1619-1629, 2003.
[4] Siddharth Malik, Anjali Sardana, Jaya “A Keyless
Approach to Image Encryption”, 2012 International
Conference on Communication Systems and Network
Technologies
[5] L. W. Hawkes, A. Yasinsac and C. Cline, "An
Application of Visual Cryptography to Financial
Documents," Technical report TR001001,Florida State
University, 2000.
[6] George Abboud, Jeffrey Marean, Roman V.
Yampolskiy, “Steganography and Visual Cryptography
in Computer Forensics”, in 2010 Fifth International
Workshop on Systematic Approaches to Digital
Forensic Engineering
[7] A. Shamir, “How to share a secret,” Commun. ACM,
vol. 22, no. 11, pp. 612–613, 1979.
[8] H.-C. Wu, C.-C. Chang, “Sharing Visual Multi-Secrets
Using Circle Shares”, Comput. Stand. Interfaces 134
(28) ,pp. 123–135, (2005).
[9] Tzung-Her Chen, Kai-Hsiang Tsao, and Kuo-Chen Wei,
“Multiple-Image Encryption By Rotating Random
Grids”, Eighth International Conference on Intelligent
Systems Design and Applications, pp. 252-256 , 2008.
[10] Du-Shiau Tsai , Gwoboa Horng , Tzung-Her Chen ,
Yao-Te Huang , “A Novel Secret Image Sharing
Scheme For True-Color Images With Size Constraint”,
Information Sciences 179 3247–3254 Elsevier, 2009.
[11] R. Lukac, K.N. Plataniotis “Bit-level based secret
sharing for image encryption”, The Journal of Pattern
Recognition Society, 2005.
[12] C.C. Chang, T.-X. Yu,” Sharing a secret gray image in
multiple images”, in: Proceedings of First International
Symposium on Cyber orlds, 2002, pp.230–240.
[13] O. Kurtuldu and N. Arica, "A new steganography
method using image layers," in Computer and Information Sciences, 2008. ISCIS '08. 23rd
International Symposium on, 2008, pp. 1-4.
[14] J. Mielikainen, "LSB matching revisited," Signal
Processing Letters, IEEE, vol. 13, pp. 285-287, 2006.
[15] Ms. Moushmee Kuri, Dr. Tanuja Sarode, “RKO
Technique for Color Visual Cryptography”, in : IOSR
Journal of Computer Engineering (IOSR-JCE) e-ISSN:
2278-0661, p- ISSN: 2278-8727Volume 16, Issue 2,
Ver. X (Mar-Apr. 2014), PP 89-93