Skip to main content
Log in

A novel steganographic model for securing binary images

  • Original Research
  • Published:
International Journal of Information Technology Aims and scope Submit manuscript

Abstract

In this work, authors propose an approach for securing binary images. The proposed method is a two step technique based on visual cryptography scheme (VCS) and integer-to-integer wavelet transform techniques. First, two meaningless shares, master and ownership share are extracted from the binary image using (2,2)-random grid based VCS. Next, the master share is embedded into a cover image using reversible integer-to-integer wavelet transform providing a two-tier security to the binary message. The performance is analyzed by calculating peak signal to noise ratio (PSNR), mean square error (MSE) and cross-correlation coefficient (Rxy). Simulation results are also discussed for the cases when discrete cosine (DCT) and discrete wavelet transforms (DWT) are used in the second step.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

Abbreviations

VCS:

Visual cryptography scheme

DCT:

Discrete cosine transform

PSNR:

Peak signal to noise ratio

Rxy:

Cross-correlation coefficient

DWT:

Discrete wavelet transform

MSE:

Mean square error

References

  1. Naor M, Shamir A (1995) “Visual cryptography,” advances in cryptology-EUROCRYPT’94, LNCS 950. Springer-Verlag, Berlin, pp 1–12

    Google Scholar 

  2. Yang CN (2004) New visual secret sharing schemes using probabilistic method. Pattern Recogn Lett 25(4):481–494

    Article  Google Scholar 

  3. Shyu SJ (2007) Image encryption by random grids. Pattern Recogn 40(3):1014–1031

    Article  MATH  Google Scholar 

  4. Chen TH, Tsao KH (2011) User-friendly random-grid-based visual secret sharing. IEEE Trans Circuits Syst Video Technol 21(11):1693–1703

    Article  Google Scholar 

  5. Hou YC, Wei SC, Lin CY (2014) Random-grid-based visual cryptography schemes. IEEE Trans Circuits Syst Video Technol 24(5):733–744

    Article  Google Scholar 

  6. Joseph SK, Ramesh R (2015) Random grid based visual cryptography using a common share. In: international conference on computing and network communications (CoCoNet), Trivandrum, pp. 656–662

  7. Dang PP, Chau PM (2002) Integer fast wavelet transform and its VLSI implementation for low power applications. In: IEEE workshop on signal processing systems, pp. 93–98

  8. Reichel J, Menegaz G, Nadenau MJ, Kunt M (2001) Integer wavelet transform for embedded lossy to lossless image compression. IEEE Trans Image Process 10(3):383–392

    Article  MATH  Google Scholar 

  9. Yongqiang C, Hanping H (2010) Gray image watermark algorithm in integer wavelet transform domain. In: international conference on electrical and control engineering (ICECE), Wuhan, pp. 1096–1099

  10. Hsu CT, Wu JL (1999) Hidden digital watermarks in images. IEEE Trans Image Process 8(1):58–68

    Article  Google Scholar 

  11. Hsu CT, Wu JL (1998) DCT-based watermarking for video. IEEE Trans Consum Electron 44(1):206–216

    Article  Google Scholar 

  12. Barni M, Bartolini F, Cappellini V, Piva A (1998) A DCT-Domain system for robust image watermarking. Signal Process 66:357–372

    Article  MATH  Google Scholar 

  13. Kunhu A, Nisi K, Sabnam S, Majida A, Al Mansoori S (2016) Hybrid visual cryptography cum watermarking algorithm for copyright protection of images 2016. In: online international conference on green engineering and technologies (IC-GET), Coimbatore, India, pp. 1–5

  14. Kester QA, Nana L, Pascu AC, Gire S, Eghan JM, Quaynor NN (2015) A novel hybrid discrete cosine transformation and visual cryptographic technique for securing digital images. In: 2015 17th UKSim-AMSS international conference on modelling and simulation (UKSim), Cambridge, pp. 327–332

  15. Shivani S (2017) VMVC: verifiable multi-tone visual cryptography. In: Multimedia Tools and Applications, pp. 1–20

  16. Shivani S, Agarwal S (2016) VPVC: verifiable progressive visual cryptography. In: Pattern Analysis and Applications, pp. 1–28

  17. Abdullah MAM, Dlay SS, Woo WL, Chambers JA (2016) A framework for iris biometrics protection: a marriage between watermarking and visual cryptography. IEEE Access 4:10180–10193

    Article  Google Scholar 

  18. Li P, Yang C-N, Kong Q (2016) A novel two-in-one image secret sharing scheme based on perfect black visual cryptography. J Real-Time Image Process. 1–10. doi:10.1007/s11554-016-0621-z

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hemant Tulsani.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Tulsani, H., Chawla, P. & Gupta, R. A novel steganographic model for securing binary images. Int. j. inf. tecnol. 9, 273–280 (2017). https://doi.org/10.1007/s41870-017-0031-x

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s41870-017-0031-x

Keywords

Navigation