multilayer security for images using visual cryptography and steganography

K.N.Keerthana,S.Kavitha,R.Karthi,K.Lakksha

Published in International Journal of Advanced Research in Computer Science Engineering and Information Technology

ISSN: 2321-3337          Impact Factor:1.521         Volume:4         Issue:3         Year: 28 March,2016         Pages:477-486

International Journal of Advanced Research in Computer Science Engineering and Information Technology

Abstract

Recently, numerous novel algorithms have been proposed in the fields of steganography and visual cryptography with the goals of improving security, reliability, and efficiency. Privacy in communication is desired when confidential information is shared between two parties. Mainly this project uses DCT, IDCT, neural networks and visual cryptography. The proposed system provides multilayer security. The level of security is achieved by using steganography followed by visual cryptography. The secret image is embedded into the cover image. Then the encrypted image is divided into 3 shares. If the secret key valids, first share will be displayed. By analyzing the finger print and knuckle print, the embedded image obtained by combining the remaining shares and the extracted secret image will be displayed respectively. This project is implemented using Matlab software.

Kewords

DCT, IDCT, neural networks, shares, Steganography, Visual Cryptography.

Reference

[1] Mahmoud Hanan,Al-Dawood Aljoharah [2010] Novel Technique for Steganography in fingerprints Image : Design and Implementation Sixth International conference on Information Assurance and Security . [2] Marvel L.M [1999] Spread Spectrum Image Steganography, IEEE TRANSACTION ON IMAGE PROCESSING,vol. 8 ,Pp- 1075-1083 [3] L. Hong, Y. Wan, A. Jain, Fingerprint image enhancement: algorithm and performance evaluation , IEEE Transactions on Pattern Analysis and Machine Intelligence 20 (8) (1998) 777 789. [4] Q. Zhao, D. Zhang, L. Zhang, N. Luo, Adaptive fingerprint pore modeling and extraction, Pattern Recognition 43 (8) (2010) 2833–2844. [5] C. Han, H. Cheng, C. Lin, K. Fan, Personal authentication using palm-print features, Pattern Recognition 36 (2) (2003) 371–381.