SlideShare a Scribd company logo
Secret Image Sharing
Guided By:-
Prof. Dr.Sonali Patil.
----Problem Statement----
To Study image secret sharing using
Shamir’s secret sharing algorithm and
Steganography .
OBJECTIVES
 Providing more security for image
communication.
 To achieve transparency, authority
(resistance to various image tampering
and forgery methods), and high capacity
of the hidden data.
 Schemes are important tools in
cryptography and they are used as a
building box in many secure
protocols,threshold cryptography, access
control, attribute-based Encryption.
 Secret image sharing has become a key
technology for digital images in secured
storage and confidential transmission.
MOTIVATION
MOTIVATION
Image data is not secure over network
and
social networking sites.
Drawbacks in various secret sharing
algorithms.
Total image security and confidentiality
over transmission.
Hindrance to Image tampering.
Expected Outcome
LITERATURE SURVEY
Shamir’s Algorithm:-
Shamir developed a sharing method (a (t;
n)threshold scheme, t/n) for sharing a
secret image among n participants, such
that any t participants could cooperate to
reconstruct the secret image, while t−1 or
fewer participants could not.
LITERATURE SURVEY
Why Steganography???
1)Share images look like random noise
and thus draw attention of the malicious
users.
2)Confidentiality of the shares is realized
by Steganography.
LITERATURE SURVEY
What is Steganography:-
Steganography is the method used to hide
shares into natural looking cover images.
The dealer should select n natural looking
cover images of size 2W×2H to hide a
W×H secret image for a (k, n) secret
sharing scheme.
Steganographic Image
LITERATURE SURVEY
LSB Method:-
1)LSB method stands for “Least Significant
Bit Method”.
2) This method is used for embedding the
shares into the host images.
3)Share images are processed pixel by
pixel during embedding.
LITERATURE SURVEY
LSB Method continues…..
3)Share image pixel values are embedded
into corresponding 2×2 pixel groups called
cover blocks in cover image.
4)Therefore, two LSBs of each pixel in th
corresponding cover block is used to hide
the shared pixel with eight bits.
APPLICATIONS
1)Medical applications such telediagnosis
and to store electronic patient record
(EPR) in the medical image by
steganography.
2)Miltary applications such as, The
photographers who work in enemy areas
can use this system to transmit
photographs.
SECRET IMAGE SHAREING
A medical image to share
SHARES ARE GENERATED USING
ALGORITHM:-
STEGO IMAGES FOR THE SHARES:-
FUTURE SCOPE
Secret image sharing with Steganography
is that current space of analysis wherever
heap of scope exists.
The combination of both provides higher
levels of security to the information being
transmitted.
FUTURE SCOPE
The special attention is given to improve
the quality of the reconstructed image.
Cryptography techniques like RSA, AES
and hash functions can also be used with
steganography to provide more security.
REFERENCES
1)Sharing and hiding secret images with
size constraint Yu-Shan Wu, Chih-Ching
Thien, Ja-Chen Lin∗
2)Shamir A. How to share a secret.
Communication of the ACM
1979;22(11):612–3.
3)Medical image security and EPR hiding
using Shamir’s secret sharing scheme
Mustafa Ulutas, Güzin Ulutas , Vasif V.∗
Nabiyev
PRESENTED BY:-
SHRUTI T KULKARNI

More Related Content

What's hot

Stegnography
StegnographyStegnography
Stegnography
Sonal Kathel
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
Jitu Choudhary
 
Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSB
Sreelekshmi Sree
 
AUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONAUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATION
Manush Desai
 
Steganography
Steganography Steganography
Steganography
Uttam Jain
 
Image Security
Image SecurityImage Security
Image Security
Satyendra Rajput
 
Raster animation
Raster animationRaster animation
Raster animation
abhijit754
 
Steganography
SteganographySteganography
Steganography
Shankar Murthy
 
Steganography
SteganographySteganography
Steganography
Madhani Harsh
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
Ankit Gupta
 
Security Attacks.ppt
Security Attacks.pptSecurity Attacks.ppt
Security Attacks.ppt
Zaheer720515
 
Steganography
SteganographySteganography
Steganography
Jitendra Singh Deshwal
 
VIDEO STEGANOGRAPHY
VIDEO STEGANOGRAPHYVIDEO STEGANOGRAPHY
VIDEO STEGANOGRAPHY
SHAJANA BASHEER
 
Steganography
SteganographySteganography
Steganography
Neha Sharma
 
About Steganography
About SteganographyAbout Steganography
About Steganography
Sudhansh Gupta
 
