Abstract
Modern society puts a great deal of importance on digital communication, thus keeping it hidden is crucial. Many modern softwares are web-based, and users increasingly rely on social networking sites like Facebook, Twitter, and others. The data must be secured against unauthorized access and usage since it is distributed over unsecured channels. Since the information is sent across unsecured channels, it is crucial to prevent unauthorized access to and use of the data. Although there has been a significant amount of research done in the past, most of it has not taken into account the need for strong hybrid security concerning secret text. The two techniques most commonly used to prevent unwanted access to sensitive text data are visual cryptography and image steganography. These two techniques' unique merits, nevertheless, are not secure enough for the contemporary era. There may be some vulnerability as a result. If visual cryptography is combined with image steganography, it is feasible to use both algorithms together to obtain high levels of information security. This study presented a hybrid security method for hiding secret text that combines visual cryptography and LSB image steganography. Colour image steganography is used to hide shares in other cover images and cover up secret text in cover images. For splitting the cover image into two shares, use visual cryptography. The secrecy, trustworthiness, and effectiveness of covert communications are considerably improved by these security protocols. The accuracy of the received text data is calculated in terms of MSE and correlation coefficient by comparing the transmitted and received text data, even if there isn't a parameter to indicate the level of security attained by utilizing cutting-edge methods. To evaluate the effectiveness of the suggested methodology, the time required at the transmitter and receiver ends is also evaluated. The MATLAB environment is used in the implementation to show how the proposed method has increased resilience when taking steganalysis into account.
Keyword
Encryption, Decryption, Cryptography, Steganography
PDF Download (click here)
|