+ All Categories
Home > Engineering > novel Approach For Data Hiding by integrating Steganography and Extended Visual Cryptography.

novel Approach For Data Hiding by integrating Steganography and Extended Visual Cryptography.

Date post: 17-Jul-2015
Category:
Upload: swapnalithakur7
View: 217 times
Download: 1 times
Share this document with a friend
Popular Tags:
13
Faculty In-charge: Prof. S.A.Dongre. Guided by: Prof. Ravikumar Sir.
Transcript
Page 1: novel Approach For Data Hiding by integrating Steganography and Extended Visual Cryptography.

Faculty In-charge:

Prof. S.A.Dongre.

Guided by:

Prof. Ravikumar Sir.

Page 2: novel Approach For Data Hiding by integrating Steganography and Extended Visual Cryptography.

Index.

Introduction.

Existing System.

Proposed System.- Algorithm.- Block Diagram.- Hardware.

Conclusion.

Page 3: novel Approach For Data Hiding by integrating Steganography and Extended Visual Cryptography.

Introduction.

Cryptography is an art of converting data into unreadable format.

Fig. Cryptography

Visual Cryptography is a special encryption technique to hide information in images in such a way that it can be decrypted by the human vision if the correct key image is used.

Page 4: novel Approach For Data Hiding by integrating Steganography and Extended Visual Cryptography.

Introduction(cont..)

Steganography means hiding one piece of data within another.

Fig. Steganography Model

Page 5: novel Approach For Data Hiding by integrating Steganography and Extended Visual Cryptography.

Existing System.

Existing reversible data hiding schemes the design of an encryption algorithm must provide security against unauthorized attacks.

Key oriented algorithms are very efficient but they were very bulky to manage as key handling must be done.

It provides one levels of security to the information being transmitted .

Page 6: novel Approach For Data Hiding by integrating Steganography and Extended Visual Cryptography.

Proposed System.

This system overcomes the demerits of using single level of hiding. That is either using cryptography or Steganography.

And one more thing to add is it requires only the computation time of single level hiding, because visual cryptography requires no computation to decrypt the information.

To improved quality of existing system, keyless random hiding techniques can be used.

Page 7: novel Approach For Data Hiding by integrating Steganography and Extended Visual Cryptography.

Framework for proposed system.

Page 8: novel Approach For Data Hiding by integrating Steganography and Extended Visual Cryptography.

VCSDH Algorithm algorithm

1. considered a secrete data and Encipher the datausing receiver public key as per RSA algorithm.

2 . Select an image as cover image to embed theencipher data into the image.

3. Transmit this Data hidden image that isstenography image along with video file.

4. Recover the steno image from the video file andrecover cipher from the steno image.

5. Decipher the text using its (receiver) ownprivate key and recovered cover image and secretdata.

Page 9: novel Approach For Data Hiding by integrating Steganography and Extended Visual Cryptography.

Visual Cryptography.

Overlay

Page 10: novel Approach For Data Hiding by integrating Steganography and Extended Visual Cryptography.

System Implementation.

Page 11: novel Approach For Data Hiding by integrating Steganography and Extended Visual Cryptography.

System Methodology.

1.Continuous Tone 2. Halftone

Fig. Share 1 Fig. Share 2

Decrypted Image

Page 12: novel Approach For Data Hiding by integrating Steganography and Extended Visual Cryptography.

References.

Visual Cryptography for General Access Structures,Carlo Blonde and Alfredo De Santis, Douglas R. Stinson.

Survey of Visual Cryptography Schemes,P.S.Revenkar, Anisa Anjum, W .Z.Gandhare.

Hiding data in images by simple LSB substitution,Chi-Kwong Chan∗, L.M. Cheng.

SECURED DATA HIDING BY USING EXTENDED VISUAL CRYPTOGRAPHY ,Megha Goel1, M. Chaudhari

Page 13: novel Approach For Data Hiding by integrating Steganography and Extended Visual Cryptography.

Recommended