Main Article Content
Recently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512x512) is divided into three layers (red, green and blue). The blue layer is transformed using Discrete Shearlet Transform (DST) to obtain its coefficients. The first secret share is embedded at the coefficients of transformed blue layer to obtain a stego image. At extraction process, the first secret share is extracted from the coefficients of blue layer of the stego image and XORed with the second secret share to generate the original secret logo. According to the experimental results, the proposed method is achieved better imperceptibility for the stego image with the payload capacity equal to (1 bpp). In addition, the secret logo becomes more secured using (2 out 2 share) visual cryptography and the second secret share as a private key.
This work is licensed under a Creative Commons Attribution 4.0 International License.
Ahmaderaghi B, Rincon J, Kurugollu F, Bouridane A. Perceptual Watermarking for Discrete Shearlet Transform. In proceedings of 2014 5th European Workshop on Visual Information Processing (EUVIP). Paris, France, IEEE, 2014: 1- 6.
Ansari AS, Mohammadi MS, Parvez MT. A Comparative Study of Recent Steganography Techniques for Multiple Image Formats. IJCNIS, 2019; 11(1):11-25.
PRIYA S, SANTHI B, RAJA MOHAN J. Medical Image Watermarking Technique Using Image Interpolation in Transform Domain. Int J Eng Technol. 2018; 7(3.12): 711-714.
Zhao J, Fan Sh, Jia J, Zhang Sh, Jiang B, Xu W, et al. Texture Directionality-Based Digital Watermarking in Nonsubsample Shearlet Domain. Math Probl Eng, 2017; (2017):1-14.
Vijay Ananth S, Sudhakar P. Performance Analysis of a Combined Cryptographic and Steganographic Method over Thermal Images using Barcode Encoder. Indian J. Sci. Technol. 2016; 9(7): 1-5.
Subhedara MS, Mankar VH. Current status and key issues in image steganography: A survey. Comput Sci Rev. 2014; (13-14): 95-113.
Li B, He JH, Huang JW, Shi YQ. A Survey on Image Steganography and Steganalysis. JIHMSP. 2011; 2(2): 142-173.
Laishram D, Tuithung TH. A Survey on Digital Image Steganography: Current Trends and Challenges, Proceedings of 3rd International Conference on Internet of Things and Connected Technologies (ICIoTCT) Jaipur, India. 2018: 1-17.
Sun Sh, Guo Y. A Novel Image Steganography Based on Contourlet Transform and Hill Cipher. JIHMSP. 2015; 6(5): 889-897.
Taha MS, Mohd Rahim MS, Lafta SA, Hashim MM, Alzuabidi HM. Combination of Steganography and Cryptography: A short Survey, 2nd International Conference on Sustainable Engineering Techniques (ICSET 2019). Baghdad, Iraq. IOP Conf Ser Mater Sci Eng. 2019; (518): 1-14.
Sun Sh. A New Information Hiding Method Based on Improved BPCS Steganography. Adv. Multimed. 2015; (2015): 1-7.
Ahmaderaghi B, Kurugollu F, Rincon J, Bouridane A. Blind image watermark detection algorithm based on discrete shearlet transform using statistical decision theory. IEEE Trans Comput Imaging. 2018; 4(1):46-59.
Hemalatha S, Dinesh Acharyaa U, Renuka A. Wavelet transform based steganography technique to hide audio signals in image. Procedia Comput Sci. 2015; 47(2015): 272-281.
Singh L, Singh AK, Singh PK. Secure data hiding techniques: a survey. Multimed Tools Appl. 2018; 2018:1-21.
Hamza YA. Highly Secure Image Steganography Approach Using Arnold’s Cat Map and Maximum Image Entropy. Proceedings of the International Conference on Information and Communication Technology ICICT'19, Baghdad, Iraq, ACM. 2019:134-138.
Mostaghim M, Boostani R. CVC:Chaotic visual cryptography to enhance steganography. 11th International ISC Conference on Information Security and Cryptology (ISCISC), Tehran, Iran. IEEE. 2014: 44-48.
Li Sh, Kang X, Fang L, Hu J, Yin H. Pixel-level image fusion: A survey of the state of the art. Inf Fusion. 2017; 33 (2017): 100-112.
Kutyniok G, Labate D. Introduction to Shearlets. Shearlets: Multiscale analysis for multivariate data. In: Kutyniok G, Labate D, editors. Applied and Numerical Harmonic Analysis. Boston: Birkhäuser Basel; 2012. Chapter (1).
Moonon A, Hu J, Li SH. Remote Sensing Image Fusion Method Based on Nonsubsampled Shearlet Transform and Sparse Representation. Sens Imaging. 2015; 16(23): 1-18.
Naor M, Shamir A. Visual Cryptography. Proceedings of the Advances in Cryptology, Perugia, Italy, EUROCRYPT’94 Springer. 1994; 950: 1-12.
Dahata AV, Chavan PV. Secret Sharing Based Visual Cryptography Scheme Using CMY Color Space. International Conference on Information Security & Privacy (ICISP2015), Nagpur, India. Procedia Comput Sci. 2015; 78 (2016): 563-570.