Skip to main content
Top

2018 | OriginalPaper | Chapter

A Hybrid Security Mechanism Based on DCT and Visual Cryptography for Data Communication Networks

Authors : Yamini Jain, Gaurav Sharma, Gaurav Anand, Sangeeta Dhall

Published in: Cyber Security

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

To provide security in communication networks, various cryptographic and steganographic algorithms have been proposed. Cryptography converts the data into a form understood only by the receiver node whereas steganography hides the data behind a cover file; generally, an image file is used. To provide better security, the use of hybrid mechanisms has been proposed. In this paper, we try to combine visual cryptography coupled with DCT to provide better security for communication networks. The proposed technique is implemented in MATLAB-12, and the overheads of mixing the two mechanisms are evaluated using several performance metrics such as PSNR, Mean Square Error (MSE), time complexity and Mean Absolute Error (MAE) of the mechanism. The result shows that the proposed technique is far better in terms of security but with some overheads when compared to stand-alone technique DCT.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference William S (2003) Cryptography and network security: principles and practices. Pearsons education, first Indian reprint William S (2003) Cryptography and network security: principles and practices. Pearsons education, first Indian reprint
2.
go back to reference Preneel B Cryptographic algorithms: basic concepts and application to multimedia security. Katholieke University, Belgium Preneel B Cryptographic algorithms: basic concepts and application to multimedia security. Katholieke University, Belgium
3.
go back to reference Sadkhan SB (2004) Cryptography: current status and future trends. In: Proceedings of IEEE international conference on information and communication technologies: from theory to applications, Damascus, Syria, 19–23 Apr 2004, pp 417–418 Sadkhan SB (2004) Cryptography: current status and future trends. In: Proceedings of IEEE international conference on information and communication technologies: from theory to applications, Damascus, Syria, 19–23 Apr 2004, pp 417–418
4.
go back to reference Moskowitz I, Longdon G, Chang L (2000) A new paradigm hidden in Steganography. In: Proceeding of the 2000 Workshop on new security paradigms, Ireland, pp 41–50 Moskowitz I, Longdon G, Chang L (2000) A new paradigm hidden in Steganography. In: Proceeding of the 2000 Workshop on new security paradigms, Ireland, pp 41–50
5.
go back to reference Bendor W, Gruhl D, Morimoto N, Lu A (1996) Techniques for data hiding. IBM Syst J 35(3 & 4) Bendor W, Gruhl D, Morimoto N, Lu A (1996) Techniques for data hiding. IBM Syst J 35(3 & 4)
6.
go back to reference Kharrazi M, Sencar HT, Memon N (2006) A performance study of common image steganography and steganalysis techniques. J Electron Imaging 15:041104CrossRef Kharrazi M, Sencar HT, Memon N (2006) A performance study of common image steganography and steganalysis techniques. J Electron Imaging 15:041104CrossRef
7.
go back to reference Ker A (2004) Improved detection of LSB steganography in grayscale images. In: Proceedings of information hiding workshop, vol 3200, Springer LNCS, pp 97–115CrossRef Ker A (2004) Improved detection of LSB steganography in grayscale images. In: Proceedings of information hiding workshop, vol 3200, Springer LNCS, pp 97–115CrossRef
8.
go back to reference Raphael AJ, Sundaram V (2012) Cryptography and steganography—a survey. Int J Comput Technol Appl 223–231 Raphael AJ, Sundaram V (2012) Cryptography and steganography—a survey. Int J Comput Technol Appl 223–231
9.
go back to reference Jena D (2009) A novel visual cryptography scheme. In: IEEE international conference on advanced computer control Jena D (2009) A novel visual cryptography scheme. In: IEEE international conference on advanced computer control
10.
go back to reference Gokul M, Umeshbabu R, Vasudevan Shriram K, Karthik D (2012) Hybrid steganography using visual cryptography and LSB encryption method. Int J Comput Appl 59:5–8 Gokul M, Umeshbabu R, Vasudevan Shriram K, Karthik D (2012) Hybrid steganography using visual cryptography and LSB encryption method. Int J Comput Appl 59:5–8
11.
go back to reference Gupta S, Goyal A, Bhushan B (2012) Information hiding using least significant bit steganography and cryptography. I.J. Modern Education and Computer Science 6:27–34CrossRef Gupta S, Goyal A, Bhushan B (2012) Information hiding using least significant bit steganography and cryptography. I.J. Modern Education and Computer Science 6:27–34CrossRef
12.
go back to reference Nivedhita R, Meyyappan Dr T (2012) Image security using steganography and cryptographic techniques. Int J Eng Trends Technol 3:366–371 Nivedhita R, Meyyappan Dr T (2012) Image security using steganography and cryptographic techniques. Int J Eng Trends Technol 3:366–371
13.
go back to reference Aung PP, Naing TM (2014) A novel secure combination technique of steganography and cryptography. Int J Inf Technol Model Comput (IJITMC) 2:55–62 Aung PP, Naing TM (2014) A novel secure combination technique of steganography and cryptography. Int J Inf Technol Model Comput (IJITMC) 2:55–62
14.
go back to reference Shingote PN, Syed AH, Bhujpal PM (2014) Advanced Security using Cryptography and LSB Matching Steganography. Int J Comput Electron Res 3:52–55 Shingote PN, Syed AH, Bhujpal PM (2014) Advanced Security using Cryptography and LSB Matching Steganography. Int J Comput Electron Res 3:52–55
15.
go back to reference Nakajima M Extended use of visual cryptography for natural images, department of graphics and computer sciences. Graduate School of Arts and Sciences, The University of Tokyo Nakajima M Extended use of visual cryptography for natural images, department of graphics and computer sciences. Graduate School of Arts and Sciences, The University of Tokyo
16.
go back to reference Morkel T, Eloff JHP, Olivier MS (2005) An overview of image steganography. In: New knowledge today conference, Sandton, pp 1–11 Morkel T, Eloff JHP, Olivier MS (2005) An overview of image steganography. In: New knowledge today conference, Sandton, pp 1–11
Metadata
Title
A Hybrid Security Mechanism Based on DCT and Visual Cryptography for Data Communication Networks
Authors
Yamini Jain
Gaurav Sharma
Gaurav Anand
Sangeeta Dhall
Copyright Year
2018
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-8536-9_14

Premium Partner