An Improved Data Transfer Technique using Steganography with Water marking and Visual Cryptography
Sakshi Batra1, Harpinder Kang Khattra2

1Sakshi Batra, M.Tech Student, Department of ECE, PTU, Chandigarh Group of Colleges, Landran, Mohali (Punjab), India.
2Harpinder Kang, Assistant Professor, Department of ECE, PTU, Chandigarh Group of Colleges, Landran, Mohali (Punjab), India.
Manuscript received on 8 December 2013 | Revised Manuscript received on 18 December 2013 | Manuscript Published on 30 December 2013 | PP: 144-147 | Volume-3 Issue-7, December 2013 | Retrieval Number: G1412123713/13©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message. It is a form of security through obscurity. The word Steganography in the modern day usually refers to information or a file that has been concealed inside a digital Picture, Video or Audio file. Essentially, the information-hiding process in a steganographic system starts by identifying a cover medium’s redundant bits. The embedding process creates a stego medium by replacing these redundant bits with data from the hidden message. In this paper a new type of cryptographic scheme is proposed, which can decode concealed images without any cryptographic computations. The scheme is perfectly secure and very easy to implement. Further watermarking is also applied on the data so as to provide much security. Digital watermarking is the process of inserting a digital signal or pattern (indicative of the owner of the content) into digital content. The signal, known as a watermark, can be used later to identify the owner of the work, to authenticate the content, and to trace illegal copies of the work.
Keywords: Cryptography, Steganography, Water marking, security.

Scope of the Article: Data Visualization