Skip to main content

2018 | OriginalPaper | Buchkapitel

A Hybrid Security Mechanism Based on DCT and Visual Cryptography for Data Communication Networks

verfasst von : Yamini Jain, Gaurav Sharma, Gaurav Anand, Sangeeta Dhall

Erschienen in: Cyber Security

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

To provide security in communication networks, various cryptographic and steganographic algorithms have been proposed. Cryptography converts the data into a form understood only by the receiver node whereas steganography hides the data behind a cover file; generally, an image file is used. To provide better security, the use of hybrid mechanisms has been proposed. In this paper, we try to combine visual cryptography coupled with DCT to provide better security for communication networks. The proposed technique is implemented in MATLAB-12, and the overheads of mixing the two mechanisms are evaluated using several performance metrics such as PSNR, Mean Square Error (MSE), time complexity and Mean Absolute Error (MAE) of the mechanism. The result shows that the proposed technique is far better in terms of security but with some overheads when compared to stand-alone technique DCT.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat William S (2003) Cryptography and network security: principles and practices. Pearsons education, first Indian reprint William S (2003) Cryptography and network security: principles and practices. Pearsons education, first Indian reprint
2.
Zurück zum Zitat Preneel B Cryptographic algorithms: basic concepts and application to multimedia security. Katholieke University, Belgium Preneel B Cryptographic algorithms: basic concepts and application to multimedia security. Katholieke University, Belgium
3.
Zurück zum Zitat Sadkhan SB (2004) Cryptography: current status and future trends. In: Proceedings of IEEE international conference on information and communication technologies: from theory to applications, Damascus, Syria, 19–23 Apr 2004, pp 417–418 Sadkhan SB (2004) Cryptography: current status and future trends. In: Proceedings of IEEE international conference on information and communication technologies: from theory to applications, Damascus, Syria, 19–23 Apr 2004, pp 417–418
4.
Zurück zum Zitat Moskowitz I, Longdon G, Chang L (2000) A new paradigm hidden in Steganography. In: Proceeding of the 2000 Workshop on new security paradigms, Ireland, pp 41–50 Moskowitz I, Longdon G, Chang L (2000) A new paradigm hidden in Steganography. In: Proceeding of the 2000 Workshop on new security paradigms, Ireland, pp 41–50
5.
Zurück zum Zitat Bendor W, Gruhl D, Morimoto N, Lu A (1996) Techniques for data hiding. IBM Syst J 35(3 & 4) Bendor W, Gruhl D, Morimoto N, Lu A (1996) Techniques for data hiding. IBM Syst J 35(3 & 4)
6.
Zurück zum Zitat Kharrazi M, Sencar HT, Memon N (2006) A performance study of common image steganography and steganalysis techniques. J Electron Imaging 15:041104CrossRef Kharrazi M, Sencar HT, Memon N (2006) A performance study of common image steganography and steganalysis techniques. J Electron Imaging 15:041104CrossRef
7.
Zurück zum Zitat Ker A (2004) Improved detection of LSB steganography in grayscale images. In: Proceedings of information hiding workshop, vol 3200, Springer LNCS, pp 97–115CrossRef Ker A (2004) Improved detection of LSB steganography in grayscale images. In: Proceedings of information hiding workshop, vol 3200, Springer LNCS, pp 97–115CrossRef
8.
Zurück zum Zitat Raphael AJ, Sundaram V (2012) Cryptography and steganography—a survey. Int J Comput Technol Appl 223–231 Raphael AJ, Sundaram V (2012) Cryptography and steganography—a survey. Int J Comput Technol Appl 223–231
9.
Zurück zum Zitat Jena D (2009) A novel visual cryptography scheme. In: IEEE international conference on advanced computer control Jena D (2009) A novel visual cryptography scheme. In: IEEE international conference on advanced computer control
10.
Zurück zum Zitat Gokul M, Umeshbabu R, Vasudevan Shriram K, Karthik D (2012) Hybrid steganography using visual cryptography and LSB encryption method. Int J Comput Appl 59:5–8 Gokul M, Umeshbabu R, Vasudevan Shriram K, Karthik D (2012) Hybrid steganography using visual cryptography and LSB encryption method. Int J Comput Appl 59:5–8
11.
Zurück zum Zitat Gupta S, Goyal A, Bhushan B (2012) Information hiding using least significant bit steganography and cryptography. I.J. Modern Education and Computer Science 6:27–34CrossRef Gupta S, Goyal A, Bhushan B (2012) Information hiding using least significant bit steganography and cryptography. I.J. Modern Education and Computer Science 6:27–34CrossRef
12.
Zurück zum Zitat Nivedhita R, Meyyappan Dr T (2012) Image security using steganography and cryptographic techniques. Int J Eng Trends Technol 3:366–371 Nivedhita R, Meyyappan Dr T (2012) Image security using steganography and cryptographic techniques. Int J Eng Trends Technol 3:366–371
13.
Zurück zum Zitat Aung PP, Naing TM (2014) A novel secure combination technique of steganography and cryptography. Int J Inf Technol Model Comput (IJITMC) 2:55–62 Aung PP, Naing TM (2014) A novel secure combination technique of steganography and cryptography. Int J Inf Technol Model Comput (IJITMC) 2:55–62
14.
Zurück zum Zitat Shingote PN, Syed AH, Bhujpal PM (2014) Advanced Security using Cryptography and LSB Matching Steganography. Int J Comput Electron Res 3:52–55 Shingote PN, Syed AH, Bhujpal PM (2014) Advanced Security using Cryptography and LSB Matching Steganography. Int J Comput Electron Res 3:52–55
15.
Zurück zum Zitat Nakajima M Extended use of visual cryptography for natural images, department of graphics and computer sciences. Graduate School of Arts and Sciences, The University of Tokyo Nakajima M Extended use of visual cryptography for natural images, department of graphics and computer sciences. Graduate School of Arts and Sciences, The University of Tokyo
16.
Zurück zum Zitat Morkel T, Eloff JHP, Olivier MS (2005) An overview of image steganography. In: New knowledge today conference, Sandton, pp 1–11 Morkel T, Eloff JHP, Olivier MS (2005) An overview of image steganography. In: New knowledge today conference, Sandton, pp 1–11
Metadaten
Titel
A Hybrid Security Mechanism Based on DCT and Visual Cryptography for Data Communication Networks
verfasst von
Yamini Jain
Gaurav Sharma
Gaurav Anand
Sangeeta Dhall
Copyright-Jahr
2018
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-8536-9_14