Analysis of Visual Cryptography, Steganography Schemes and its Hybrid Approach for Security of Images

Data security has become a most important issue in data communication especially in the field of Computer Network. The data can have many forms such as text, image, and sound etc. There are many cryptosystems exists to protect data; out of those Visual Cryptography (VC) is a popular technique to protect image based data. It splits the secret image into shares in encryption process and the original image can be retrieved by stacking the required number of shares at the time of decryption. Steganography is another method of cryptosystem used to protect data. It hides the secret inside another data. It makes the secret invisible to users. But in the rapid expansion of cryptanalysis and steganalysis, data is still very insecure in some state of affairs. Hence, to provide a strong security mechanism a hybrid approach using the feature of VC and steganography techniques is wise to adopt. This paper studies the visual cryptography scheme, steganography scheme and various hybrid approaches for data security especially for image based data.

[1]  Ioannis Pitas,et al.  A method for signature casting on digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[2]  K. Rajani Devi,et al.  A REVIEW ON VISUAL CRYPTOGRAPHY SCHEMES , 2012 .

[3]  V. L. Reddy,et al.  Implementation of LSB Steganography and its Evaluation for Various File Formats , 2011 .

[4]  Jagdeep Verma,et al.  A Visual Cryptographic Technique to Secure Image Shares , 2012 .

[5]  Mr Rohith,et al.  A Novel Two Stage Binary Image Security System Using ( 2 , 2 ) Visual Cryptography Scheme , 2012 .

[6]  Poonam Bidgar,et al.  Key based Visual Cryptography Scheme using Novel Secret Sharing Technique with Steganography , 2013 .

[7]  Young-Chang Hou,et al.  Visual cryptography for color images , 2003, Pattern Recognit..

[8]  Shailender Gupta,et al.  Information Hiding Using Least Significant Bit Steganography and Cryptography , 2012 .

[9]  Sandeep Gurung,et al.  HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS , 2013 .

[10]  J. K. Mandal,et al.  A Novel Technique for Secret Message / Image Transmission through (2, 2)Visual Cryptographic Protocol (SMITVCP) , 2012, ArXiv.

[11]  Moni Naor,et al.  Visual Cryptography , 1994, Encyclopedia of Multimedia.

[12]  Zhi Zhou,et al.  Halftone visual cryptography , 2006, IEEE Transactions on Image Processing.

[13]  Alfredo De Santis,et al.  Extended capabilities for visual cryptography , 2001, Theor. Comput. Sci..

[14]  Sandeep Gurung,et al.  Steganography and Random Grids , 2013 .

[15]  Ekta Walia,et al.  An Analysis of LSB & DCT based Steganography , 2010 .

[16]  Chang-Chou Lin,et al.  Visual cryptography for gray-level images by dithering techniques , 2003, Pattern Recognit. Lett..

[17]  Mayank Dave,et al.  Customized and Secure Image Steganography Through Random Numbers Logic , 2007 .