Skip to main content

A Hybrid Security Mechanism Based on DCT and Visual Cryptography for Data Communication Networks

  • Conference paper
  • First Online:
Cyber Security

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 729))

Abstract

To provide security in communication networks, various cryptographic and steganographic algorithms have been proposed. Cryptography converts the data into a form understood only by the receiver node whereas steganography hides the data behind a cover file; generally, an image file is used. To provide better security, the use of hybrid mechanisms has been proposed. In this paper, we try to combine visual cryptography coupled with DCT to provide better security for communication networks. The proposed technique is implemented in MATLAB-12, and the overheads of mixing the two mechanisms are evaluated using several performance metrics such as PSNR, Mean Square Error (MSE), time complexity and Mean Absolute Error (MAE) of the mechanism. The result shows that the proposed technique is far better in terms of security but with some overheads when compared to stand-alone technique DCT.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. William S (2003) Cryptography and network security: principles and practices. Pearsons education, first Indian reprint

    Google Scholar 

  2. Preneel B Cryptographic algorithms: basic concepts and application to multimedia security. Katholieke University, Belgium

    Google Scholar 

  3. Sadkhan SB (2004) Cryptography: current status and future trends. In: Proceedings of IEEE international conference on information and communication technologies: from theory to applications, Damascus, Syria, 19–23 Apr 2004, pp 417–418

    Google Scholar 

  4. Moskowitz I, Longdon G, Chang L (2000) A new paradigm hidden in Steganography. In: Proceeding of the 2000 Workshop on new security paradigms, Ireland, pp 41–50

    Google Scholar 

  5. Bendor W, Gruhl D, Morimoto N, Lu A (1996) Techniques for data hiding. IBM Syst J 35(3 & 4)

    Google Scholar 

  6. Kharrazi M, Sencar HT, Memon N (2006) A performance study of common image steganography and steganalysis techniques. J Electron Imaging 15:041104

    Article  Google Scholar 

  7. Ker A (2004) Improved detection of LSB steganography in grayscale images. In: Proceedings of information hiding workshop, vol 3200, Springer LNCS, pp 97–115

    Chapter  Google Scholar 

  8. Raphael AJ, Sundaram V (2012) Cryptography and steganography—a survey. Int J Comput Technol Appl 223–231

    Google Scholar 

  9. Jena D (2009) A novel visual cryptography scheme. In: IEEE international conference on advanced computer control

    Google Scholar 

  10. Gokul M, Umeshbabu R, Vasudevan Shriram K, Karthik D (2012) Hybrid steganography using visual cryptography and LSB encryption method. Int J Comput Appl 59:5–8

    Google Scholar 

  11. Gupta S, Goyal A, Bhushan B (2012) Information hiding using least significant bit steganography and cryptography. I.J. Modern Education and Computer Science 6:27–34

    Article  Google Scholar 

  12. Nivedhita R, Meyyappan Dr T (2012) Image security using steganography and cryptographic techniques. Int J Eng Trends Technol 3:366–371

    Google Scholar 

  13. Aung PP, Naing TM (2014) A novel secure combination technique of steganography and cryptography. Int J Inf Technol Model Comput (IJITMC) 2:55–62

    Google Scholar 

  14. Shingote PN, Syed AH, Bhujpal PM (2014) Advanced Security using Cryptography and LSB Matching Steganography. Int J Comput Electron Res 3:52–55

    Google Scholar 

  15. Nakajima M Extended use of visual cryptography for natural images, department of graphics and computer sciences. Graduate School of Arts and Sciences, The University of Tokyo

    Google Scholar 

  16. Morkel T, Eloff JHP, Olivier MS (2005) An overview of image steganography. In: New knowledge today conference, Sandton, pp 1–11

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yamini Jain .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Jain, Y., Sharma, G., Anand, G., Dhall, S. (2018). A Hybrid Security Mechanism Based on DCT and Visual Cryptography for Data Communication Networks. In: Bokhari, M., Agrawal, N., Saini, D. (eds) Cyber Security. Advances in Intelligent Systems and Computing, vol 729. Springer, Singapore. https://doi.org/10.1007/978-981-10-8536-9_14

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-8536-9_14

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-8535-2

  • Online ISBN: 978-981-10-8536-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics