CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

Sharing of a Digital Secret Image by Diverse Media for More Security

by Tejbir Kaur, Ajay Kakkar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 171 - Number 3
Year of Publication: 2017
Authors: Tejbir Kaur, Ajay Kakkar
10.5120/ijca2017915001

Tejbir Kaur, Ajay Kakkar . Sharing of a Digital Secret Image by Diverse Media for More Security. International Journal of Computer Applications. 171, 3 ( Aug 2017), 26-29. DOI=10.5120/ijca2017915001

@article{ 10.5120/ijca2017915001,
author = { Tejbir Kaur, Ajay Kakkar },
title = { Sharing of a Digital Secret Image by Diverse Media for More Security },
journal = { International Journal of Computer Applications },
issue_date = { Aug 2017 },
volume = { 171 },
number = { 3 },
month = { Aug },
year = { 2017 },
issn = { 0975-8887 },
pages = { 26-29 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume171/number3/28162-2017915001/ },
doi = { 10.5120/ijca2017915001 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:18:28.410052+05:30
%A Tejbir Kaur
%A Ajay Kakkar
%T Sharing of a Digital Secret Image by Diverse Media for More Security
%J International Journal of Computer Applications
%@ 0975-8887
%V 171
%N 3
%P 26-29
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The efficient algorithms require correct protocols for authentication and key management. It is intended to design the available cryptographic algorithm to achieve more security and this will be done by incorporating visual cryptography. The visual cryptography is an efficient method to share our data in secured manner. Conventional Visual Secret Sharing (VSS) schemes hide secret images in shares that are either printed on transparencies or are encoded and stored in a digital form. Natural visual secret sharing (NVSS) in which various carrier media is used to carry secret images Natural visual secret sharing (NVSS) in which various carrier media is used to carry secret images by a share to protect the secret and the participants during the transmission phase has been proposed. The proposed (n, n) - NVSS scheme shares one digital secret image over n-1 arbitrary selected natural images and one noise-like share. The above work have its utility to transfer secret information over web, so that, intruder couldn’t detect it. Our aim is to use visual cryptography for transmission of the secret image and to protect the network in order to keep the data confidential. The image is preprocessed, and then feature extraction has been done. The PSNR values of digital and handmade image are 33.04 and 32.93 respectively. In feature extraction process thresholding, binarization and chaos process has been done. The median values of digital and handmade image come out to be 205 and 162 respectively. All the pixels are being arranged with respect to median values. Some more techniques like encryption and pixel swapping has also been used. And at the end, to give our information more security, steganography is used. The PSNR and elapsed time of the images is also been analyzed.

References
  1. Vercauteren F. (2006). A fault attack on pairing based cryptography, IEEE transaction on computers, 55(9), 1075-1080.
  2. S.V. Kartalopoulos (2006) A primer on cryptography in communications, IEEE communications magazine 32(4), 146-151.
  3. Ma Kun, Liang Han and Wu Kaijie (2012). Homomorphic Property-Based Concurrent Error Detection of RSA: A Countermeasure to Fault Attack, IEEE Transactions on Computers, 61(7), 1040-1049.
  4. Kakkar Ajay, Singh M. L. and Bansal P. K. (2012). Mathematical analysis and Simulation of multiple keys and S-Boxes in a multi-node network for secure Transmission, International Journal of Computer Mathematics, 89(16), 2123–2142.
  5. Wang Xiang, Pei Qingqi and Li Hui (2014). A Lossless Tagged Visual Cryptography Scheme, IEEE Signal Processing Letters, 21(7), 853-856.
  6. Wang Ran-Zan (2009). Region Incrementing Visual Cryptography, IEEE Signal Processing Letters, 16(8), 659-662.
  7. Lee Kai-Hui and Chiu Pei-Ling (2014). Digital Image Sharing by Diverse Image Media, IEEE Transaction on Information Forensic and Security, 9(1), 88-98.
  8. Shyong Jian Shyu and Ming Chiang Chen (2011). Optimum Pixel Expansions for Threshold Visual Secret Sharing Schemes, IEEE Transactions on Information Forensics and Security, 6(3), 960-969.
  9. Liu Feng, Wu Chuankun(2010). Step Construction of Visual Cryptography Schemes, IEEE Transactions on Information Forensics and Security, 5(1), 27-38.
  10. Li Bin (2008). Steganalysis of Multiple-Base Notational System Steganography, IEEE Signal Processing Letters, 15, 493-496.
  11. Zhang Liang and Wang Haili (2009). A High-Capacity Steganography Scheme for JPEG2000 Baseline System, IEEE transactions on Image Processing,18(8), 1797-1803.
  12. Cheddad Abbas, Condell Joan, Curran Kevin and Mc Kevitt Paul (2010). Digital image steganography: Survey and analysis of current methods, School of Computing and Intelligent System, 909(3), 727-752.
  13. Nissar Arooj (2010). Classification of Steganalysis techniques: A study, Department of Information Technology, Digital Signal Processing, 20(6), 1758-1770.
  14. WangYong (2010). Reliable JPEG steganalysis based on multi-directional correlations, Department of Applied Mathematics, Information Science and Technology Institute, 25(8), 577-587.
  15. Zhou Zhi, Arce Gonzalo R. and Di Crescenzo Giovanni (2006). Halftone Visual Cryptography, IEEE Transaction on Image Processing, 15(8), 2441-2453.
  16. Maninder singh and Dhanwant singh (2015). Energy efficient key management scheme for wireless sensor networks.International Journal of Research in Information Technology, 3 (8), 166-173, 2015.
Index Terms

Computer Science
Information Sciences

Keywords

NVSS encryption image and cryptography.