Steganography ppt
Steganography pptSteganography ppt
Block cipher modes of operation
Block cipher modes of operation Block cipher modes of operation
Block cipher modes of operation
harshit chavda
 
Steganography
SteganographySteganography
Steganography
PREMKUMAR
 
Security services and mechanisms
Security services and mechanismsSecurity services and mechanisms
Security services and mechanisms
Rajapriya82
 
Steganography
SteganographySteganography
Steganography
Daksh Verma
 

What's hot (20)

Stegnography
StegnographyStegnography
Stegnography
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSB
 
AUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONAUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATION
 
Steganography
Steganography Steganography
Steganography
 
Image Security
Image SecurityImage Security
Image Security
 
Raster animation
Raster animationRaster animation
Raster animation
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
 
Security Attacks.ppt
Security Attacks.pptSecurity Attacks.ppt
Security Attacks.ppt
 
Steganography
SteganographySteganography
Steganography
 
VIDEO STEGANOGRAPHY
VIDEO STEGANOGRAPHYVIDEO STEGANOGRAPHY
VIDEO STEGANOGRAPHY
 
Steganography
SteganographySteganography
Steganography
 
About Steganography
About SteganographyAbout Steganography
About Steganography
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
Block cipher modes of operation
Block cipher modes of operation Block cipher modes of operation
Block cipher modes of operation
 
Steganography
SteganographySteganography
Steganography
 
Security services and mechanisms
Security services and mechanismsSecurity services and mechanisms
Security services and mechanisms
 
Steganography
SteganographySteganography
Steganography
 

Viewers also liked

Image secret sharing using Shamir's Algorithm
Image secret sharing using Shamir's AlgorithmImage secret sharing using Shamir's Algorithm
Image secret sharing using Shamir's Algorithm
Nikita Kasar
 
Secret sharing schemes
Secret sharing schemesSecret sharing schemes
Secret sharing schemes
wonloser
 
secret sharing schemes
secret sharing schemessecret sharing schemes
secret sharing schemes
wonloser
 
Visual Cryptography
Visual CryptographyVisual Cryptography
Visual Cryptography
AneeshGKumar
 
Steganography using visual cryptography
Steganography using visual cryptographySteganography using visual cryptography
Steganography using visual cryptography
Saurabh Nambiar
 
The Heartbleed Attack
The Heartbleed AttackThe Heartbleed Attack
The Heartbleed Attack
Shreyas Kothari
 
Secret Sharing Cs416
Secret Sharing Cs416Secret Sharing Cs416
Secret Sharing Cs416
Akash Chandrayan
 
Shamir Secret Sharing Presentation
Shamir Secret Sharing PresentationShamir Secret Sharing Presentation
Shamir Secret Sharing Presentation
Kaliel Williamson
 
Visual Cryptography in Meaningful Shares
Visual Cryptography in Meaningful SharesVisual Cryptography in Meaningful Shares
Visual Cryptography in Meaningful Shares
Debarko De
 
steganography using visual cryptography_report
steganography using visual cryptography_reportsteganography using visual cryptography_report
steganography using visual cryptography_report
Saurabh Nambiar
 
Visual Cryptography
Visual CryptographyVisual Cryptography
Visual Cryptography
Harish Sripathi
 
Steganography
SteganographySteganography
Steganography
Sonam M
 
Visual cryptography1
Visual cryptography1Visual cryptography1
Visual cryptography1
Pratiksha Patil
 
Visual CryptoGraphy
Visual CryptoGraphyVisual CryptoGraphy
Visual CryptoGraphy
pallavikhandekar212
 
INFORMATION SECURITY SYSTEM
INFORMATION SECURITY SYSTEMINFORMATION SECURITY SYSTEM
INFORMATION SECURITY SYSTEM
ANAND MURALI
 
Cybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacksCybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacks
sommerville-videos
 
Visual Cryptography
Visual CryptographyVisual Cryptography
Visual Cryptography
Ecaterina Moraru (Valica)
 
Ion exchange chromatography
Ion exchange chromatographyIon exchange chromatography
Ion exchange chromatography
shishirkawde
 

Viewers also liked (18)

Image secret sharing using Shamir's Algorithm
Image secret sharing using Shamir's AlgorithmImage secret sharing using Shamir's Algorithm
Image secret sharing using Shamir's Algorithm
 
