Abstract
Multimedia security facilitates the protection of information in multiple forms of digital data such as text, image, audio and video. Many approaches are available for protecting digital data; these include Cryptography, Steganography, and Watermarking etc. A novel approach is proposed for multimedia data security by integrating Steganography and Visual Cryptography (VC) with the goal of improving security, reliability and efficiency. The proposed technique consists of two phases. The first phase is used to hide the message dynamically in an Cover Image1 by changing the number of bits hidden in RGB channels based on the indicator value. VC schemes conceal the Cover Image2 into two or more images which are called shares. In the second phase two shares are created from a Cover Image2 and the stego image created in the first phase is hidden in these two shares. The shares are safe as they reveal nothing about the multimedia content. The Cover Image2, stego image and the hidden message can be recovered from the shares without involving any complex computation. Experimental results show that the new scheme is simple and retrieves many multimedia contents and accomplishes a high level of security.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Mandal, J.K., Debashis, D.: Color image steganography based on pixel value differencing in spatial domain. Int. J. Inf. Sci. Tech. (IJIST) 2(4), 83–93 (2012)
Naor, M., Shamir, A.: Visual Cryptography. In: Advances in Cryptology-EUROCRYPT’94, pp. 1–12 (1995)
Mary Shanthi Rani, M., G.G, Mary.: MSKS for data hiding and retrieval using visual cryptography. Int. J. Comput. Appl. 108(4), 41–46
Mary Shanthi Rani, M., Euphrasia, K.R.: Randomized hiding of an encrypted image with hidden data in RGB spatial domain. In: Proceedings of the National Conference on Recent Advances in Computer Science and Applications, pp. 148–151 (2015). ISBN 978-93-84743-57-4
Deshmukh, O., Sonavane, S.: Multi-share crypt-stego authentication system. Int. J. Comput. Sci. Mobile Comput. 2(2), 80–90 (2013)
Ambar, R., et.al.: Survey paper on multilevel security using VC and BPCS. Int. J. Comput. Sci. Inf. Technol. Res. 3(1), 58–62 (2015)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer Science+Business Media Singapore
About this paper
Cite this paper
Rani, M.M.S., Germine Mary, G., Rosemary Euphrasia, K. (2016). Multilevel Multimedia Security by Integrating Visual Cryptography and Steganography Techniques. In: Senthilkumar, M., Ramasamy, V., Sheen, S., Veeramani, C., Bonato, A., Batten, L. (eds) Computational Intelligence, Cyber Security and Computational Models. Advances in Intelligent Systems and Computing, vol 412. Springer, Singapore. https://doi.org/10.1007/978-981-10-0251-9_38
Download citation
DOI: https://doi.org/10.1007/978-981-10-0251-9_38
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-0250-2
Online ISBN: 978-981-10-0251-9
eBook Packages: EngineeringEngineering (R0)