A New Approach to Enhance Security of Visual Cryptography Using Steganography (VisUS)

03/17/2021
by   Uttam Kr. Mondal, et al.
0

Steganography is a process that hides secrete message or secrete hologram or secrete video or secrete image whose mere presence within the source data should be undetectable and use for transmitting secret information over public media. Visual cryptography is a cryptographic technique in which no cryptographic computation is needed at the decryption end and the decryption is performed by the human visual system (HVS). In this paper, both Steganography and visual cryptography have been selected to provide more secure data transmission over the public media with less hazard of computation. This technique generates shares with less space overhead as well as without increasing the computational complexity compared to existing techniques and may provide better security. It is also easy to implement like other techniques of visual cryptography. Finally, experimental results are given to establish the security criteria.

READ FULL TEXT

page 3

page 4

page 5

research
12/10/2022

Realization Scheme for Visual Cryptography with Computer-generated Holograms

We propose to realize visual cryptography in an indirect way with the he...
research
12/22/2019

Hiding Data in Images Using Cryptography and Deep Neural Network

Steganography is an art of obscuring data inside another quotidian file ...
research
04/04/2017

Using Echo State Networks for Cryptography

Echo state networks are simple recurrent neural networks that are easy t...
research
02/28/2019

Enhanced Security of Symmetric Encryption Using Combination of Steganography with Visual Cryptography

Data security is required when communications over untrusted networks ta...
research
12/15/2020

Review and Test of Steganography Techniques

Steganography is the art of concealing a secret message within an approp...
research
04/18/2018

The Reincarnation of Grille Cipher

In order to keep the data secret, various techniques have been implement...
research
12/21/2020

A Secured Protocol for IoT Networks

Researchers in the past have shown that Symmetric key cryptography is ge...

Please sign up or login with your details

Forgot password? Click here to reset