Skip to main content
Log in

A novel hybrid security mechanism for data communication networks

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

With the growing internet technology over the last decade, the number of intruders trying to steal the confidential information has also risen. As a result, for the protection of secret data from unwanted access, hybrid security mechanisms employing the use of steganography to hide the encrypted data are gaining popularity. These mechanisms provide an extra level of security to the data. This paper proposes a hybrid mechanism that not only aims at providing good security but at the same time has high data embedding capacity and entropy values with low execution time complexity. To enhance the embedding capacity of the overall system, Improved Bit Plane Complex Steganography (IBPCS) along-with Huffman coding is used and for providing randomness, the use of chaos process wherever possible is done. The cryptographic technique employed is hierarchical visual cryptography due to its efficiency over other cryptographic mechanisms. The overall scheme is implemented in MATLAB-10 and the results prove that the proposed mechanism is efficient to other available schemes in literature.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

References

  1. Chaudhary D, Gupta S, Kumari M (2015) “A Novel Hybid Security mechanism for Data Communication Networks” accepted for publication in Inderscience Journal

  2. Chavan PV, Atique M (2012) “Design of Hierarchical Vuisual Cryptography”, in proceedings of International Conference on Engineering, pp 1–3

  3. Goel S, Rana A, Kaur M (2013) “A Review of Comparison Techniques of Image Steganography” in proceedings of Global Journal of Computer Science and Technology Graphics & Vision, Vol. 13, Issue 4

  4. Gokul M, Umeshbabu R, Shriram K (2012) Vasudevan, Deepak karthik, “hybrid steganography using visual cryptography and LSB encryption method. Int J Comput Appl 59:5–8

    Google Scholar 

  5. Hodeish ME, Dr Humbe VT (2014) State-of-the-Art visual cryptography schemes. Int J Elect Commun Comput Eng 5(2):412–420

    Google Scholar 

  6. Huffman DA (1952) A method for the construction of minimum redundancy codes. IRE 40(9):1098–1101

    Article  MATH  Google Scholar 

  7. Islam RMd, Siddiqa A, Uddin MdP, Mandal AK and Hossain MdD (2014) “An Efficient Filtering Based Approach Improving LSB Image Steganography using Status Bit along with AES Cryptography” in proceedings of 3rd International Conference On Informatics, Electronics & Vision, pp 1–6

  8. Jain Y, Sharma G, Anand G, Dhall S, “A Hybrid Security Mechanism based on DCT and Visual Cryptography for Data Communication Networks” accepted for publication in CSI-2015 Journal

  9. Kaspersky Lab and INTERPOL (2014) “Mobile cyber-threats”, pp 11–12

  10. Kawaguchi E, Eason RO (1998) Principle and applications of BPCS- steganography. Soc Photog Instrumentation Eng (SPIE) 3528:464–473

    Google Scholar 

  11. Lokesh K (2012) Novel security scheme for image steganography using cryptography technique. Int J Ad Res Comput Scie Soft Eng (IJARCSSE) 2:143–146

    Google Scholar 

  12. Mandal S, Das S, Nath A (2014) Data hiding and retrival using visual cryptography. Int J Innov Res Ad Eng 1(1):102–110

    Google Scholar 

  13. Marwaha P, Marwaha P (2010) Visual Cryptographic Steganography in Images” in proceedings of Second International conference on Computing, Communication and Networking Technologies, pp 1–6

  14. Masud Karim SM, Rahman Md S, Hossain Md. I (2011) “A New Approach for LSB Based Image Steganography using Secret Key”, in proceedings of 14th International Conference on Computer and Information Technology (ICCIT 2011), pp 22–24

  15. Mohammad AA, and Abdel F (2012) “Public-Key Steganography Based on Matching Method” in European Journal of Scientific Research, pp 223–231

  16. Nivedhita R, Dr Meyyappan T (2012) Image security using steganography and cryptographic techniques. Int J Eng Trends and Technol 3:366–371

    Google Scholar 

  17. Pallavi Vijay C, Dr Mohammad A, Dr Latesh M (2014) Design and implementation of hierarchical visual cryptography with expansionless shares. Int J Net Secur Appl 6(1):91–102

    Google Scholar 

  18. Pye Pye A, Tun Min N (2014) A novel secure combination technique of steganography and cryptography. Int J Inf Technol /Mod Comput (IJITMC) 2:55–62

    Google Scholar 

  19. Ramakrishna M, Veera Raghava Rao A, Dr Srinivasan Kumar D (2012) Securing information: cryptography and steganography. Int J Comput Scie Inf Technol 3:4251–4255

    Google Scholar 

  20. Schwartz ES (1964) An optimum encoding with minimum longest code and total number of digits. Inf Control 7:37–44

    Article  MATH  MathSciNet  Google Scholar 

  21. Shailender G, Ankur G, Bharat B (2012) Information hiding using least significant Bit steganography and cryptography. J Mode Educ Comput Scie 6:27–34

    Google Scholar 

  22. Shelke FM, Dongre AA, Soni PD (2014) Comparison of different techniques for Steganography in images. Int J App Innov Eng Manag 3(2):171–176

    Google Scholar 

  23. Shi P, Li Z (2010) “An improved BPCS Steganography based on Dynamic Threshold”, in proceedings of International Conference on Multimedia Information Networking and Security, pp 388–391

  24. Shingote Parshuram N, Syed Akhter H, BhujpalPallavi M (2014) Advanced security using cryptography and LSB matching steganography. Int J Comput Elec Res 3:52–55

    Google Scholar 

  25. Singh S, Siddiqui TJ (2012)“A Security enhanced Robust Steganography Algorithm for Data Hiding” in proceedings of International Journal of Computer Science Issues, Vol. 9, Issue 3, No. 1, pp 131–139

  26. Stallings W, “Cryptography and Network Security: Principles and Practice” 4th edition.

  27. Usha S, SathishKumal GA, Boopathybagan K (2011) A secure triple level encryption method using cryptography and steganography. Int Conf Comput Scie Net Technol 2:1017–1020

    Google Scholar 

  28. Vinish A, Dr Senthil Prakash T, Ajmal H (2015) Enhanced hierarchical design for visual cryptography-overview. Int J Eng Technol Scie 2(4):46–50

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Neha Tayal.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Tayal, N., Bansal, R., Dhal, S. et al. A novel hybrid security mechanism for data communication networks. Multimed Tools Appl 76, 24063–24090 (2017). https://doi.org/10.1007/s11042-016-4111-x

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-016-4111-x

Keywords

Navigation