Secure data hiding using steganographic technique with Visual cryptography and watermarking scheme

Author(s):  
R. Gayathri ◽  
V. Nagarajan
2019 ◽  
Vol 68 (1) ◽  
pp. 01-07
Author(s):  
Tyler Taylor, Justin Rogers

Video Steganography is a strategy wherein we can conceal a wide range of documents with any extension into a carrying Video document. Right now, are utilizing two fundamental wording that is have host file and carrier file where host file is a hidden file (any sort of record like content document, picture document, and sound/video document) and carrier file must be a video record. The primary inspiration of this paper is to make sure about moving of information by utilizing steganography and cryptography system. It is worried about implanting data in a harmless spread media in a safe and hearty way. Right now expositions we are utilizing Forbidden Zone Data Hiding strategy where no modification is required in have signal range during information hidden procedure. To safely moving the information record, we use video information covering up and utilizing revision limit of rehash gather code with predominance of taboo zone information stowing away. Utilizing this methodology we can likewise stow away and move the enormous video record whose size is bigger than spread record in secure way. The principle favorable position of utilizing video record sequestered from everything data is the additional protection from of the outsider or unintended beneficiary because of the overall multifaceted nature of video contrasted with picture and sound document. I have effectively actualized the proposed system of video information hiding utilizing forbidden zone datahiding strategy (FZDH) on content document, picture record, sound record and video document. The exceptional element is that we can hide the bigger size video record behind the smaller size cover record.


Author(s):  
Abhishek Basu ◽  
Susmita Talukdar

In this paper, a saliency and phase congruency based digital image watermarking scheme has been projected. The planned technique implants data at least significant bits (LSBs) by means of adaptive replacement. Here more information is embedded into less perceptive areas within the original image determined by a combination of spectral residual saliency map and phase congruency map. The position of pixels with less perceptibility denotes the most unimportant region for data hiding from the point of visibility within an image. Therefore any modification within these regions will be less perceptible to one observer. The model gives a concept of the areas which has excellent data hiding capacity within an image. Superiority of the algorithm is tested through imperceptibility, robustness, along with data hiding capacity.


2012 ◽  
Vol 6 (4) ◽  
pp. 55-70 ◽  
Author(s):  
Sunil Kumar Muttoo ◽  
Vinay Kumar ◽  
Abhishek Bansal

The 8-queens problem of placing 8 non-attacking queens on an 8x8 chessboard is used to hide message in an image. The method helps in randomizing the bit selection in a cover image for hiding purpose. Cover image is divided into blocks of 8x1 bytes and then masked with solutions of the 8-queens problem. Bits from the block are collected corresponding to the 8-queen solution to make a 7 bit string. LSB of the block is not considered. It gives a number in the range of 0 to 127. If a bit string, corresponding to the 8-queens solutions, matches with ASCII code of the first character from message, the corresponding solution number of the 8-queens problem is encrypted using RC4, and the cipher is stored in first block of the cover. This encrypted value works as key. The solution number corresponding to next character is XORED with the key and the resultant value is embedded in the LSB of next block. The algorithm has been tested with cover of different image file formats like BMP, PNG and TIFF. The algorithm provides very good capacity, imperceptibility and robustness.


Sign in / Sign up

Export Citation Format

Share Document