01-01-2013, 01:18 PM
An Improved Secret Image Sharing Scheme with Steganography
An Improved Secret Image.pptx (Size: 637.42 KB / Downloads: 36)
INTRODUCTION:
The secret sharing mechanism has been widely applied
to share sensitive data, such as secret key, etc.
Generally, the essentials of the secret image sharing scheme
Should include the following aspects:
Any t out of n authorized participants could cooperate to reveal the secret image.
None of the (t-1) participants could reveal the secret image.
Not to attract intruder’s attention, the shadow should be meaningful.
The revealed secret image must be distortion-free.
OBJECTIVE:
Using (t,n) –threshold and steganography could realize the secret image sharing.
The new scheme utilized(t,n) -threshold to share the secret image and embedded the produced ‘n’ shadows into different cover images.
Any t out of n shadows can reveal the original secret image, and the cover images could be reconstructed with limited distortion.
EXISTING SYSTEM:
In an existing system first transform the secret
pixels into the m-ary notational system.
The information data used to reconstruct original pixels from camouflaged pixels are calculated.
The information data and transformed secret data are shared using the (t, n)-threshold sharing scheme.
In this way, can retrieve the lossless secret image and reverse the stego image to the original image.
PROBLEM FORMULATION:
In the exsisting system The scheme embeds (t-1) digits,not (t-1) secret pixel into F(x).
The obtained pixel value of the stego image is 258.
But the maximum pixel value of 8-bit
grayscale image is 255.
The secret image can’t be revealed without any distortion.
It just utilizes one cover image, it generate ‘n’
stego images are similar visually.so it easily attract intruder attention.
PROPOSED SYSTEM:
In our proposed system, the pixel values of the cover images change no more than (m−1) after been embedded shadows, if the chosen prime number m is not big,the generated stego images seen normal.
Any ‘t’ out of ‘n’ stego images could reveal the secret Image with no distortion , so that the ‘n’ stego images could be transmittd instead of the secret image on the internet.
This scheme utilizes (t −T) different cover images to camouflage the shadows make the stego images different,it is not to attract the intruder’s attention.
CONCLUSION:
The key point of a secret image sharing scheme is that the secret image should be revealed with no distortion when some shadows are lost.
The new scheme utilizes (t −T) different cover images to camouflage the shadows,so that the intruder won’t be attracted easily. which is applicable in the unreliable internet environment.
which can be accepted in common application.