Abstract
With the growing internet technology over the last decade, the number of intruders trying to steal the confidential information has also risen. As a result, for the protection of secret data from unwanted access, hybrid security mechanisms employing the use of steganography to hide the encrypted data are gaining popularity. These mechanisms provide an extra level of security to the data. This paper proposes a hybrid mechanism that not only aims at providing good security but at the same time has high data embedding capacity and entropy values with low execution time complexity. To enhance the embedding capacity of the overall system, Improved Bit Plane Complex Steganography (IBPCS) along-with Huffman coding is used and for providing randomness, the use of chaos process wherever possible is done. The cryptographic technique employed is hierarchical visual cryptography due to its efficiency over other cryptographic mechanisms. The overall scheme is implemented in MATLAB-10 and the results prove that the proposed mechanism is efficient to other available schemes in literature.
Similar content being viewed by others
References
Chaudhary D, Gupta S, Kumari M (2015) “A Novel Hybid Security mechanism for Data Communication Networks” accepted for publication in Inderscience Journal
Chavan PV, Atique M (2012) “Design of Hierarchical Vuisual Cryptography”, in proceedings of International Conference on Engineering, pp 1–3
Goel S, Rana A, Kaur M (2013) “A Review of Comparison Techniques of Image Steganography” in proceedings of Global Journal of Computer Science and Technology Graphics & Vision, Vol. 13, Issue 4
Gokul M, Umeshbabu R, Shriram K (2012) Vasudevan, Deepak karthik, “hybrid steganography using visual cryptography and LSB encryption method. Int J Comput Appl 59:5–8
Hodeish ME, Dr Humbe VT (2014) State-of-the-Art visual cryptography schemes. Int J Elect Commun Comput Eng 5(2):412–420
Huffman DA (1952) A method for the construction of minimum redundancy codes. IRE 40(9):1098–1101
Islam RMd, Siddiqa A, Uddin MdP, Mandal AK and Hossain MdD (2014) “An Efficient Filtering Based Approach Improving LSB Image Steganography using Status Bit along with AES Cryptography” in proceedings of 3rd International Conference On Informatics, Electronics & Vision, pp 1–6
Jain Y, Sharma G, Anand G, Dhall S, “A Hybrid Security Mechanism based on DCT and Visual Cryptography for Data Communication Networks” accepted for publication in CSI-2015 Journal
Kaspersky Lab and INTERPOL (2014) “Mobile cyber-threats”, pp 11–12
Kawaguchi E, Eason RO (1998) Principle and applications of BPCS- steganography. Soc Photog Instrumentation Eng (SPIE) 3528:464–473
Lokesh K (2012) Novel security scheme for image steganography using cryptography technique. Int J Ad Res Comput Scie Soft Eng (IJARCSSE) 2:143–146
Mandal S, Das S, Nath A (2014) Data hiding and retrival using visual cryptography. Int J Innov Res Ad Eng 1(1):102–110
Marwaha P, Marwaha P (2010) Visual Cryptographic Steganography in Images” in proceedings of Second International conference on Computing, Communication and Networking Technologies, pp 1–6
Masud Karim SM, Rahman Md S, Hossain Md. I (2011) “A New Approach for LSB Based Image Steganography using Secret Key”, in proceedings of 14th International Conference on Computer and Information Technology (ICCIT 2011), pp 22–24
Mohammad AA, and Abdel F (2012) “Public-Key Steganography Based on Matching Method” in European Journal of Scientific Research, pp 223–231
Nivedhita R, Dr Meyyappan T (2012) Image security using steganography and cryptographic techniques. Int J Eng Trends and Technol 3:366–371
Pallavi Vijay C, Dr Mohammad A, Dr Latesh M (2014) Design and implementation of hierarchical visual cryptography with expansionless shares. Int J Net Secur Appl 6(1):91–102
Pye Pye A, Tun Min N (2014) A novel secure combination technique of steganography and cryptography. Int J Inf Technol /Mod Comput (IJITMC) 2:55–62
Ramakrishna M, Veera Raghava Rao A, Dr Srinivasan Kumar D (2012) Securing information: cryptography and steganography. Int J Comput Scie Inf Technol 3:4251–4255
Schwartz ES (1964) An optimum encoding with minimum longest code and total number of digits. Inf Control 7:37–44
Shailender G, Ankur G, Bharat B (2012) Information hiding using least significant Bit steganography and cryptography. J Mode Educ Comput Scie 6:27–34
Shelke FM, Dongre AA, Soni PD (2014) Comparison of different techniques for Steganography in images. Int J App Innov Eng Manag 3(2):171–176
Shi P, Li Z (2010) “An improved BPCS Steganography based on Dynamic Threshold”, in proceedings of International Conference on Multimedia Information Networking and Security, pp 388–391
Shingote Parshuram N, Syed Akhter H, BhujpalPallavi M (2014) Advanced security using cryptography and LSB matching steganography. Int J Comput Elec Res 3:52–55
Singh S, Siddiqui TJ (2012)“A Security enhanced Robust Steganography Algorithm for Data Hiding” in proceedings of International Journal of Computer Science Issues, Vol. 9, Issue 3, No. 1, pp 131–139
Stallings W, “Cryptography and Network Security: Principles and Practice” 4th edition.
Usha S, SathishKumal GA, Boopathybagan K (2011) A secure triple level encryption method using cryptography and steganography. Int Conf Comput Scie Net Technol 2:1017–1020
Vinish A, Dr Senthil Prakash T, Ajmal H (2015) Enhanced hierarchical design for visual cryptography-overview. Int J Eng Technol Scie 2(4):46–50
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Tayal, N., Bansal, R., Dhal, S. et al. A novel hybrid security mechanism for data communication networks. Multimed Tools Appl 76, 24063–24090 (2017). https://doi.org/10.1007/s11042-016-4111-x
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-016-4111-x