Secret sharing schemes
Secret sharing schemesSecret sharing schemes
Secret sharing schemes
 
secret sharing schemes
secret sharing schemessecret sharing schemes
secret sharing schemes
 
Visual Cryptography
Visual CryptographyVisual Cryptography
Visual Cryptography
 
Steganography using visual cryptography
Steganography using visual cryptographySteganography using visual cryptography
Steganography using visual cryptography
 
The Heartbleed Attack
The Heartbleed AttackThe Heartbleed Attack
The Heartbleed Attack
 
Secret Sharing Cs416
Secret Sharing Cs416Secret Sharing Cs416
Secret Sharing Cs416
 
Shamir Secret Sharing Presentation
Shamir Secret Sharing PresentationShamir Secret Sharing Presentation
Shamir Secret Sharing Presentation
 
Visual Cryptography in Meaningful Shares
Visual Cryptography in Meaningful SharesVisual Cryptography in Meaningful Shares
Visual Cryptography in Meaningful Shares
 
steganography using visual cryptography_report
steganography using visual cryptography_reportsteganography using visual cryptography_report
steganography using visual cryptography_report
 
Visual Cryptography
Visual CryptographyVisual Cryptography
Visual Cryptography
 
Steganography
SteganographySteganography
Steganography
 
Visual cryptography1
Visual cryptography1Visual cryptography1
Visual cryptography1
 
Visual CryptoGraphy
Visual CryptoGraphyVisual CryptoGraphy
Visual CryptoGraphy
 
INFORMATION SECURITY SYSTEM
INFORMATION SECURITY SYSTEMINFORMATION SECURITY SYSTEM
INFORMATION SECURITY SYSTEM
 
Cybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacksCybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacks
 
Visual Cryptography
Visual CryptographyVisual Cryptography
Visual Cryptography
 
Ion exchange chromatography
Ion exchange chromatographyIon exchange chromatography
Ion exchange chromatography
 

Similar to Image secret sharing using Shamir's scheme with Steganography

Reversible Multiple Image Secret Sharing using Discrete Haar Wavelet Transform
Reversible Multiple Image Secret Sharing using Discrete Haar Wavelet Transform Reversible Multiple Image Secret Sharing using Discrete Haar Wavelet Transform
Reversible Multiple Image Secret Sharing using Discrete Haar Wavelet Transform
IJECEIAES
 
V01 i010411
V01 i010411V01 i010411
V01 i010411
IJARBEST JOURNAL
 
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...
IOSR Journals
 
Reversible Data Hiding in Encrypted Image: A Review
Reversible Data Hiding in Encrypted Image: A ReviewReversible Data Hiding in Encrypted Image: A Review
Reversible Data Hiding in Encrypted Image: A Review
Editor IJMTER
 
A novel steganographic scheme based on
A novel steganographic scheme based onA novel steganographic scheme based on
A novel steganographic scheme based on
acijjournal
 
Analysing secure image secret sharing schemes based on steganography
Analysing secure image secret sharing schemes based on steganographyAnalysing secure image secret sharing schemes based on steganography
Analysing secure image secret sharing schemes based on steganography
IAEME Publication
 
Image Steganography. Image Steganography. Image Steganography
Image Steganography. Image Steganography. Image SteganographyImage Steganography. Image Steganography. Image Steganography
Image Steganography. Image Steganography. Image Steganography
Monica Turner
 
F42022628
F42022628F42022628
F42022628
IJERA Editor
 
A Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography TechniquesA Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography Techniques
Rick Vogel
 
A Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography TechniqueA Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography Technique
Jeff Brooks
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming MachineIRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
IRJET Journal
 
Survey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular FormSurvey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular Form
ijsrd.com
 
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
IJCSIS Research Publications
 
novel Approach For Data Hiding by integrating Steganography and Extended Visu...
novel Approach For Data Hiding by integrating Steganography and Extended Visu...novel Approach For Data Hiding by integrating Steganography and Extended Visu...
novel Approach For Data Hiding by integrating Steganography and Extended Visu...
swapnalithakur7
 
Genetic Algorithm based Mosaic Image Steganography for Enhanced Security
Genetic Algorithm based Mosaic Image Steganography for Enhanced SecurityGenetic Algorithm based Mosaic Image Steganography for Enhanced Security
Genetic Algorithm based Mosaic Image Steganography for Enhanced Security
IDES Editor
 
