Subscribe Now Subscribe Today
Science Alert
Curve Top
Journal of Applied Sciences
  Year: 2014 | Volume: 14 | Issue: 15 | Page No.: 1674-1688
DOI: 10.3923/jas.2014.1674.1688
Facebook Twitter Digg Reddit Linkedin StumbleUpon E-mail

Adaptive Data Hiding Based on Visual Cryptography

M. Padmaa and Y. Venkataramani

Signals, images, emails, voice and videos, everything comes under screening before or after it is communicated. Protecting the information is highly essential especially in electronic communication which has become a stipulation in the routine life of zillions. Since safeguarding has many literal connotations, this study ntrates on one of them, privacy; technically secrecy or security. From the family of Information security, the proposed method can pick out cryptography and steganography to make this algorithm more secure and effective as well. As far as Visual Cryptography is concerned, the primary terminologies here are share, user and transparency. Its blend with steganography is worth mentionable here as it forms a new platform in information security and secret sharing. For embedding, Pixel Indicator (PI), Pixel Value Differencing (PVD) and OPAP are used. With reference to Pixel Indicator, two methods are discussed here. The effectiveness of the proposed method is assessed by calculating MSE and PSNR and the outcomes are tabulated and compared with existing methods.
PDF Fulltext XML References Citation Report Citation
  •    Encrypted Secret Blend with Image Steganography for Enhanced Imperceptibility and Capacity
  •    Rubik’s Cube Blend with Logistic Map on RGB: A Way for Image Encryption
  •    Arabic Text Steganography using Kashida Extensions with Huffman Code
  •    Hiding Data in Video File: An Overview
  •    Brownian Motion of Binary and Gray-Binary and Gray Bits in Image for Stego
  •    Inverted Pattern in Inverted Time Domain for Icon Steganography
How to cite this article:

M. Padmaa and Y. Venkataramani, 2014. Adaptive Data Hiding Based on Visual Cryptography. Journal of Applied Sciences, 14: 1674-1688.

DOI: 10.3923/jas.2014.1674.1688






Curve Bottom