loading page

An Steganography-based Triple Layered Image Data Hiding Using Visual Cryptography
  • Bhawna Kukreja,
  • Sanjay Malik
Bhawna Kukreja
SRM University - Haryana Campus

Corresponding Author:[email protected]

Author Profile
Sanjay Malik
SRM University - Haryana Campus
Author Profile


An intentional alteration of data stored in a computer through the use of malicious code is a cyber-attack, that exploits networks and computer systems. The data may be compromised and this may have disruptive implications. Cyberattacks can lead to two cybercrimes: information theft and identity theft. Extreme care must be taken to protect sensitive data. Cryptography and steganography are used to protect private information being delivered through a risky channel. These techniques don’t have much power on their own. Combining the two allows us to conceal information. In this paper, we proposed an image data-hiding technique that uses steganographic method along with visual cryptography to provide better security to the images. Even though extensive research work has been done previously, but most of the research works did not provide adequate security to the images even after its encryption. The method proposed in this paper is capable of hiding some secret message in the least significant bits of the original image, thereby hiding the secret message in a way to make its detection difficult. We, then apply visual cryptography algorithms to the resulting secret image. Thereby, creating shares of the secret image, which are noise-like structures. The proposed method hides these shares in the least significant bits of different images so as to create three levels of security for the message. The main motive of the proposed work is to combine the use of data-hiding techniques, steganography, and visual cryptography, for designing a more secure algorithm so that the security, reliability, and efficiency of secret messages can be improved. At last, we implement the designed framework using Matlab simulation
22 May 2023Submitted to Security and Privacy
22 May 2023Assigned to Editor
22 May 2023Submission Checks Completed
22 May 2023Review(s) Completed, Editorial Evaluation Pending
21 Jul 2023Reviewer(s) Assigned