Abstract

Recently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512x512) is divided into three layers (red, green and blue). The blue layer is transformed using Discrete Shearlet Transform (DST) to obtain its coefficients. The first secret share is embedded at the coefficients of transformed blue layer to obtain a stego image. At extraction process, the first secret share is extracted from the coefficients of blue layer of the stego image and XORed with the second secret share to generate the original secret logo. According to the experimental results, the proposed method is achieved better imperceptibility for the stego image with the payload capacity equal to (1 bpp). In addition, the secret logo becomes more secured using (2 out 2 share) visual cryptography and the second secret share as a private key.

Highlights

  • Nowadays, millions of users are able to transmit the digital media through the internet

  • The proposed approach has been implemented by using MatlabR2019b that runs on Sony Vaio laptop, Intel Corei3-3227U CPU 1.9 GHz, 4 GB RAM, and Windows 10 Home 64-bit operating system, to evaluate its performance

  • Three programs have been written; the first program is used for secret share generating, the second program is applied for embedding process and the third program is employed for extraction process

Read more

Summary

Introduction

Millions of users are able to transmit the digital media through the internet . This feature of the internet leads to a number of challenges and threats regarding the security of transmitted media contents such as (copyright protection, media authentication and integrity verification) 1-4. Data hiding methods perform the security for the digital media by embedding a secret data in another digital media called a cover media 5. In other word, they make an existence of the secret data invisible at the cover media 6. Cryptography methods change the secret data into illegible form [7,8], some applications of data hiding are designed by combining them with cryptography [9,10]

Methods
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call