Skip to main content

Advertisement

Log in

A stegano - visual cryptography technique for multimedia security

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Owing to the increasing growth in digital communication as well as the multimedia applications, security has now become a very significant problem in the communication as well as storage space of such images. The Visual Cryptography (VC) has been used for hiding the information that are in the images which is a special technique of encryption that is decrypted by a human visual system. In this paper, a technique for embedding a secret message within that of a cover-image to ensure the interceptors will not observe the presence of such hidden data is presented. The method has an essential conception by means of a simple Least Significant Bit (LSB) substitution. Being inspired by the steganography approach, the current work splits the cover images into n blocks of 8X 8 pixels and into a secret message of n partitions in order to improve the image quality and to increase the capacity of secret message along with its security level. For the purpose of improving this stego-image quality and for increasing the capacity of secret message along with its security level, being inspired by the current work that splits cover images into the n blocks of 8X 8 pixels and into a secret message of n partitions. In the proposed method, the Cuckoo Search (CS) is used for searching an approximate and optimal solution of finding any optimal substitution matrix to transform the message in every block as opposed to finding a single optimal matrix for substitution and the entire cover-image is presented. The final quality of its resulting in the stego-image, and its secret message and its capacity with the level of security of this method proposed will be calculated and then comparted to the other different methods. The results of the experiment proved that the proposed method outperformed all the Joint Photographic Experts Group (the JPEG) and the Joint Quantization Table Modification (the JQTM) based method in terms of quality of image, security level and embedding capacity.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Abbas SA, El Arif TI, Ghaleb FF, Khamis SM (2015) Optimized video steganography using Cuckoo Search algorithm. In Intelligent Computing and Information Systems (ICICIS), 2015 IEEE Seventh International Conf: 572-577. IEEE

  2. Almohammad A, Hierons RM, Ghinea G (2008) High capacity steganographic method based upon JPEG. In Availability, Reliability and Security, 2008. ARES 08. Third International Conf: 544–549. IEEE

  3. Awad A (2017) A survey of spatial domain techniques in image steganography. J Educ College Wasit Univ 1(26):497–510

    Article  Google Scholar 

  4. Bloisi DD, Iocchi L (2007) Image based steganography and cryptography. VISAPP 1:127–134

    Google Scholar 

  5. Chang CC, Chen TS, Chung LZ (2002) A steganographic method based upon JPEG and quantization table modification. Inf Sci 141(1-2):123–138

    Article  Google Scholar 

  6. Chhabra N (2012) Visual cryptographic steganography in images. Int J Comput Sci Netw Sec (IJCSNS) 12(4):126

    Google Scholar 

  7. Fazli S, Kiamini M (2008) A high_performance steganographic method using JPEG and PSO algorithm. In Multitopic Conference, 2008. INMIC 2008. IEEE International (pp. 100-105). IEEE.

  8. Geetha P, Jayanthi VS, Jayanthi AN (2018) Optimal visual cryptographic scheme with multiple share creation for multimedia applications. Comput Sec 78:301–320

    Article  Google Scholar 

  9. Gupta R, Jain A, Singh G (2012) Combine use of steganography and visual cryptography for secured data hiding in computer forensics. Int J Comput Sci Inform Technol 3(3):4366–4370

    Google Scholar 

  10. Kumar RH, Kumar PH, Sudeepa KB, Aithal G (2013) Enhanced security system using symmetric encryption and visual cryptography. Int J Adv Eng Technol 6(3):1211

    Google Scholar 

  11. Li X, Wang J (2007) A steganographic method based upon JPEG and particle swarm optimization algorithm. Inf Sci 177(15):3099–3109

    Article  Google Scholar 

  12. Marwaha P, Marwaha P (2010) Visual cryptographic steganography in images. Computing communication and networking technologies (ICCCNT), 2010 international conference: 1-6). IEEE

  13. Mishra A, Johri P, Mishra A (2017) An approach to secure communication using steganography with cryptography in an audio file using GA. Int J Innov Adv Comput Sci 6 (12)

  14. Muhammad K, Ahmad J, Farman H, Jan Z, Sajjad M, Baik SW (2015) A secure method for color image steganography using gray-level modification and multi-level encryption. TIIS 9(5):1938–1962

    Google Scholar 

  15. Muhammad K, Sajjad M, Mehmood I, Rho S, Baik SW (2016) A novel magic LSB substitution method (M-LSB-SM) using multi-level encryption and achromatic component of an image. Multimed Tools Appl 75(22):14867–14893

    Article  Google Scholar 

  16. Muhammad K, Sajjad M, Mehmood I, Rho S, Baik SW (2016) Image steganography using uncorrelated color space and its application for security of visual contents in online social networks. Futur Gener Comput Syst

  17. Muhammad K, Ahmad J, Rho S, Baik SW (2017) Image steganography for authenticity of visual contents in social networks. Multimed Tools Appl 76(18):18985–19004

    Article  Google Scholar 

  18. Muhammad K, Ahmad J, Rehman NU, Jan Z, Sajjad M (2017) CISSKA-LSB: color image steganography using stego key-directed adaptive LSB substitution method. Multimed Tools Appl 76(6):8597–8626

    Article  Google Scholar 

  19. Prema G, Natarajan S (2013) Steganography using genetic algorithm along with visual cryptography for wireless network application. Information communication and embedded systems (ICICES), 2013 international conference: 727-730. IEEE

  20. Ramalingam M, Isa NAM (2015) A steganography approach over video images to improve security. Indian J Sci Technol 8(1):79–86

    Article  Google Scholar 

  21. Rani MMS, Mary GG (2016) Enhancement of RGB shares of visual cryptography using PSO. Int J Comput Sci Inform Sec 14(9):938

    Google Scholar 

  22. Rani MMS, Mary GG (2017). Particle swarm optimization based image enhancement of visual cryptography shares. Artificial intelligence and computer vision (pp. 31-49). Springer, Cham

    Google Scholar 

  23. Rani MMS, Mary GG, Euphrasia KR (2016) Multilevel multimedia security by integrating visual cryptography and steganography techniques. In Computational intelligence, cyber security and computational models (pp. 403-412). Springer, Singapore

    Google Scholar 

  24. Roy S, Venkateswaran P (2014) Online payment system using steganography and visual cryptography. Electrical, electronics and computer science (SCEECS), 2014 IEEE Students' Conf: 1-5. IEEE.

  25. Saleh ME, Aly AA, Omara FA (2016) Data security using cryptography and steganography techniques. IJACSA) Int J Adv Comput Sci Appl, 7(6)

  26. Sarmah DK, Kulkarni AJ (2018) JPEG based steganography methods using cohort intelligence with cognitive computing and modified multi random start local search optimization algorithms. Inf Sci 430:378–396

    Article  Google Scholar 

  27. Shankar K, Lakshmanaprabu SK (2018) Optimal key based homomorphic encryption for color image security aid of ant lion optimization algorithm. Int J Eng Technol 7(1.9):22–27

    Article  Google Scholar 

  28. Walia GS, Makhija S, Singh K, Sharma K (2018) Robust stego-key directed LSB substitution scheme based upon cuckoo search and chaotic map. Optik 170:106–124

    Article  Google Scholar 

  29. Yang XS, Deb S (2014) Cuckoo search: recent advances and applications. Neural Comput Applic 24(1):169–174

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to K. Gurunathan.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Gurunathan, K., Rajagopalan, S.P. A stegano - visual cryptography technique for multimedia security. Multimed Tools Appl 79, 3893–3911 (2020). https://doi.org/10.1007/s11042-019-7471-1

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-019-7471-1

Keywords

Navigation