Information Privacy Using Stego-Data Element with Visual Cryptography
There exist many techniques for information hiding in images such that any alterations done in the image are perceptually invisible. Steganography and visual cryptography are most widely used methods for information hiding. Steganography uses a mask image and hides the information within the mask image whereas visual cryptography provides information hiding by creating shares of the image. The proffered algorithm performs steganography using region incrementing method combined with Floyd halftone approach to perform visual cryptography. The proffered method takes in the image to be classified and the other image to act as a mask for it. The mask image is converted into the CMY color model and each CMY component is then halftoned and reverse halftoned. A random select method is designed which processes every pixel of every region of the classified image in an incrementing method and embeds the processed pixels in each of the halftoned and reverse halftoned components. The shares are then generated by combining the halftoned and reverse halftoned components. The classified image is obtained only after the entire halftoned share is combined.
KeywordsSteganography Floyd halftone Region incrementing Visual cryptography Mask image CMY color model Random select Halftone Reverse halftone
- 1.Chandramouli R (2001) Nasir Memon: analysis of LSB based image Steganography techniques. IEEE Trans Image Process 3:1019–1022Google Scholar
- 2.Parvez MT, Gutub AAA (2008) RGB intensity based variable-bits image steganography. Asia Pacific services computing conference. IEEE, pp 1322–1327Google Scholar
- 3.Askari N, Moloney C, Heys HM (2012) A novel visual secret sharing scheme without image size expansion. In: 25th IEEE Canadian conference on electrical and computer engineering, pp 1–4Google Scholar
- 6.Askari N, Heys HM, Moloney CR (2013) An extended visual cryptography scheme without pixel expansion for HalfTone images. In: 26th IEEE Canadian conference on electrical and computer engineering, pp 1–6Google Scholar