Enhanced Multi Level Secret Data Hiding

Authors(2) :-Swati S Patil, Prof. Sangeetha Goud

In this paper we present enhanced multi level secret data hiding which integrates two different methods of encryption namely visual cryptography and steganography. First as a pre-processing step we are using a method called halftoning which is used to reduce the pixels and simplify the processing. After that visual cryptography is performed that produces the shares which forms first level of security and then steganography in which we hide the shares in different media like image, audio and video. Hence we get the enhanced multi level secret data hiding which improves the security over the network.

Authors and Affiliations

Swati S Patil
Department of Electronics and Communication, SDM College of Engineering and Technology, Dharwad, Karnataka, India
Prof. Sangeetha Goud
Department of Electronics and Communication, SDM College of Engineering and Technology, Dharwad, Karnataka, India

Steganography, visual cryptography, cover media, secret data , shares, stego key or password

  1. Spectrum policy task force, spectrum policy task force report, Federal Communications Commission ET, 2002.
  2. S. Haskin, “Cognitive radio: brain-empowered wireless communications,” IEEE J. Sel. Areas Common., vol. 23, no. 2, pp. 201–220, Feb. 2005.
  3. R. Qiu, Z. Hu, H. Li, and M. Wicks, Cognitive Radio Communication and Networking: Principles and Practice. Wiley, 2012.
  4. C. Yi and J. Cai, “Two-stage spectrum sharing with combinatorial auction and stackelberg game in recall-based cognitive radio networks,” IEEE Trans. Communes., vol. 62, no. 11, pp. 3740–3752, Nov. 2014.
  5. C. Yi and J. Cai, “Multi-item spectrum auction for recall-based cognitive radio networks with multiple heterogeneous secondary users,” IEEE Trans. Veh. Technol., vol. 64, no. 2, pp. 781–792, Feb. 2015.
  6. A. Ghazanfari, A. tolli and H. Pennanen, “Sum power minimization for cellular systems with underlay d2d communications,” in Proc. CROWNCOM, Jun 2014, pp. 45-50.
  7. K. Illanko, K. Raahemifar and A. Anpalagan, “Sun-channel and power allocation for multiuser OFDM with rate constraints using genetic algorithm,” in Proc. IEEE PavRim, Aug. 2009, pp. 571-575.
  8. B. Ye, M. Nekovee, A. Pervez and M. ghavami, “TV white space channel allocation with simulated algorithm as meta algorithm,” in Proc. CROWNCOM, Jun 2012, pp. 175-179.
  9. B. H. Wang, H. T. Hui and M. S. Leong, “ Decoupled 2d direction of arrival estimation using compact uniform circular arrays in the presence of elevation-dependent mutual coupling,” IEEE Trans. Antenna Propagation vol.58, no. 3, pp. 747-755, Mar 2010.
  10. G.K. Soon, T. T. Guan, C. K. On, R. Alfred and P. Anthony, “A comparison on the performance of crossover techniques in video game,” in Proc. IEEE ICCSCE, Nov. 2013, pp. 493-498.
  11. A. J. Monticelli, R. Romero and E. N. Asada, “Fundamentals of Simulated Annealing,” John Wiley and Sons. Inc., 2007.
  12. D. Thompson and G. Bilbro, “sample-sort simulated annealing,” IEEE Trans. Syst. Man Cybern. B. Cybern, vol. 35, no. 3, pp. 625-63, Jun 2014
  13. S. H. Moon, C. Lee, S. R. Lee and I. Lee, “Joint user scheduling and adaptive intercell interference cancellation for MISO downlink cellular systems,” IEEE Trans. Veh. Technol., vol. 62, no. 1, pp. 172-181, Jan 2013

Publication Details

Published in : Volume 2 | Issue 2 | March-April 2016
Date of Publication : 2017-12-31
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 846-850
Manuscript Number : IJSRSET1622308
Publisher : Technoscience Academy

Print ISSN : 2395-1990, Online ISSN : 2394-4099

Cite This Article :

Swati S Patil, Prof. Sangeetha Goud, " Enhanced Multi Level Secret Data Hiding , International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 2, Issue 2, pp.846-850, March-April-2016. Citation Detection and Elimination     |     
Journal URL : https://ijsrset.com/IJSRSET1622308

Article Preview