##plugins.themes.academic_pro.article.main##

Abstract

Visual cryptography (VC) is a technique that encrypts secret image in meaningful images. The meaningful images can be photos or hand-painted pictures in digital form or in printed form. N such shares can be used. VC is used to securely transmit secret images in non-computer aided environment. The shares can appear as noise-like pixels it will arouse suspicion and increase interception risk during transmission of the shares. Hence, VC schemes suffer from a transmission risk problem for the secret image. We also propose possible ways to hide the noise like share to reduce the transmission risk problem for the share. Cryptography hides the contents of the message from an attacker, but not the   existence of the message.To addresses this problem; we proposed Steganography that hides the very existence of the message in the communicating data. To hide noise like shares generated as a result of encryption, carrier image is used to reduce transmission risk; this technique used is called ‘Steganography’. In addition to this Alpha channel watermarking is used in case where hackers hack the image and try to destroy the image. In alpha channel water marking the average value of RGB of meaningful shares is stored in alpha channel. Such that receiver is able to make it out the integrity of received image by comparing original image with alpha channel embedded image.

##plugins.themes.academic_pro.article.details##

Author Biography

Pooja Ambekar, Yogita Bade, Payal Beura, Prof. S.M. Rajbhoj, Bharti Vidyapeeth College of Engineering for Women Pune

Department of ENTC
How to Cite
Prof. S.M. Rajbhoj, P. A. Y. B. P. B. (2015). Visual Secret Sharing (VSS) of Digital Images by Diverse Media using Stegnography. International Journal of Emerging Trends in Science and Technology, 2(03). Retrieved from http://igmpublication.org/ijetst.in/index.php/ijetst/article/view/540

References

[1] M. Naor and A. Shamir, “Visual cryptography,” in Advances in Cryptology, vol. 950. New York, NY, USA: Springer-Verlag, 1995, pp. 1–12.
[2] R. Z.Wang, Y. C. Lan, Y. K. Lee, S. Y. Huang, S. J. Shyu, and T. L. Chia,“Incrementing visual cryptography using random grids,” Opt. Commun.,vol. 283, no. 21, pp. 4242–4249, Nov. 2010. 98 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 9, NO. 1, JANUARY 2014
[3] P. L. Chiu and K. H. Lee, “A simulated annealing algorithm for general threshold visual cryptography schemes,” IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 992–1001, Sep. 2011
[4] K. H. Lee and P. L. Chiu, “Image size invariant visual cryptography for general access structures subject to display quality constraints,” IEEE Trans. Image Process., vol. 22, no. 10, pp. 3830–3841, Oct. 2013.
[5] G. Ateniese, C. Blundo, A. D. Santis, and D. R. Stinson, “Extended capabilities for visual cryptography,” Theoretical Comput. Sci., vol. 250, nos. 1–2, pp. 143–161, Jan. 2001.