CFP last date
20 June 2024
Reseach Article

A Secret Shearing Algorithm based on LSB Substitution

by Bhaskar Mondal, Tarni Mandal
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 92 - Number 4
Year of Publication: 2014
Authors: Bhaskar Mondal, Tarni Mandal
10.5120/15999-4971

Bhaskar Mondal, Tarni Mandal . A Secret Shearing Algorithm based on LSB Substitution. International Journal of Computer Applications. 92, 4 ( April 2014), 31-35. DOI=10.5120/15999-4971

@article{ 10.5120/15999-4971,
author = { Bhaskar Mondal, Tarni Mandal },
title = { A Secret Shearing Algorithm based on LSB Substitution },
journal = { International Journal of Computer Applications },
issue_date = { April 2014 },
volume = { 92 },
number = { 4 },
month = { April },
year = { 2014 },
issn = { 0975-8887 },
pages = { 31-35 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume92/number4/15999-4971/ },
doi = { 10.5120/15999-4971 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:13:25.324456+05:30
%A Bhaskar Mondal
%A Tarni Mandal
%T A Secret Shearing Algorithm based on LSB Substitution
%J International Journal of Computer Applications
%@ 0975-8887
%V 92
%N 4
%P 31-35
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper proposed a highly secure secret shearing scheme for multimedia image communication. The proposed scheme may used for generation of n number shares of a secret image. Both the construction and revealing of shares are based on LSB subtraction. In previously proposed schemes were surfers from several problems. Like in case of images having completely single color other than the color black, the shares were having strip patterns rather than being random or pixel expansion. The proposed scheme is applicable for any size of image, has no pixel expansion and can reconstruct the secret image precisely. The proposed scheme includes no matrix multiplication for construction of shares with computational complexity equal to LSB method. The scheme can be directly applied for any of the binary, grayscale or color image. Experimental results show that the scheme is simple and effective.

References
  1. G. R. Blakley, "Safeguarding cryptographic keys," Proc. AFIPS NCC, vol. 48, 1979, pp. 313-317.
  2. A. Shamir, "How to share a secret," Commun. ACM, vol. 22 (11), 1979, pp. 612-613.
  3. C. C. Thien, J. C. Lin, "Secret image sharing, " Computers and Graphics, vol. 26(5) , 2002, pp. 765-770.
  4. M. Naor, A. Shamir, "Visual cryptography," Advances in Cryptology-EUROCRYPTO'94, Springer-Verlag, vol. 950, 1995, pp. 1-12.
  5. M. Iwamoto, H. Yamamoto, "The optimal n-out of-n visual secret sharing scheme for gray-scale images," IEICE Trans. Fundam. E85-A(10) , 2002, pp. 2238–2247.
  6. F. Yi, D. S. Wang, P. Luo, Y. q. Dai, "Two new color (n, n)-secret sharing schemes," Journal on Communications (Chinese), vol. 28(5), 2007,pp. 30-35.
  7. D. S. Wang, L. Zhang, N. Ma, X. B. Li, "Two secret sharing schemes based on Boolean operations," Pattern Recognition, vol. 40, 2007, pp. 2776-2785.
  8. Lin Dong, Min Ku, "Novel (n,n) secret image sharing scheme based on addition," Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (2010), iih-msp, pp. 583-586.
  9. Bhaskar Mondal et. al. "An Optimal (n, n) secret image sharing schem" issue of International Journal of Computer Science and its Applications – Volume 2(3), Page(s): 61 – 66
  10. Bhaskar Mondal, S. K. Singh "A Highly Secure Steganography Scheme For Secure Communication", Proc International Conference of Computation and Communication Advancement (IC3A)-2013, JIS College of Engineering, January, 2013.
  11. C. K. Chan, L. M. Cheng, "Hiding data in images by simple LSB substitution", Pattern Recognition 37 (3) (2004) 469-474.
  12. J. Hu and F. Han, "A pixel based scrambling scheme for digital medical images protection", Journal of Network and Computer Applications. Vol. 32, pp 788-794, 2009.
  13. A. Mitra, Y. V. Subba Rao and S. R. M. Prasanna, "A new image encryption approach using combinational permutation techniques", International Journal of Computer Science, Vol. 1, No. 2, pp 127-131, 2006.
  14. N. K. Pareek, Vinod Patidar, and K. K. Sud, "Image Encryption using chaotic logistic map", Image and Vision Computing, Vol 24, pp 926-934, 2006.
  15. X. Yi, C. H. Tan, C. K. Siew and M. R. Syed, "Fast Encryption for Multimedia", IEEE Transactions on onsumer Electronics, Vol. 47, No. 1, 2001.
  16. B Mondal, T Mandal, "A Multilevel Security Scheme Using Chaos Based Encryption and Steganography for Secure Audio Communication", International Journal of Research in Engineering and Technology (IJRET), Volume: 2, Issue: 10; pg. 399-403, Oct 2013.
  17. B Mondal, T Mandal, S Kumar, KM Acharjee "A Novel (k, n) Secret key sharing scheme based on Linear Equations" International Journal of Engineering Research & Technology Vol. 2 Issue. 10, pg. 1679-1682, Oct' 2013
Index Terms

Computer Science
Information Sciences

Keywords

Secret sharing steganography LSB logistic map