Skip to main content

Multilevel Multimedia Security by Integrating Visual Cryptography and Steganography Techniques

  • Conference paper
  • First Online:
Computational Intelligence, Cyber Security and Computational Models

Abstract

Multimedia security facilitates the protection of information in multiple forms of digital data such as text, image, audio and video. Many approaches are available for protecting digital data; these include Cryptography, Steganography, and Watermarking etc. A novel approach is proposed for multimedia data security by integrating Steganography and Visual Cryptography (VC) with the goal of improving security, reliability and efficiency. The proposed technique consists of two phases. The first phase is used to hide the message dynamically in an Cover Image1 by changing the number of bits hidden in RGB channels based on the indicator value. VC schemes conceal the Cover Image2 into two or more images which are called shares. In the second phase two shares are created from a Cover Image2 and the stego image created in the first phase is hidden in these two shares. The shares are safe as they reveal nothing about the multimedia content. The Cover Image2, stego image and the hidden message can be recovered from the shares without involving any complex computation. Experimental results show that the new scheme is simple and retrieves many multimedia contents and accomplishes a high level of security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 219.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 279.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Mandal, J.K., Debashis, D.: Color image steganography based on pixel value differencing in spatial domain. Int. J. Inf. Sci. Tech. (IJIST) 2(4), 83–93 (2012)

    Google Scholar 

  2. Naor, M., Shamir, A.: Visual Cryptography. In: Advances in Cryptology-EUROCRYPT’94, pp. 1–12 (1995)

    Google Scholar 

  3. Mary Shanthi Rani, M., G.G, Mary.: MSKS for data hiding and retrieval using visual cryptography. Int. J. Comput. Appl. 108(4), 41–46

    Google Scholar 

  4. Mary Shanthi Rani, M., Euphrasia, K.R.: Randomized hiding of an encrypted image with hidden data in RGB spatial domain. In: Proceedings of the National Conference on Recent Advances in Computer Science and Applications, pp. 148–151 (2015). ISBN 978-93-84743-57-4

    Google Scholar 

  5. Deshmukh, O., Sonavane, S.: Multi-share crypt-stego authentication system. Int. J. Comput. Sci. Mobile Comput. 2(2), 80–90 (2013)

    Google Scholar 

  6. Ambar, R., et.al.: Survey paper on multilevel security using VC and BPCS. Int. J. Comput. Sci. Inf. Technol. Res. 3(1), 58–62 (2015)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to M. Mary Shanthi Rani .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer Science+Business Media Singapore

About this paper

Cite this paper

Rani, M.M.S., Germine Mary, G., Rosemary Euphrasia, K. (2016). Multilevel Multimedia Security by Integrating Visual Cryptography and Steganography Techniques. In: Senthilkumar, M., Ramasamy, V., Sheen, S., Veeramani, C., Bonato, A., Batten, L. (eds) Computational Intelligence, Cyber Security and Computational Models. Advances in Intelligent Systems and Computing, vol 412. Springer, Singapore. https://doi.org/10.1007/978-981-10-0251-9_38

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-0251-9_38

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-0250-2

  • Online ISBN: 978-981-10-0251-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics