+ All Categories
Home > Engineering > Image secret sharing using Shamir's scheme with Steganography

Image secret sharing using Shamir's scheme with Steganography

Date post: 13-Apr-2017
Category:
Upload: 2510stk
View: 349 times
Download: 0 times
Share this document with a friend
20
Secret Image Sharing Guided By:- Prof. Dr.Sonali Patil.
Transcript
Page 1: Image secret sharing using Shamir's scheme with Steganography

Secret Image Sharing

Guided By:-Prof. Dr.Sonali Patil.

Page 2: Image secret sharing using Shamir's scheme with Steganography

----Problem Statement----

To Study image secret sharing using Shamir’s secret sharing algorithm and Steganography .

Page 3: Image secret sharing using Shamir's scheme with Steganography

OBJECTIVES Providing more security for image

communication. To achieve transparency, authority

(resistance to various image tampering and forgery methods), and high capacity of the hidden data.

Page 4: Image secret sharing using Shamir's scheme with Steganography

Schemes are important tools in cryptography and they are used as a building box in many secure protocols,threshold cryptography, access control, attribute-based Encryption.

Secret image sharing has become a key technology for digital images in secured storage and confidential transmission.

MOTIVATION

Page 5: Image secret sharing using Shamir's scheme with Steganography

MOTIVATIONImage data is not secure over network and social networking sites.Drawbacks in various secret sharing algorithms.

Page 6: Image secret sharing using Shamir's scheme with Steganography

Total image security and confidentiality over transmission.

Hindrance to Image tampering.

Expected Outcome

Page 7: Image secret sharing using Shamir's scheme with Steganography

LITERATURE SURVEY

Shamir’s Algorithm:- Shamir developed a sharing method (a (t;

n)threshold scheme, t/n) for sharing a secret image among n participants, such that any t participants could cooperate to reconstruct the secret image, while t−1 or fewer participants could not.

Page 8: Image secret sharing using Shamir's scheme with Steganography

LITERATURE SURVEY Why Steganography??? 1)Share images look like random noise

and thus draw attention of the malicious users.

2)Confidentiality of the shares is realized by Steganography.

Page 9: Image secret sharing using Shamir's scheme with Steganography

LITERATURE SURVEY

What is Steganography:- Steganography is the method used to hide

shares into natural looking cover images. The dealer should select n natural looking cover images of size 2W×2H to hide a W×H secret image for a (k, n) secret sharing scheme.

Page 10: Image secret sharing using Shamir's scheme with Steganography

Steganographic Image

Page 11: Image secret sharing using Shamir's scheme with Steganography

LITERATURE SURVEY

LSB Method:- 1)LSB method stands for “Least Significant

Bit Method”. 2) This method is used for embedding the

shares into the host images. 3)Share images are processed pixel by

pixel during embedding.

Page 12: Image secret sharing using Shamir's scheme with Steganography

LITERATURE SURVEY

LSB Method continues….. 3)Share image pixel values are embedded

into corresponding 2×2 pixel groups called cover blocks in cover image.

4)Therefore, two LSBs of each pixel in th corresponding cover block is used to hide the shared pixel with eight bits.

Page 13: Image secret sharing using Shamir's scheme with Steganography

APPLICATIONS

1)Medical applications such telediagnosis and to store electronic patient record (EPR) in the medical image by steganography.

2)Miltary applications such as, The photographers who work in enemy areas can use this system to transmit photographs.

Page 14: Image secret sharing using Shamir's scheme with Steganography

SECRET IMAGE SHAREING

A medical image to share

Page 15: Image secret sharing using Shamir's scheme with Steganography

SHARES ARE GENERATED USING ALGORITHM:-

Page 16: Image secret sharing using Shamir's scheme with Steganography

STEGO IMAGES FOR THE SHARES:-

Page 17: Image secret sharing using Shamir's scheme with Steganography

FUTURE SCOPE

Secret image sharing with Steganography is that current space of analysis wherever heap of scope exists.

The combination of both provides higher levels of security to the information being transmitted.

Page 18: Image secret sharing using Shamir's scheme with Steganography

FUTURE SCOPE

The special attention is given to improve the quality of the reconstructed image.

Cryptography techniques like RSA, AES and hash functions can also be used with steganography to provide more security.

Page 19: Image secret sharing using Shamir's scheme with Steganography

REFERENCES 1)Sharing and hiding secret images with

size constraint Yu-Shan Wu, Chih-Ching Thien, Ja-Chen Lin∗

2)Shamir A. How to share a secret. Communication of the ACM 1979;22(11):612–3.

3)Medical image security and EPR hiding using Shamir’s secret sharing scheme Mustafa Ulutas, Güzin Ulutas , Vasif V. ∗Nabiyev

Page 20: Image secret sharing using Shamir's scheme with Steganography

PRESENTED BY:- SHRUTI T KULKARNI


Recommended