Secret Image Sharing
Guided By:-
Prof. Dr.Sonali Patil.
----Problem Statement----
To Study image secret sharing using
Shamir’s secret sharing algorithm and
Steganography .
OBJECTIVES
 Providing more security for image
communication.
 To achieve transparency, authority
(resistance to various image tampering
and forgery methods), and high capacity
of the hidden data.
 Schemes are important tools in
cryptography and they are used as a
building box in many secure
protocols,threshold cryptography, access
control, attribute-based Encryption.
 Secret image sharing has become a key
technology for digital images in secured
storage and confidential transmission.
MOTIVATION
MOTIVATION
Image data is not secure over network
and
social networking sites.
Drawbacks in various secret sharing
algorithms.
Total image security and confidentiality
over transmission.
Hindrance to Image tampering.
Expected Outcome
LITERATURE SURVEY
Shamir’s Algorithm:-
Shamir developed a sharing method (a (t;
n)threshold scheme, t/n) for sharing a
secret image among n participants, such
that any t participants could cooperate to
reconstruct the secret image, while t−1 or
fewer participants could not.
LITERATURE SURVEY
Why Steganography???
1)Share images look like random noise
and thus draw attention of the malicious
users.
2)Confidentiality of the shares is realized
by Steganography.
LITERATURE SURVEY
What is Steganography:-
Steganography is the method used to hide
shares into natural looking cover images.
The dealer should select n natural looking
cover images of size 2W×2H to hide a
W×H secret image for a (k, n) secret
sharing scheme.
Steganographic Image
LITERATURE SURVEY
LSB Method:-
1)LSB method stands for “Least Significant
Bit Method”.
2) This method is used for embedding the
shares into the host images.
3)Share images are processed pixel by
pixel during embedding.
LITERATURE SURVEY
LSB Method continues…..
3)Share image pixel values are embedded
into corresponding 2×2 pixel groups called
cover blocks in cover image.
4)Therefore, two LSBs of each pixel in th
corresponding cover block is used to hide
the shared pixel with eight bits.
APPLICATIONS
1)Medical applications such telediagnosis
and to store electronic patient record
(EPR) in the medical image by
steganography.
2)Miltary applications such as, The
photographers who work in enemy areas
can use this system to transmit
photographs.
SECRET IMAGE SHAREING
A medical image to share
SHARES ARE GENERATED USING
ALGORITHM:-
STEGO IMAGES FOR THE SHARES:-
FUTURE SCOPE
Secret image sharing with Steganography
is that current space of analysis wherever
heap of scope exists.
The combination of both provides higher
levels of security to the information being
transmitted.
FUTURE SCOPE
The special attention is given to improve
the quality of the reconstructed image.
Cryptography techniques like RSA, AES
and hash functions can also be used with
steganography to provide more security.
REFERENCES
1)Sharing and hiding secret images with
size constraint Yu-Shan Wu, Chih-Ching
Thien, Ja-Chen Lin∗
2)Shamir A. How to share a secret.
Communication of the ACM
1979;22(11):612–3.
3)Medical image security and EPR hiding
using Shamir’s secret sharing scheme
Mustafa Ulutas, Güzin Ulutas , Vasif V.∗
Nabiyev
PRESENTED BY:-
SHRUTI T KULKARNI

Image secret sharing using Shamir's scheme with Steganography

  • 1.
    Secret Image Sharing GuidedBy:- Prof. Dr.Sonali Patil.
  • 2.
    ----Problem Statement---- To Studyimage secret sharing using Shamir’s secret sharing algorithm and Steganography .
  • 3.
    OBJECTIVES  Providing moresecurity for image communication.  To achieve transparency, authority (resistance to various image tampering and forgery methods), and high capacity of the hidden data.
  • 4.
     Schemes areimportant tools in cryptography and they are used as a building box in many secure protocols,threshold cryptography, access control, attribute-based Encryption.  Secret image sharing has become a key technology for digital images in secured storage and confidential transmission. MOTIVATION
  • 5.
    MOTIVATION Image data isnot secure over network and social networking sites. Drawbacks in various secret sharing algorithms.
  • 6.
    Total image securityand confidentiality over transmission. Hindrance to Image tampering. Expected Outcome
  • 7.
    LITERATURE SURVEY Shamir’s Algorithm:- Shamirdeveloped a sharing method (a (t; n)threshold scheme, t/n) for sharing a secret image among n participants, such that any t participants could cooperate to reconstruct the secret image, while t−1 or fewer participants could not.
  • 8.
    LITERATURE SURVEY Why Steganography??? 1)Shareimages look like random noise and thus draw attention of the malicious users. 2)Confidentiality of the shares is realized by Steganography.
  • 9.
    LITERATURE SURVEY What isSteganography:- Steganography is the method used to hide shares into natural looking cover images. The dealer should select n natural looking cover images of size 2W×2H to hide a W×H secret image for a (k, n) secret sharing scheme.
  • 10.
  • 11.
    LITERATURE SURVEY LSB Method:- 1)LSBmethod stands for “Least Significant Bit Method”. 2) This method is used for embedding the shares into the host images. 3)Share images are processed pixel by pixel during embedding.
  • 12.
    LITERATURE SURVEY LSB Methodcontinues….. 3)Share image pixel values are embedded into corresponding 2×2 pixel groups called cover blocks in cover image. 4)Therefore, two LSBs of each pixel in th corresponding cover block is used to hide the shared pixel with eight bits.
  • 13.
    APPLICATIONS 1)Medical applications suchtelediagnosis and to store electronic patient record (EPR) in the medical image by steganography. 2)Miltary applications such as, The photographers who work in enemy areas can use this system to transmit photographs.
  • 14.
    SECRET IMAGE SHAREING Amedical image to share
  • 15.
    SHARES ARE GENERATEDUSING ALGORITHM:-
  • 16.
    STEGO IMAGES FORTHE SHARES:-
  • 17.
    FUTURE SCOPE Secret imagesharing with Steganography is that current space of analysis wherever heap of scope exists. The combination of both provides higher levels of security to the information being transmitted.
  • 18.
    FUTURE SCOPE The specialattention is given to improve the quality of the reconstructed image. Cryptography techniques like RSA, AES and hash functions can also be used with steganography to provide more security.
  • 19.
    REFERENCES 1)Sharing and hidingsecret images with size constraint Yu-Shan Wu, Chih-Ching Thien, Ja-Chen Lin∗ 2)Shamir A. How to share a secret. Communication of the ACM 1979;22(11):612–3. 3)Medical image security and EPR hiding using Shamir’s secret sharing scheme Mustafa Ulutas, Güzin Ulutas , Vasif V.∗ Nabiyev
  • 20.