image secret sharing using shamir's scheme with steganography

Post on 13-Apr-2017

349 Views

Category:

Engineering

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Secret Image Sharing

Guided By:-Prof. Dr.Sonali Patil.

----Problem Statement----

To Study image secret sharing using Shamir’s secret sharing algorithm and Steganography .

OBJECTIVES Providing more security for image

communication. To achieve transparency, authority

(resistance to various image tampering and forgery methods), and high capacity of the hidden data.

Schemes are important tools in cryptography and they are used as a building box in many secure protocols,threshold cryptography, access control, attribute-based Encryption.

Secret image sharing has become a key technology for digital images in secured storage and confidential transmission.

MOTIVATION

MOTIVATIONImage data is not secure over network and social networking sites.Drawbacks in various secret sharing algorithms.

Total image security and confidentiality over transmission.

Hindrance to Image tampering.

Expected Outcome

LITERATURE SURVEY

Shamir’s Algorithm:- Shamir developed a sharing method (a (t;

n)threshold scheme, t/n) for sharing a secret image among n participants, such that any t participants could cooperate to reconstruct the secret image, while t−1 or fewer participants could not.

LITERATURE SURVEY Why Steganography??? 1)Share images look like random noise

and thus draw attention of the malicious users.

2)Confidentiality of the shares is realized by Steganography.

LITERATURE SURVEY

What is Steganography:- Steganography is the method used to hide

shares into natural looking cover images. The dealer should select n natural looking cover images of size 2W×2H to hide a W×H secret image for a (k, n) secret sharing scheme.

Steganographic Image

LITERATURE SURVEY

LSB Method:- 1)LSB method stands for “Least Significant

Bit Method”. 2) This method is used for embedding the

shares into the host images. 3)Share images are processed pixel by

pixel during embedding.

LITERATURE SURVEY

LSB Method continues….. 3)Share image pixel values are embedded

into corresponding 2×2 pixel groups called cover blocks in cover image.

4)Therefore, two LSBs of each pixel in th corresponding cover block is used to hide the shared pixel with eight bits.

APPLICATIONS

1)Medical applications such telediagnosis and to store electronic patient record (EPR) in the medical image by steganography.

2)Miltary applications such as, The photographers who work in enemy areas can use this system to transmit photographs.

SECRET IMAGE SHAREING

A medical image to share

SHARES ARE GENERATED USING ALGORITHM:-

STEGO IMAGES FOR THE SHARES:-

FUTURE SCOPE

Secret image sharing with Steganography is that current space of analysis wherever heap of scope exists.

The combination of both provides higher levels of security to the information being transmitted.

FUTURE SCOPE

The special attention is given to improve the quality of the reconstructed image.

Cryptography techniques like RSA, AES and hash functions can also be used with steganography to provide more security.

REFERENCES 1)Sharing and hiding secret images with

size constraint Yu-Shan Wu, Chih-Ching Thien, Ja-Chen Lin∗

2)Shamir A. How to share a secret. Communication of the ACM 1979;22(11):612–3.

3)Medical image security and EPR hiding using Shamir’s secret sharing scheme Mustafa Ulutas, Güzin Ulutas , Vasif V. ∗Nabiyev

PRESENTED BY:- SHRUTI T KULKARNI

top related