Call for Paper - January 2024 Edition
IJCA solicits original research papers for the January 2024 Edition. Last date of manuscript submission is December 20, 2023. Read More

Design and Analysis of Prototype Hardware for Secret Sharing Using 2-D Image Processing

Print
PDF
International Journal of Computer Applications
© 2010 by IJCA Journal
Number 4 - Article 4
Year of Publication: 2010
Authors:
R.Amirtharajan
Dr. R.John Bosco Balaguru
Vivek Ganesan
10.5120/817-1158

Vivek Ganesan, Dr. R.John Bosco Balaguru and R.Amirtharajan. Article: Design and Analysis of Prototype Hardware for Secret Sharing Using 2-D Image Processing. International Journal of Computer Applications 4(4):17–22, July 2010. Published By Foundation of Computer Science. BibTeX

@article{key:article,
	author = {Vivek Ganesan and Dr. R.John Bosco Balaguru and R.Amirtharajan},
	title = {Article: Design and Analysis of Prototype Hardware for Secret Sharing Using 2-D Image Processing},
	journal = {International Journal of Computer Applications},
	year = {2010},
	volume = {4},
	number = {4},
	pages = {17--22},
	month = {July},
	note = {Published By Foundation of Computer Science}
}

Abstract

Information security has been a major concern with the striking advancement in communication and information techniques. Details of significance such as corporate data, secret message and private details have to be shielded from any unauthorized handling or spiteful approaches. Protection of such valuable information over insecure networks can be accomplished by monitoring or filtering of all packets in the data hiding technology. Images can be used for covert sharing of data. Any type of data can be practically hidden inside any image, without detectably affecting the quality of the image. This can be done by substituting some information of the image with the secret information in carefully chosen ways. The image can then be sent by electronic mail, where it appears as a casual attachment. The receiver can get the secret data by applying reverse transform. Hardware modeling of this process can impart portability and improve the speed of the same. This paper discusses the design and analysis of prototype hardware to perform secret sharing using 2-D Image Processing.

Reference

  • Abbas Cheddad, Joan Condell, Kevin Curran, Paul Mc Kevitt (2010), Digital image steganography: Survey and analysis of current methods Signal Processing 90 pp727–752
  • R.Amirtharajan , R. Akila, P.Deepikachowdavarapuohn (2010), A Comparative Analysis of Image Steganography International Journal of Computer Applications. 2(3).pp 41-47
  • W. Bender, D. Gruhl, N. Morimoto, A. Lu (1996), Techniques for data hiding, IBM Syst. J. 35 (3&4) pp 313–336.
  • Bruice Schneier, Applied Cryptography Protocols, Algorithm and Source Code in C. Second edition. Wiley India edition 2007
  • Chi-Kwong Chan, L.M. Cheng.(2004), “Hiding data in images by simple LSB substitution “, Pattern Recognition 37pp 469 – 474.
  • J. Fridrich, M. Goljan, D. Hogea (2003), New methodology for breaking steganographic techniques for JPEGs, in: Proceedings of SPIE: Security and Watermarking of Multimedia Contents, vol. 5020, pp. 143–155.
  • S. Katzenbeisser, F.A.P. Petitcolas, Information Hiding Techniques for Steganography and Digital Watermarking, Artech House, Norwood, MA, 2000.
  • F.A.P. Petitcolas, R.J. Anderson, M.G. Kuhn(1999), Information hiding—a survey, Proc. IEEE 87 (7) pp 1062–107