Bimonthly    Since 1986
ISSN 1004-9037
Publication Details
Edited by: Editorial Board of Journal of Data Acquisition and Processing
P.O. Box 2704, Beijing 100190, P.R. China
Sponsored by: Institute of Computing Technology, CAS & China Computer Federation
Undertaken by: Institute of Computing Technology, CAS
Published by: SCIENCE PRESS, BEIJING, CHINA
Distributed by:
China: All Local Post Offices
 
   
      1 Jan 2023, Volume 38 Issue 1   
    Article

    1. TEXT DATA SECURITY THROUGH HYBRID METHOD USING VISUAL CRYPTOGRAPHY AND IMAGE STEGANOGRAPHY ALGORITHMS
    Bhawna1, Dr. Sanjay Malik2
    Journal of Data Acquisition and Processing, 2023, 38 (1): 3632-3649 . 

    Abstract

    Modern society puts a great deal of importance on digital communication, thus keeping it hidden is crucial. Many modern softwares are web-based, and users increasingly rely on social networking sites like Facebook, Twitter, and others. The data must be secured against unauthorized access and usage since it is distributed over unsecured channels. Since the information is sent across unsecured channels, it is crucial to prevent unauthorized access to and use of the data. Although there has been a significant amount of research done in the past, most of it has not taken into account the need for strong hybrid security concerning secret text. The two techniques most commonly used to prevent unwanted access to sensitive text data are visual cryptography and image steganography. These two techniques' unique merits, nevertheless, are not secure enough for the contemporary era. There may be some vulnerability as a result. If visual cryptography is combined with image steganography, it is feasible to use both algorithms together to obtain high levels of information security. This study presented a hybrid security method for hiding secret text that combines visual cryptography and LSB image steganography. Colour image steganography is used to hide shares in other cover images and cover up secret text in cover images. For splitting the cover image into two shares, use visual cryptography. The secrecy, trustworthiness, and effectiveness of covert communications are considerably improved by these security protocols. The accuracy of the received text data is calculated in terms of MSE and correlation coefficient by comparing the transmitted and received text data, even if there isn't a parameter to indicate the level of security attained by utilizing cutting-edge methods. To evaluate the effectiveness of the suggested methodology, the time required at the transmitter and receiver ends is also evaluated. The MATLAB environment is used in the implementation to show how the proposed method has increased resilience when taking steganalysis into account.

    Keyword

    Encryption, Decryption, Cryptography, Steganography


    PDF Download (click here)

SCImago Journal & Country Rank

ISSN 1004-9037

         

Home
Editorial Board
Author Guidelines
Subscription
Journal of Data Acquisition and Processing
Institute of Computing Technology, Chinese Academy of Sciences
P.O. Box 2704, Beijing 100190 P.R. China
E-mail: info@sjcjycl.cn
 
  Copyright ©2015 JCST, All Rights Reserved