Advertisement

Steganography Based Visual Cryptography (SBVC)

  • Ritesh Mukherjee
  • Nabin Ghoshal
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 199)

Abstract

A digital signature performs the function of conventional handwritten signatures for authentication of documents, data integrity and non-repudiation. Most of the conventional digital signature schemes are based on complex mathematical computations to generate the keys and verify signatures. In late nineteen century comparatively less computation based scheme known as visual cryptography (VC) is introduced. VC has high security and requires comparatively less complex computations. In this paper, we consider a new digital signature scheme, based on the concept of Visual Secret Sharing associated to XOR-based non-expansion visual cryptography systems. Our proposed scheme is towards enhancement of security of born digital and digitized document by generating visual shares and embedding them within a cover image using steganographic techniques rather than complicated mathematical computations. The proposed scheme could be applied for ownership protection, copy control, authentication of digital media etc.

Keywords

VC Steganography MSE PSNR IF RSA DS 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Naor, M., Shamir, A.: Visual Cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)CrossRefGoogle Scholar
  2. 2.
    Radhakrishnan, R., Kharrazi, M., Menon, N.: Data Masking: A new approach for steganography. Journal of VLSI Signal Processing 41, 293–303 (2005)Google Scholar
  3. 3.
    Naor, M., Pinkas, B.: Visual Authentication and Identification. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 322–336. Springer, Heidelberg (1997)CrossRefGoogle Scholar
  4. 4.
    Amin, P., Lue, N., Subbalakshmi, K.: Statistically secure digital image data hiding. In: IEEE Multimedia Signal Processing MMSP 2005, Shanghai, China (October 2005)Google Scholar
  5. 5.
    Pavan, S., Gangadharpalli, S., Sridhar, V.: Multivariate entropy detector based hybrid image registration algorithm. In: IEEE Int. Conf. on Acoustics, Speech and Signal Processing, Philadelphia, Pennsylvania, USA, pp. 18–23 (March 2005)Google Scholar
  6. 6.
    Rivest, R., Shamir, A., Adleman, L.: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM 21(2), 120–126 (1978)CrossRefMATHMathSciNetGoogle Scholar
  7. 7.
    Laih, C.S., Chen, K.Y.: Generating visible RSA public keys for PKI. Int. J. Secur. 2(2), 103–109 (2004)CrossRefGoogle Scholar
  8. 8.
    El Gamal: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inform. Theory IT 31(4), 469–472 (1985)CrossRefMATHMathSciNetGoogle Scholar
  9. 9.
    Alia, M., Samsudin, A.: A new Digital Signature Scheme Based on Mandelbrot and Julia Fract Seta. Americal Journal of Applied Science, AJAS 4(11), 850–858 (2007)Google Scholar
  10. 10.
    Al-Hamami, A.H., Al-Ani, S.A.: A New Approach for Authentication Technique. Journal of Computer Science 1(1), 103–106 (2005) ISSN 1549-3636Google Scholar
  11. 11.
    Rijmen, V., Preneel, B.: Efficient colour visual encryption for shared colors of Benetton. In: Eurocrypto 1996, Rump Session, Berlin (1996)Google Scholar
  12. 12.
    Verhuel, E.R., Tilborg, V.: Construction and Properties of k out of n visual secret sharing schemes. Designs, Codes and Cryptography 11, 179–196 (1997)CrossRefGoogle Scholar
  13. 13.
    Zhang, H., Wang, X., Cao, W., Huang, Y.: Visual Cryptographic for General Access Structure by Multi-pixel Encoding with Variable Block Size. In: International Symposium on Knowledge Acquisition and Modeling (2008)Google Scholar
  14. 14.
    Tsai, D.-S., Horng, G., Chen, T.-H., Huang, Y.-T.: A Novel Secret Image Sharing Scheme For True-Color Images With Size Constraint. Information Sciences 179, 3247–3254 (2009)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  1. 1.Centre for Development of Advanced ComputingKolkataIndia
  2. 2.Dept. of Engineering and Technological StudiesUniversity of KalyaniKalyaniIndia

Personalised recommendations