A Novel Technique for Secret Message / Image Transmission through (2, 2)Visual Cryptographic Protocol (SMITVCP)

نویسندگان

  • J. K. Mandal
  • S. Ghatak
چکیده

In this paper a secret message/image transmission technique has been proposed through (2, 2) visual cryptographic share which is non-interpretable in general. A binary image is taken as cover image and authenticating message/image has been fabricated into it through a hash function where two bits in each pixel within four bits from LSB of the pixel is embedded and as a result it converts the binary image to gray scale one. (2, 2) visual cryptographic shares are generated from this converted gray scale image. During decoding shares are combined to regenerate the authenticated image from where the secret message/image is obtained through the same hash function along with reduction of noise. Noise reduction is also done on regenerated authenticated image to regenerate original cover image at destination.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Novel Technique for Steganography Method Based on Improved Genetic Algorithm Optimization in Spatial Domain

This paper devotes itself to the study of secret message delivery using cover image and introduces a novel steganographic technique based on genetic algorithm to find a near-optimum structure for the pair-wise least-significant-bit (LSB) matching scheme. A survey of the related literatures shows that the LSB matching method developed by Mielikainen, employs a binary function to reduce the numbe...

متن کامل

Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation

In this paper a novel technique, Authentication and Secret Message Transmission using Discrete Fourier Transformation (ASMTDFT) has been proposed to authenticate an image and also some secret message or image can be transmitted over the network. Instead of direct embedding a message or image within the source image, choosing a window of size 2 x 2 of the source image in sliding window manner an...

متن کامل

DFT based Hiding Technique for Colour Image Authentication (DFTHTCIA)

In this paper a novel data hiding technique in frequency domain has been proposed using Discrete Fourier Transform (DFT) for colour image authentication and secret message transmission. Image authentication is done by embedding message/image in frequency domain by choosing image blocks of size 2 × 2, called mask, from the source image in row major order and transform it into the frequency domai...

متن کامل

A Probabilistic Model of Visual Cryptography Using Halftoned Technique for Color Image

Visual Cryptography is a special type of encryption technique which is used to hide the information and data in images. In this technique the decryption process is done without any complex cryptographic computation. The encrypted data is decrypted using Human Visual System (HVS). This is the benefit of the visual secret sharing scheme. The encryption technique requires a cryptographic computati...

متن کامل

A Novel Approach for Cheating Prevention through Visual Cryptographic Analysis

Confidentiality is probably the most common aspect of information security and we need to protect our valuable information and it has become an inseparable issue as information technology is ruling the world now. Cryptography is the study of integer mathematical techniques related aspects of Information Security such as confidentiality, data security, entity authentication and data origin authe...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1212.3370  شماره 

صفحات  -

تاریخ انتشار 2012