image secret sharing using shamir's scheme with steganography
TRANSCRIPT
![Page 1: Image secret sharing using Shamir's scheme with Steganography](https://reader036.vdocuments.mx/reader036/viewer/2022081515/58ee838a1a28abcd758b461d/html5/thumbnails/1.jpg)
Secret Image Sharing
Guided By:-Prof. Dr.Sonali Patil.
![Page 2: Image secret sharing using Shamir's scheme with Steganography](https://reader036.vdocuments.mx/reader036/viewer/2022081515/58ee838a1a28abcd758b461d/html5/thumbnails/2.jpg)
----Problem Statement----
To Study image secret sharing using Shamir’s secret sharing algorithm and Steganography .
![Page 3: Image secret sharing using Shamir's scheme with Steganography](https://reader036.vdocuments.mx/reader036/viewer/2022081515/58ee838a1a28abcd758b461d/html5/thumbnails/3.jpg)
OBJECTIVES Providing more security for image
communication. To achieve transparency, authority
(resistance to various image tampering and forgery methods), and high capacity of the hidden data.
![Page 4: Image secret sharing using Shamir's scheme with Steganography](https://reader036.vdocuments.mx/reader036/viewer/2022081515/58ee838a1a28abcd758b461d/html5/thumbnails/4.jpg)
Schemes are important tools in cryptography and they are used as a building box in many secure protocols,threshold cryptography, access control, attribute-based Encryption.
Secret image sharing has become a key technology for digital images in secured storage and confidential transmission.
MOTIVATION
![Page 5: Image secret sharing using Shamir's scheme with Steganography](https://reader036.vdocuments.mx/reader036/viewer/2022081515/58ee838a1a28abcd758b461d/html5/thumbnails/5.jpg)
MOTIVATIONImage data is not secure over network and social networking sites.Drawbacks in various secret sharing algorithms.
![Page 6: Image secret sharing using Shamir's scheme with Steganography](https://reader036.vdocuments.mx/reader036/viewer/2022081515/58ee838a1a28abcd758b461d/html5/thumbnails/6.jpg)
Total image security and confidentiality over transmission.
Hindrance to Image tampering.
Expected Outcome
![Page 7: Image secret sharing using Shamir's scheme with Steganography](https://reader036.vdocuments.mx/reader036/viewer/2022081515/58ee838a1a28abcd758b461d/html5/thumbnails/7.jpg)
LITERATURE SURVEY
Shamir’s Algorithm:- Shamir developed a sharing method (a (t;
n)threshold scheme, t/n) for sharing a secret image among n participants, such that any t participants could cooperate to reconstruct the secret image, while t−1 or fewer participants could not.
![Page 8: Image secret sharing using Shamir's scheme with Steganography](https://reader036.vdocuments.mx/reader036/viewer/2022081515/58ee838a1a28abcd758b461d/html5/thumbnails/8.jpg)
LITERATURE SURVEY Why Steganography??? 1)Share images look like random noise
and thus draw attention of the malicious users.
2)Confidentiality of the shares is realized by Steganography.
![Page 9: Image secret sharing using Shamir's scheme with Steganography](https://reader036.vdocuments.mx/reader036/viewer/2022081515/58ee838a1a28abcd758b461d/html5/thumbnails/9.jpg)
LITERATURE SURVEY
What is Steganography:- Steganography is the method used to hide
shares into natural looking cover images. The dealer should select n natural looking cover images of size 2W×2H to hide a W×H secret image for a (k, n) secret sharing scheme.
![Page 10: Image secret sharing using Shamir's scheme with Steganography](https://reader036.vdocuments.mx/reader036/viewer/2022081515/58ee838a1a28abcd758b461d/html5/thumbnails/10.jpg)
Steganographic Image
![Page 11: Image secret sharing using Shamir's scheme with Steganography](https://reader036.vdocuments.mx/reader036/viewer/2022081515/58ee838a1a28abcd758b461d/html5/thumbnails/11.jpg)
LITERATURE SURVEY
LSB Method:- 1)LSB method stands for “Least Significant
Bit Method”. 2) This method is used for embedding the
shares into the host images. 3)Share images are processed pixel by
pixel during embedding.
![Page 12: Image secret sharing using Shamir's scheme with Steganography](https://reader036.vdocuments.mx/reader036/viewer/2022081515/58ee838a1a28abcd758b461d/html5/thumbnails/12.jpg)
LITERATURE SURVEY
LSB Method continues….. 3)Share image pixel values are embedded
into corresponding 2×2 pixel groups called cover blocks in cover image.
4)Therefore, two LSBs of each pixel in th corresponding cover block is used to hide the shared pixel with eight bits.
![Page 13: Image secret sharing using Shamir's scheme with Steganography](https://reader036.vdocuments.mx/reader036/viewer/2022081515/58ee838a1a28abcd758b461d/html5/thumbnails/13.jpg)
APPLICATIONS
1)Medical applications such telediagnosis and to store electronic patient record (EPR) in the medical image by steganography.
2)Miltary applications such as, The photographers who work in enemy areas can use this system to transmit photographs.
![Page 14: Image secret sharing using Shamir's scheme with Steganography](https://reader036.vdocuments.mx/reader036/viewer/2022081515/58ee838a1a28abcd758b461d/html5/thumbnails/14.jpg)
SECRET IMAGE SHAREING
A medical image to share
![Page 15: Image secret sharing using Shamir's scheme with Steganography](https://reader036.vdocuments.mx/reader036/viewer/2022081515/58ee838a1a28abcd758b461d/html5/thumbnails/15.jpg)
SHARES ARE GENERATED USING ALGORITHM:-
![Page 16: Image secret sharing using Shamir's scheme with Steganography](https://reader036.vdocuments.mx/reader036/viewer/2022081515/58ee838a1a28abcd758b461d/html5/thumbnails/16.jpg)
STEGO IMAGES FOR THE SHARES:-
![Page 17: Image secret sharing using Shamir's scheme with Steganography](https://reader036.vdocuments.mx/reader036/viewer/2022081515/58ee838a1a28abcd758b461d/html5/thumbnails/17.jpg)
FUTURE SCOPE
Secret image sharing with Steganography is that current space of analysis wherever heap of scope exists.
The combination of both provides higher levels of security to the information being transmitted.
![Page 18: Image secret sharing using Shamir's scheme with Steganography](https://reader036.vdocuments.mx/reader036/viewer/2022081515/58ee838a1a28abcd758b461d/html5/thumbnails/18.jpg)
FUTURE SCOPE
The special attention is given to improve the quality of the reconstructed image.
Cryptography techniques like RSA, AES and hash functions can also be used with steganography to provide more security.
![Page 19: Image secret sharing using Shamir's scheme with Steganography](https://reader036.vdocuments.mx/reader036/viewer/2022081515/58ee838a1a28abcd758b461d/html5/thumbnails/19.jpg)
REFERENCES 1)Sharing and hiding secret images with
size constraint Yu-Shan Wu, Chih-Ching Thien, Ja-Chen Lin∗
2)Shamir A. How to share a secret. Communication of the ACM 1979;22(11):612–3.
3)Medical image security and EPR hiding using Shamir’s secret sharing scheme Mustafa Ulutas, Güzin Ulutas , Vasif V. ∗Nabiyev
![Page 20: Image secret sharing using Shamir's scheme with Steganography](https://reader036.vdocuments.mx/reader036/viewer/2022081515/58ee838a1a28abcd758b461d/html5/thumbnails/20.jpg)
PRESENTED BY:- SHRUTI T KULKARNI