Upload
2510stk
View
351
Download
0
Embed Size (px)
Citation preview
Secret Image Sharing
Guided By:-Prof. Dr.Sonali Patil.
----Problem Statement----
To Study image secret sharing using Shamir’s secret sharing algorithm and Steganography .
OBJECTIVES Providing more security for image
communication. To achieve transparency, authority
(resistance to various image tampering and forgery methods), and high capacity of the hidden data.
Schemes are important tools in cryptography and they are used as a building box in many secure protocols,threshold cryptography, access control, attribute-based Encryption.
Secret image sharing has become a key technology for digital images in secured storage and confidential transmission.
MOTIVATION
MOTIVATIONImage data is not secure over network and social networking sites.Drawbacks in various secret sharing algorithms.
Total image security and confidentiality over transmission.
Hindrance to Image tampering.
Expected Outcome
LITERATURE SURVEY
Shamir’s Algorithm:- Shamir developed a sharing method (a (t;
n)threshold scheme, t/n) for sharing a secret image among n participants, such that any t participants could cooperate to reconstruct the secret image, while t−1 or fewer participants could not.
LITERATURE SURVEY Why Steganography??? 1)Share images look like random noise
and thus draw attention of the malicious users.
2)Confidentiality of the shares is realized by Steganography.
LITERATURE SURVEY
What is Steganography:- Steganography is the method used to hide
shares into natural looking cover images. The dealer should select n natural looking cover images of size 2W×2H to hide a W×H secret image for a (k, n) secret sharing scheme.
Steganographic Image
LITERATURE SURVEY
LSB Method:- 1)LSB method stands for “Least Significant
Bit Method”. 2) This method is used for embedding the
shares into the host images. 3)Share images are processed pixel by
pixel during embedding.
LITERATURE SURVEY
LSB Method continues….. 3)Share image pixel values are embedded
into corresponding 2×2 pixel groups called cover blocks in cover image.
4)Therefore, two LSBs of each pixel in th corresponding cover block is used to hide the shared pixel with eight bits.
APPLICATIONS
1)Medical applications such telediagnosis and to store electronic patient record (EPR) in the medical image by steganography.
2)Miltary applications such as, The photographers who work in enemy areas can use this system to transmit photographs.
SECRET IMAGE SHAREING
A medical image to share
SHARES ARE GENERATED USING ALGORITHM:-
STEGO IMAGES FOR THE SHARES:-
FUTURE SCOPE
Secret image sharing with Steganography is that current space of analysis wherever heap of scope exists.
The combination of both provides higher levels of security to the information being transmitted.
FUTURE SCOPE
The special attention is given to improve the quality of the reconstructed image.
Cryptography techniques like RSA, AES and hash functions can also be used with steganography to provide more security.
REFERENCES 1)Sharing and hiding secret images with
size constraint Yu-Shan Wu, Chih-Ching Thien, Ja-Chen Lin∗
2)Shamir A. How to share a secret. Communication of the ACM 1979;22(11):612–3.
3)Medical image security and EPR hiding using Shamir’s secret sharing scheme Mustafa Ulutas, Güzin Ulutas , Vasif V. ∗Nabiyev
PRESENTED BY:- SHRUTI T KULKARNI