IJSTE

CALL FOR PAPERS : Nov 2017

Submission Last Date
25-Nov--17
Submit Manuscript Online

FOR AUTHORS

FOR REVIEWERS

ARCHIEVES

DOWNLOADS

Open Access



CopyScape
Creative Commons License

A Secured Framework for Sharing Data using Diverse Image Media and Image Encryption


Author(s):

Ashish Singh , SP’S IOK college of engineering Shirur, Savitribai Phule Pune University; Ajay Kumar Gupta, SP’S IOK college of engineering Shirur, Savitribai Phule Pune University

Keywords:

Visual secret sharing scheme, extended visual cryptography scheme, natural images, transmission risk

Abstract:

Secret images in shares that are either encoded and stored in a digital form or printed on transparencies or are hidden in Conventional visual secret sharing (VSS) scheme. Appearance of the shares as noisy-like pixels or as meaningful images; during the transmission of the shares it can cause suspicion and increase interception risk. Hence, transmission risk problem for the secret itself and for the involved participants in this scheme will be suffered in VSS schemes. To solve the transmission risk problem, we proposed a natural-image-based VSS scheme (NVSS scheme) in which secret images is shared via various carrier media so that the secret and the participants can be protected during the transmission. The proposed scheme can share one secret image over n selected natural images (called natural shares) and one noise-like share. Any kind of photos or hand-painted pictures in digital form or in printed form can be the natural shares. Based on these natural shares and the secret image the noise-like share is generated. The transmission risk problem can be reduced as the unchanged natural shares are diverse and innocuous. We also hide the noise like share to reduce the transmission risk problem. We have also used planned randomness in which during steganography the pixels are not stored in the carrier image original position instead the key is added to the original pixel position to obtain the new position which added additional security. Also we used alpha channel watermarking to find whether the images pixels are changed or not if changed then we can’t get the original image.


Other Details:

Manuscript Id :IJSTEV2I12085
Published in :Volume : 2, Issue : 12
Publication Date: 01/07/2016
Page(s): 172-179
Download Article

IMPACT FACTOR

3.905

NEWS & UPDATES

Submit Article

Dear Authors, You can submit your article to our journal at the following link: http://www.ijste.org/Submit

Impact Factor

The Impact Factor of our Journal is 4.753 (Year - 2016)
3.905 (Year - 2015) 2.895(Year -2014)

Click Here

Submit Payment Online

Dear Authors, Now you can submit the payment receipt to our journal online at the following link: index.php?p=Payment

Index Copernicus Value

The IC Value of our journal is 69.90
Click Here

GLOBAL INDEXING



















Computer Science Directory. We are listed under Computer Research Institutes category

Share on Social media

Home | Privacy Policy | Terms & Conditions | Refund Policy | Feedback | Contact Us
Copyright © 2014 ijste.org All rights reserved