International Journal of
Computer Sciences and Engineering

Scholarly Peer-Reviewed, and Fully Refereed Scientific Research Journal
Design of Arbitrary Image Slicer in Execution of Steganography
Design of Arbitrary Image Slicer in Execution of Steganography
A.Balasubramani 1 , Chdv. Subba Rao2
1 Faculty of Computer Science and Engineering, SIETK, Puttur, India.
2 S.V.U College of Engineering, S.V.University, Tirupati, India.
Correspondence should be addressed to: balunbkr@yahoo.co.in.

Section:Research Paper, Product Type: Journal Paper
Volume-5 , Issue-11 , Page no. 39-43, Nov-2017

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v5i11.3943

Online published on Nov 30, 2017

Copyright © A.Balasubramani, Chdv. Subba Rao . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 
View this paper at   Google Scholar | DPI Digital Library
  XML View PDF Download  
Citation

IEEE Style Citation: A.Balasubramani, Chdv. Subba Rao, “Design of Arbitrary Image Slicer in Execution of Steganography”, International Journal of Computer Sciences and Engineering, Vol.5, Issue.11, pp.39-43, 2017.

MLA Style Citation: A.Balasubramani, Chdv. Subba Rao "Design of Arbitrary Image Slicer in Execution of Steganography." International Journal of Computer Sciences and Engineering 5.11 (2017): 39-43.

APA Style Citation: A.Balasubramani, Chdv. Subba Rao, (2017). Design of Arbitrary Image Slicer in Execution of Steganography. International Journal of Computer Sciences and Engineering, 5(11), 39-43.
Downloads (115)     Full view (118)
           
Abstract :
A new coding technique is projected in this paper. Steganography and visual Cryptography is employed to achieve the security. The secret colour image is hidden behind a canopy image. The steganographic image is currently sliced into multiple slices and transmitted in an open system setting. At the receiver side, the received slices are organised in such a way that to come up with the original image, that has the secret colour image hidden in it. This can be done by Visual Cryptography. Currently Steganography is employed on this image to get the secret image.
Key-Words / Index Term :
Cryptography, Steganography, secret image
References :
[1]. M. Naor and A. Shamir, “Visual cryptography,” in Proc. Adv. Cryptol.: EUROCRYPT, vol. 950. 1995, pp. 1–12.
[2]. Thomas Monoth and Babu Anto P “Contrast-Enhanced Visual Cryptography Schemes Based on Additional Pixel Patterns”, 978-0-7695- 4215-7/10 2010 IEEE.
[3].S.Punitha, S. Thompson and N.Siva Rama Ling “Binary Watermarking Technique based on Visual Cryptography,” 978-1-4244-7770-8/10/ 2010 IEEE.
[4]. E.Sangeetha Devi, “Enhanced Visual Secret Sharing Scheme via Halftoning Technique”, 978-1-4244-7770-8/10/2010 IEEE.
[5]. Divya.A and K. Ramalakshmi, “Maintaining the Secrecy in Visual Cryptography Schemes,” 978-1-4244 -8679-3/11/2011 IEEE.
[6]. Ali Makki Sagheer, Salah Sleibi Al-Rawi and Laith hamid Abed, “Visual Cryptography Technique based on FFT,” 978-0 7695-4593-6/11 2011 IEEE.
[7]. InKoo Kang, Gonzalo R. Arce, “Color Extended Visual Cryptography Using Error Diffusion”, and Heung-Kyu Lee, 1057 7149/ 2010 IEEE.
[8]. Young-Chang Hou, Zen-Yu Quan, “Progressive Visual Cryptography with Unexpanded Shares,” IEEE Transactions on Circuits And Systems For Video Technology, Vol. 21, No. 11, November 2011.
[9]. HAN Yan-yan, Xi’an China, “A Watermarking-based Visual Cryptography Scheme with Meaningful Shares,” 978-0-7695-4584-4/11 2011 IEEE.
[10].Ch. Ratna babu, M. Sridhar, Dr. B. Raveendra Babu, “Information Hiding in gray scale Images using Pseudo-Randomized Visual Cryptography Algorithm for visual Information Security,” IEEE International conference on information systems and computer networks, March 2013.
[11].Rajendra Basavegowda and Sheshadri Seenappa, “Electronic Medical Report Security Using Visual Secret Sharing Scheme,” 978-0-7695-4994- 1/13, 2013 IEEE.
[12].Jithi P V, Anitha T Nair, “Progressive Visual Cryptography with watermarking for meaningful shares,” by 978-1-4673-5090-7/13/ 2013 IEEE.
[13]. Adi Shamir, “How to Share a Secret,” published in ACM, Laboratory for Computer science, Massachusetts Institute of Technology, 1979.
[14]. Mehdi Hussain and Mureed Hussain, “A survey of image steganography technique,” International Journal of Advanced Science and Technology Vol. 54, May, 2013
[15]. Zhi Zhou, Gonzalo R. Arce and Giovanni Di Crescendo, “Half tone Visual Cryptography,” IEEE Transaction on image processing, vol.15, no.8, 2006.