Biometric Hashing technique for Authentication
Biometric  Hashing technique for  AuthenticationBiometric  Hashing technique for  Authentication
Biometric Hashing technique for Authentication
AnIsh Kumar
 
IRJET- Machine Learning Application for Data Security
IRJET- Machine Learning Application for Data SecurityIRJET- Machine Learning Application for Data Security
IRJET- Machine Learning Application for Data Security
IRJET Journal
 
High Capacity and Security Steganography Using Discrete Wavelet Transform
High Capacity and Security Steganography Using Discrete Wavelet TransformHigh Capacity and Security Steganography Using Discrete Wavelet Transform
High Capacity and Security Steganography Using Discrete Wavelet Transform
CSCJournals
 
Fx3610771081
Fx3610771081Fx3610771081
Fx3610771081
IJERA Editor
 

Similar to Image secret sharing using Shamir's scheme with Steganography (20)

Reversible Multiple Image Secret Sharing using Discrete Haar Wavelet Transform
Reversible Multiple Image Secret Sharing using Discrete Haar Wavelet Transform Reversible Multiple Image Secret Sharing using Discrete Haar Wavelet Transform
Reversible Multiple Image Secret Sharing using Discrete Haar Wavelet Transform
 
V01 i010411
V01 i010411V01 i010411
V01 i010411
 
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...
 
Reversible Data Hiding in Encrypted Image: A Review
Reversible Data Hiding in Encrypted Image: A ReviewReversible Data Hiding in Encrypted Image: A Review
Reversible Data Hiding in Encrypted Image: A Review
 
A novel steganographic scheme based on
A novel steganographic scheme based onA novel steganographic scheme based on
A novel steganographic scheme based on
 
Analysing secure image secret sharing schemes based on steganography
Analysing secure image secret sharing schemes based on steganographyAnalysing secure image secret sharing schemes based on steganography
Analysing secure image secret sharing schemes based on steganography
 
Image Steganography. Image Steganography. Image Steganography
Image Steganography. Image Steganography. Image SteganographyImage Steganography. Image Steganography. Image Steganography
Image Steganography. Image Steganography. Image Steganography
 
F42022628
F42022628F42022628
F42022628
 
A Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography TechniquesA Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography Techniques
 
A Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography TechniqueA Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography Technique
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming MachineIRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
 
Survey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular FormSurvey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular Form
 
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
 
novel Approach For Data Hiding by integrating Steganography and Extended Visu...
novel Approach For Data Hiding by integrating Steganography and Extended Visu...novel Approach For Data Hiding by integrating Steganography and Extended Visu...
novel Approach For Data Hiding by integrating Steganography and Extended Visu...
 
Genetic Algorithm based Mosaic Image Steganography for Enhanced Security
Genetic Algorithm based Mosaic Image Steganography for Enhanced SecurityGenetic Algorithm based Mosaic Image Steganography for Enhanced Security
Genetic Algorithm based Mosaic Image Steganography for Enhanced Security
 
Biometric Hashing technique for Authentication
Biometric  Hashing technique for  AuthenticationBiometric  Hashing technique for  Authentication
Biometric Hashing technique for Authentication
 
IRJET- Machine Learning Application for Data Security
IRJET- Machine Learning Application for Data SecurityIRJET- Machine Learning Application for Data Security
IRJET- Machine Learning Application for Data Security
 
High Capacity and Security Steganography Using Discrete Wavelet Transform
High Capacity and Security Steganography Using Discrete Wavelet TransformHigh Capacity and Security Steganography Using Discrete Wavelet Transform
High Capacity and Security Steganography Using Discrete Wavelet Transform
 
Fx3610771081
Fx3610771081Fx3610771081
Fx3610771081
 

Recently uploaded

Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
Hitesh Mohapatra
 
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTSHeap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Soumen Santra
 
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
ihlasbinance2003
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
Dr Ramhari Poudyal
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
obonagu
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
MIGUELANGEL966976
 
Swimming pool mechanical components design.pptx
Swimming pool  mechanical components design.pptxSwimming pool  mechanical components design.pptx
Swimming pool mechanical components design.pptx
yokeleetan1
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
zwunae
 
Technical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prismsTechnical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prisms
heavyhaig
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
Rahul
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
IJECEIAES
 
This is my Environmental physics presentation
This is my Environmental physics presentationThis is my Environmental physics presentation
This is my Environmental physics presentation
ZainabHashmi17
 
