Open Access   Article Go Back

Design of Arbitrary Image Slicer in Execution of Steganography

A.Balasubramani 1 , Chdv. Subba Rao2

  1. Faculty of Computer Science and Engineering, SIETK, Puttur, India.
  2. S.V.U College of Engineering, S.V.University, Tirupati, India.

Correspondence should be addressed to: balunbkr@yahoo.co.in.

Section:Research Paper, Product Type: Journal Paper
Volume-5 , Issue-11 , Page no. 40-43, Nov-2017

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v5i11.4043

Online published on Nov 30, 2017

Copyright © A.Balasubramani, Chdv. Subba Rao . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: A.Balasubramani, Chdv. Subba Rao, “Design of Arbitrary Image Slicer in Execution of Steganography,” International Journal of Computer Sciences and Engineering, Vol.5, Issue.11, pp.40-43, 2017.

MLA Style Citation: A.Balasubramani, Chdv. Subba Rao "Design of Arbitrary Image Slicer in Execution of Steganography." International Journal of Computer Sciences and Engineering 5.11 (2017): 40-43.

APA Style Citation: A.Balasubramani, Chdv. Subba Rao, (2017). Design of Arbitrary Image Slicer in Execution of Steganography. International Journal of Computer Sciences and Engineering, 5(11), 40-43.

BibTex Style Citation:
@article{Rao_2017,
author = {A.Balasubramani, Chdv. Subba Rao},
title = {Design of Arbitrary Image Slicer in Execution of Steganography},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {11 2017},
volume = {5},
Issue = {11},
month = {11},
year = {2017},
issn = {2347-2693},
pages = {40-43},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1537},
doi = {https://doi.org/10.26438/ijcse/v5i11.4043}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v5i11.4043}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1537
TI - Design of Arbitrary Image Slicer in Execution of Steganography
T2 - International Journal of Computer Sciences and Engineering
AU - A.Balasubramani, Chdv. Subba Rao
PY - 2017
DA - 2017/11/30
PB - IJCSE, Indore, INDIA
SP - 40-43
IS - 11
VL - 5
SN - 2347-2693
ER -

VIEWS PDF XML
852 628 downloads 357 downloads
  
  
           

Abstract

A new coding technique is projected in this paper. Steganography and visual Cryptography is employed to achieve the security. The secret colour image is hidden behind a canopy image. The steganographic image is currently sliced into multiple slices and transmitted in an open system setting. At the receiver side, the received slices are organised in such a way that to come up with the original image, that has the secret colour image hidden in it. This can be done by Visual Cryptography. Currently Steganography is employed on this image to get the secret image.

Key-Words / Index Term

Cryptography, Steganography, secret image

References

[1]. M. Naor and A. Shamir, “Visual cryptography,” in Proc. Adv. Cryptol.: EUROCRYPT, vol. 950. 1995, pp. 1–12.
[2]. Thomas Monoth and Babu Anto P “Contrast-Enhanced Visual Cryptography Schemes Based on Additional Pixel Patterns”, 978-0-7695- 4215-7/10 2010 IEEE.
[3].S.Punitha, S. Thompson and N.Siva Rama Ling “Binary Watermarking Technique based on Visual Cryptography,” 978-1-4244-7770-8/10/ 2010 IEEE.
[4]. E.Sangeetha Devi, “Enhanced Visual Secret Sharing Scheme via Halftoning Technique”, 978-1-4244-7770-8/10/2010 IEEE.
[5]. Divya.A and K. Ramalakshmi, “Maintaining the Secrecy in Visual Cryptography Schemes,” 978-1-4244 -8679-3/11/2011 IEEE.
[6]. Ali Makki Sagheer, Salah Sleibi Al-Rawi and Laith hamid Abed, “Visual Cryptography Technique based on FFT,” 978-0 7695-4593-6/11 2011 IEEE.
[7]. InKoo Kang, Gonzalo R. Arce, “Color Extended Visual Cryptography Using Error Diffusion”, and Heung-Kyu Lee, 1057 7149/ 2010 IEEE.
[8]. Young-Chang Hou, Zen-Yu Quan, “Progressive Visual Cryptography with Unexpanded Shares,” IEEE Transactions on Circuits And Systems For Video Technology, Vol. 21, No. 11, November 2011.
[9]. HAN Yan-yan, Xi’an China, “A Watermarking-based Visual Cryptography Scheme with Meaningful Shares,” 978-0-7695-4584-4/11 2011 IEEE.
[10].Ch. Ratna babu, M. Sridhar, Dr. B. Raveendra Babu, “Information Hiding in gray scale Images using Pseudo-Randomized Visual Cryptography Algorithm for visual Information Security,” IEEE International conference on information systems and computer networks, March 2013.
[11].Rajendra Basavegowda and Sheshadri Seenappa, “Electronic Medical Report Security Using Visual Secret Sharing Scheme,” 978-0-7695-4994- 1/13, 2013 IEEE.
[12].Jithi P V, Anitha T Nair, “Progressive Visual Cryptography with watermarking for meaningful shares,” by 978-1-4673-5090-7/13/ 2013 IEEE.
[13]. Adi Shamir, “How to Share a Secret,” published in ACM, Laboratory for Computer science, Massachusetts Institute of Technology, 1979.
[14]. K. Arora, G. Gandhi, "A Review of Approaches for Steganography", International Journal of Computer Sciences and Engineering, Vol.2, Issue.5, pp.118-122, 2014.
[15]. Zhi Zhou, Gonzalo R. Arce and Giovanni Di Crescendo, “Half tone Visual Cryptography,” IEEE Transaction on image processing, vol.15, no.8, 2006.