In today’s nature transmitting message in a safe and protected miniature is difficult, especially when decidedly conscious message is involved. The system aspiration at suggested a methodology which employs dual stage of examination getting cryptography and steganography to cover the mysterious document message. The Visual cryptography system (VCS) is a protected mode that encoded a mysterious image into shares. The key design behind the suggested access deals with message hiding in image getting Zigzag scanning pattern which is more complex method Z2H in steganography again encoded as shares by VC technique for hidden in separate cover image…(more)
Please log in to take part in the discussion (add own reviews or comments).
Cite this publication
More citation styles
- please select -
%0 Journal Article
%1 gkanimozhi2016secure
%A G.Kanimozhi,
%A khadir, Dr.A.Shaik Abul
%D 2016
%J IJIRIS::International Journal of Innovative Research in Information Security
%K Cover Mysterious Visual Watermarking Zigzag cryptography images shares
%N 01
%P 01-09
%T Secure Data Encryption and Authentication using Visual Cryptography in the TSVEC Algorithm
%U http://www.ijiris.com/volumes/Vol3/iss1/01.JAIS10081.pdf
%V 3
%X In today’s nature transmitting message in a safe and protected miniature is difficult, especially when decidedly conscious message is involved. The system aspiration at suggested a methodology which employs dual stage of examination getting cryptography and steganography to cover the mysterious document message. The Visual cryptography system (VCS) is a protected mode that encoded a mysterious image into shares. The key design behind the suggested access deals with message hiding in image getting Zigzag scanning pattern which is more complex method Z2H in steganography again encoded as shares by VC technique for hidden in separate cover images to present authentication for the VC shares which makes these mysterious shares invisible by hidden them into cover images getting TSVCE method. The mysterious shares generated from VC encryption are watermarked into some cover images getting digitized watermarking. Digitized watermarking is used for providing the dual examination of image shares. The share is embedded into the cover image getting Least Significant Bit Insertion Technique (LSB). The system presents more protected and meaningful mysterious shares that are robust against a total of attacks. The performance of the suggested system is evaluated getting peak signal to noise ratio (PSNR), histogram analysis and also numerical experimentation suggests that hidden time varies linearly with message length. The simulation results show that, the suggested system presents high stage of examination.
@article{gkanimozhi2016secure,
abstract = {In today’s nature transmitting message in a safe and protected miniature is difficult, especially when decidedly conscious message is involved. The system aspiration at suggested a methodology which employs dual stage of examination getting cryptography and steganography to cover the mysterious document message. The Visual cryptography system (VCS) is a protected mode that encoded a mysterious image into shares. The key design behind the suggested access deals with message hiding in image getting Zigzag scanning pattern which is more complex method Z2H in steganography again encoded as shares by VC technique for hidden in separate cover images to present authentication for the VC shares which makes these mysterious shares invisible by hidden them into cover images getting TSVCE method. The mysterious shares generated from VC encryption are watermarked into some cover images getting digitized watermarking. Digitized watermarking is used for providing the dual examination of image shares. The share is embedded into the cover image getting Least Significant Bit Insertion Technique (LSB). The system presents more protected and meaningful mysterious shares that are robust against a total of attacks. The performance of the suggested system is evaluated getting peak signal to noise ratio (PSNR), histogram analysis and also numerical experimentation suggests that hidden time varies linearly with message length. The simulation results show that, the suggested system presents high stage of examination. },
added-at = {2016-07-13T16:24:47.000+0200},
author = {G.Kanimozhi and khadir, Dr.A.Shaik Abul},
biburl = {https://www.bibsonomy.org/bibtex/276079a25c996c10dd4cbad79ec51aa6e/ijiris},
description = {International Journal of Innovative Research in Information Security is an International peer-reviewed research publishing journal with a laser-beam focal aim of promoting and publishing original high quality research dealing with theoretical and scientific aspects in all disciplines of Information Technology. It is a monthly published online international scientific research journal focusing on issues in information technology research.
All technical or research papers and research results submitted to IJIRIS should be original in nature, never previously published in any journal or presented in a conference or undergoing such process across the globe. All the submissions will be peer-reviewed by the panel of experts associated with particular field. Submitted papers should meet the internationally accepted criteria and manuscripts should follow the style of the journal for the purpose of both reviewing and editing. All of its articles also appear online on public domain.
},
interhash = {4ba5fa27c6d101e4fd207037a5a55adc},
intrahash = {76079a25c996c10dd4cbad79ec51aa6e},
journal = {IJIRIS::International Journal of Innovative Research in Information Security},
keywords = {Cover Mysterious Visual Watermarking Zigzag cryptography images shares},
month = {January},
number = 01,
pages = {01-09},
timestamp = {2016-07-13T16:24:47.000+0200},
title = {Secure Data Encryption and Authentication using Visual Cryptography in the TSVEC Algorithm},
url = {http://www.ijiris.com/volumes/Vol3/iss1/01.JAIS10081.pdf},
volume = 3,
year = 2016
}