Adaptive synchronous sliding control for a robot manipulator based on neural ...
Adaptive synchronous sliding control for a robot manipulator based on neural ...Adaptive synchronous sliding control for a robot manipulator based on neural ...
Adaptive synchronous sliding control for a robot manipulator based on neural ...
IJECEIAES
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
camseq
 
Low power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniquesLow power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniques
nooriasukmaningtyas
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
zwunae
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
KrishnaveniKrishnara1
 

Recently uploaded (20)

Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
 
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTSHeap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
 
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
 
Swimming pool mechanical components design.pptx
Swimming pool  mechanical components design.pptxSwimming pool  mechanical components design.pptx
Swimming pool mechanical components design.pptx
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
 
Technical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prismsTechnical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prisms
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
 
This is my Environmental physics presentation
This is my Environmental physics presentationThis is my Environmental physics presentation
This is my Environmental physics presentation
 
Adaptive synchronous sliding control for a robot manipulator based on neural ...
Adaptive synchronous sliding control for a robot manipulator based on neural ...Adaptive synchronous sliding control for a robot manipulator based on neural ...
Adaptive synchronous sliding control for a robot manipulator based on neural ...
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
 
Low power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniquesLow power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniques
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
 

Image secret sharing using Shamir's scheme with Steganography

  • 1. Secret Image Sharing Guided By:- Prof. Dr.Sonali Patil.
  • 2. ----Problem Statement---- To Study image secret sharing using Shamir’s secret sharing algorithm and Steganography .
  • 3. OBJECTIVES  Providing more security for image communication.  To achieve transparency, authority (resistance to various image tampering and forgery methods), and high capacity of the hidden data.
  • 4.  Schemes are important tools in cryptography and they are used as a building box in many secure protocols,threshold cryptography, access control, attribute-based Encryption.  Secret image sharing has become a key technology for digital images in secured storage and confidential transmission. MOTIVATION
  • 5. MOTIVATION Image data is not secure over network and social networking sites. Drawbacks in various secret sharing algorithms.
  • 6. Total image security and confidentiality over transmission. Hindrance to Image tampering. Expected Outcome
  • 7. LITERATURE SURVEY Shamir’s Algorithm:- Shamir developed a sharing method (a (t; n)threshold scheme, t/n) for sharing a secret image among n participants, such that any t participants could cooperate to reconstruct the secret image, while t−1 or fewer participants could not.
  • 8. LITERATURE SURVEY Why Steganography??? 1)Share images look like random noise and thus draw attention of the malicious users. 2)Confidentiality of the shares is realized by Steganography.
  • 9. LITERATURE SURVEY What is Steganography:- Steganography is the method used to hide shares into natural looking cover images. The dealer should select n natural looking cover images of size 2W×2H to hide a W×H secret image for a (k, n) secret sharing scheme.
  • 11. LITERATURE SURVEY LSB Method:- 1)LSB method stands for “Least Significant Bit Method”. 2) This method is used for embedding the shares into the host images. 3)Share images are processed pixel by pixel during embedding.
  • 12. LITERATURE SURVEY LSB Method continues….. 3)Share image pixel values are embedded into corresponding 2×2 pixel groups called cover blocks in cover image. 4)Therefore, two LSBs of each pixel in th corresponding cover block is used to hide the shared pixel with eight bits.
  • 13. APPLICATIONS 1)Medical applications such telediagnosis and to store electronic patient record (EPR) in the medical image by steganography. 2)Miltary applications such as, The photographers who work in enemy areas can use this system to transmit photographs.
  • 14. SECRET IMAGE SHAREING A medical image to share
  • 15. SHARES ARE GENERATED USING ALGORITHM:-
  • 16. STEGO IMAGES FOR THE SHARES:-
  • 17. FUTURE SCOPE Secret image sharing with Steganography is that current space of analysis wherever heap of scope exists. The combination of both provides higher levels of security to the information being transmitted.
  • 18. FUTURE SCOPE The special attention is given to improve the quality of the reconstructed image. Cryptography techniques like RSA, AES and hash functions can also be used with steganography to provide more security.
  • 19. REFERENCES 1)Sharing and hiding secret images with size constraint Yu-Shan Wu, Chih-Ching Thien, Ja-Chen Lin∗ 2)Shamir A. How to share a secret. Communication of the ACM 1979;22(11):612–3. 3)Medical image security and EPR hiding using Shamir’s secret sharing scheme Mustafa Ulutas, Güzin Ulutas , Vasif V.∗ Nabiyev