CFP last date
20 June 2024
Reseach Article

Design and Analysis of Prototype Hardware for Secret Sharing Using 2-D Image Processing

by Vivek Ganesan, Dr. R.John Bosco Balaguru, R.Amirtharajan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 4 - Number 4
Year of Publication: 2010
Authors: Vivek Ganesan, Dr. R.John Bosco Balaguru, R.Amirtharajan
10.5120/817-1158

Vivek Ganesan, Dr. R.John Bosco Balaguru, R.Amirtharajan . Design and Analysis of Prototype Hardware for Secret Sharing Using 2-D Image Processing. International Journal of Computer Applications. 4, 4 ( July 2010), 17-22. DOI=10.5120/817-1158

@article{ 10.5120/817-1158,
author = { Vivek Ganesan, Dr. R.John Bosco Balaguru, R.Amirtharajan },
title = { Design and Analysis of Prototype Hardware for Secret Sharing Using 2-D Image Processing },
journal = { International Journal of Computer Applications },
issue_date = { July 2010 },
volume = { 4 },
number = { 4 },
month = { July },
year = { 2010 },
issn = { 0975-8887 },
pages = { 17-22 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume4/number4/817-1158/ },
doi = { 10.5120/817-1158 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:52:11.349502+05:30
%A Vivek Ganesan
%A Dr. R.John Bosco Balaguru
%A R.Amirtharajan
%T Design and Analysis of Prototype Hardware for Secret Sharing Using 2-D Image Processing
%J International Journal of Computer Applications
%@ 0975-8887
%V 4
%N 4
%P 17-22
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Information security has been a major concern with the striking advancement in communication and information techniques. Details of significance such as corporate data, secret message and private details have to be shielded from any unauthorized handling or spiteful approaches. Protection of such valuable information over insecure networks can be accomplished by monitoring or filtering of all packets in the data hiding technology. Images can be used for covert sharing of data. Any type of data can be practically hidden inside any image, without detectably affecting the quality of the image. This can be done by substituting some information of the image with the secret information in carefully chosen ways. The image can then be sent by electronic mail, where it appears as a casual attachment. The receiver can get the secret data by applying reverse transform. Hardware modeling of this process can impart portability and improve the speed of the same. This paper discusses the design and analysis of prototype hardware to perform secret sharing using 2-D Image Processing.

References
Index Terms

Computer Science
Information Sciences

Keywords

LSB Steganography Information hiding