Proceedings of the 2011 International Conference on Communication, Computing &Amp; Security - ICCCS '11 2011
DOI: 10.1145/1947940.1948064
|View full text |Cite
|
Sign up to set email alerts
|

A novel approach for secret data transfer using image steganography and visual cryptography

Abstract: Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message. It is a form of security through obscurity. The word Steganography in the modern day usually refers to information or a file that has been concealed inside a digital Picture, Video or Audio file. Essentially, the information-hiding process in a steganographic system starts by identifying a cover medium's redundant bits. The embedding pro… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2013
2013
2019
2019

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 10 publications
0
4
0
Order By: Relevance
“…This paper though requires a distinct image [18][19] which we can use as a carrier and hide the audio which is well within the limits of the threshold that the image can hide, that will secure the audio and get the attacker deceived from its true nature. The person will not be able to know until unless he gets to know the intention and the method of hiding and thus cannot guess the data that is being sent through the image.The main challenge lies [11] [20][21][22][23][24] in increasing the amount of audio data that can be sent through the cover image and, how can it be securely sent over the network till the receiver. Also we need to ensure that cover RGB image will not be giving rise to any suspicion of the data being carried while travelling through the network.…”
Section: Proposed Methodology In Rgb Image Steganographymentioning
confidence: 99%
“…This paper though requires a distinct image [18][19] which we can use as a carrier and hide the audio which is well within the limits of the threshold that the image can hide, that will secure the audio and get the attacker deceived from its true nature. The person will not be able to know until unless he gets to know the intention and the method of hiding and thus cannot guess the data that is being sent through the image.The main challenge lies [11] [20][21][22][23][24] in increasing the amount of audio data that can be sent through the cover image and, how can it be securely sent over the network till the receiver. Also we need to ensure that cover RGB image will not be giving rise to any suspicion of the data being carried while travelling through the network.…”
Section: Proposed Methodology In Rgb Image Steganographymentioning
confidence: 99%
“…Without involving any complex computations, decode the secret biometric face image visually by superimposing a qualified subset of shares through the visual secret sharing method. In the context, there exist Boolean operation of the secret image sharing that overcomes the drawback of low visual quality and pixel expansion created by the VSS [2]. Visual cryptography is a special secret sharing technique that means it is dissimilar from usual cryptography, for the reason that it does not require complex computation to decrypt [3].…”
Section: Fig 1: Justification Of E-shopping Cart Using Visual Cryptogmentioning
confidence: 99%
“…The In this type of steganography spatial and transform domains may be combined [33] with each other, also one or both of them maybe combined with other optimization algorithms or heuristic approaches like Genetic Algorithms (GA) [34] and [35], or may be combined with other secure communication techniques like cryptography [36] and [37]. Aiming at producing a new schemes that will provide better results than if they used alone.…”
Section: Hybrid Approachesmentioning
confidence: 99%
“…Both [36] and [37] used visual cryptography along with image steganography to achieve more security.…”
Section: Hybrid Approachesmentioning
confidence: 99%