Skip to main content
Log in

Secure two fold transmission of features using multimodal mask steganography and naive based random visual cryptography system

  • Original Article
  • Published:
International Journal of System Assurance Engineering and Management Aims and scope Submit manuscript

Abstract

Securing Digital communication of data over the internet is achieved by multimodal mask steganography and naive based random visual cryptography system. It is observed the system yields ∞ PSNR considering face and fingerprint data with salt and pepper attack the system yielding 51 db.The paper presents an approach of extracting features with Viola–Jones object detection framework and rotation bit operator method. Then embedding biometric features extracted using Multimodal Mask Steganography and Naive based Random Visual Cryptography system method. It is observed that system resistibility with salt and pepper noise yields 51 db. Hence considering features of biometric data with salt and pepper noise using Multimodal Mask Steganography and VCS method yields better PSNR Comparatively with the approach discussed in the paper.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20

Similar content being viewed by others

References

  • Abdelgader AHS, Aboughalia RA, Alkishriwo OAS (2018) Combined Image Encryption and Steganography Algorithm in the Spatial Domain. In: 1st Conference for engineering sciences and technology (CEST-2018) 25–27 September 2018

  • Akhtar N, Ahamad V, Javed H (2017) A compressed LSB steganography method. In: IEEE 3rd International conference on computational intelligence & communication technology (CICT)

  • Al-Janabi S, Al-Shourbaji I (2017) A Hybrid Image steganography method based on genetic algorithm. In: IEEE 7th international conference on sciences of electronics, technologies of information and telecommunications (SETIT)

  • Al-Omari ZY, Al-Taani AT (2017) Secure LSB steganography for colored images using character-color mapping. In: IEEE 8th international conference on information and communication systems (ICICS)

  • Duan X, Guo D, Liu N, Li B, Gou M, Qin C (2020) A new high capacity image steganography method combined with image elliptic curve cryptography and deep neural network. IEEE Access 8:25777–25788. https://doi.org/10.1109/ACCESS.2020.2971528

    Article  Google Scholar 

  • Mehra H, Sahu TK, Tiwari MG (2016) Steganography using genetic algorithm along with visual cryptography for wireless network application. Int J Adv Res Comput Commun Eng 5(2):1

  • Jahnavi S, Nandini C (2019) A naive based share generation using random visual crypto technique. Int J Innov Technol Explor Eng 8(12):5123–5129

    Article  Google Scholar 

  • Jahnavi S, Nandini C (2020) Novel multifold secured system by combining multimodal mask steganography and naive based random visual cryptography system for digital communication. J Comput Theor Nanosci 17(12):5279–5295

    Article  Google Scholar 

  • Kita N, Miyata K (2018) Magic sheets: Visual cryptography with common shares. Comput vis Med Spring Link 4(2):185–195

    Article  Google Scholar 

  • Maniriho P, Ahmad T (2020) Information hiding scheme for digital images using difference expansion and modulus function. J King Saud Univ -Comput Inf Sci 31(3):335–347

    Google Scholar 

  • Murad SH, Gody AM, Barakat TM (2018) Enhanced security of symmetric encryption using combination of steganography with visual cryptography. Int J Eng Trends Technol (IJETT) 65(3):1

    Google Scholar 

  • Patel T, Srivastava R (2016) A new technique for color share generation using visual cryptography. In: IEEE international conference on inventive computation technologies (ICICT)

  • Ravella Y, Chavan P (2017) Secret encryption using (2, 2) visual cryptography scheme with DCT compression. In: IEEE international conference on intelligent computing and control systems (ICICCS)

  • Sabeen Govind PV, Sajila MK, Varghese BM (2016) A two stage data hiding scheme with high capacity based on interpolation and difference expansion. Procedia Technol 24:1311–1316

    Article  Google Scholar 

  • Shankar K, Eswaran P (2017) RGB based multiple share creation in visual cryptography with aid of elliptic curve cryptography. IEEE China Commun J 14(2):1

    Google Scholar 

  • Shiny RM, Jayalakshmi P, Rajakrishnammal A, Sivaprabha T, Abirami R (2016) An efficient tagged visual cryptography for color images. In: IEEE international conference on computational intelligence and computing research (ICCIC)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. Jahnavi.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Jahnavi, S., Nandini, C. Secure two fold transmission of features using multimodal mask steganography and naive based random visual cryptography system. Int J Syst Assur Eng Manag 15, 232–242 (2024). https://doi.org/10.1007/s13198-022-01701-6

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s13198-022-01701-6

Keywords

Navigation