Abstract
To provide security in communication networks, various cryptographic and steganographic algorithms have been proposed. Cryptography converts the data into a form understood only by the receiver node whereas steganography hides the data behind a cover file; generally, an image file is used. To provide better security, the use of hybrid mechanisms has been proposed. In this paper, we try to combine visual cryptography coupled with DCT to provide better security for communication networks. The proposed technique is implemented in MATLAB-12, and the overheads of mixing the two mechanisms are evaluated using several performance metrics such as PSNR, Mean Square Error (MSE), time complexity and Mean Absolute Error (MAE) of the mechanism. The result shows that the proposed technique is far better in terms of security but with some overheads when compared to stand-alone technique DCT.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
William S (2003) Cryptography and network security: principles and practices. Pearsons education, first Indian reprint
Preneel B Cryptographic algorithms: basic concepts and application to multimedia security. Katholieke University, Belgium
Sadkhan SB (2004) Cryptography: current status and future trends. In: Proceedings of IEEE international conference on information and communication technologies: from theory to applications, Damascus, Syria, 19–23 Apr 2004, pp 417–418
Moskowitz I, Longdon G, Chang L (2000) A new paradigm hidden in Steganography. In: Proceeding of the 2000 Workshop on new security paradigms, Ireland, pp 41–50
Bendor W, Gruhl D, Morimoto N, Lu A (1996) Techniques for data hiding. IBM Syst J 35(3 & 4)
Kharrazi M, Sencar HT, Memon N (2006) A performance study of common image steganography and steganalysis techniques. J Electron Imaging 15:041104
Ker A (2004) Improved detection of LSB steganography in grayscale images. In: Proceedings of information hiding workshop, vol 3200, Springer LNCS, pp 97–115
Raphael AJ, Sundaram V (2012) Cryptography and steganography—a survey. Int J Comput Technol Appl 223–231
Jena D (2009) A novel visual cryptography scheme. In: IEEE international conference on advanced computer control
Gokul M, Umeshbabu R, Vasudevan Shriram K, Karthik D (2012) Hybrid steganography using visual cryptography and LSB encryption method. Int J Comput Appl 59:5–8
Gupta S, Goyal A, Bhushan B (2012) Information hiding using least significant bit steganography and cryptography. I.J. Modern Education and Computer Science 6:27–34
Nivedhita R, Meyyappan Dr T (2012) Image security using steganography and cryptographic techniques. Int J Eng Trends Technol 3:366–371
Aung PP, Naing TM (2014) A novel secure combination technique of steganography and cryptography. Int J Inf Technol Model Comput (IJITMC) 2:55–62
Shingote PN, Syed AH, Bhujpal PM (2014) Advanced Security using Cryptography and LSB Matching Steganography. Int J Comput Electron Res 3:52–55
Nakajima M Extended use of visual cryptography for natural images, department of graphics and computer sciences. Graduate School of Arts and Sciences, The University of Tokyo
Morkel T, Eloff JHP, Olivier MS (2005) An overview of image steganography. In: New knowledge today conference, Sandton, pp 1–11
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Jain, Y., Sharma, G., Anand, G., Dhall, S. (2018). A Hybrid Security Mechanism Based on DCT and Visual Cryptography for Data Communication Networks. In: Bokhari, M., Agrawal, N., Saini, D. (eds) Cyber Security. Advances in Intelligent Systems and Computing, vol 729. Springer, Singapore. https://doi.org/10.1007/978-981-10-8536-9_14
Download citation
DOI: https://doi.org/10.1007/978-981-10-8536-9_14
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-8535-2
Online ISBN: 978-981-10-8536-9
eBook Packages: EngineeringEngineering (R0)