Securing Data through Steganography & Secret Sharing Schemes
Author(s):
K.Chandra Sekhar, A.Manju, Ch.Manuja Varma, B.Niranjan Naidu, D.Kiran Chandu, E.Durga Vara Prasad
Keywords:
Steganography, Stego, Visual Cryptography.
Abstract
Data hiding is a technique of hiding recognizable virtual facts into an unrecognizable form, i.e. imperceptible to the human eye. Secret sharing with steganography is a hot topic of debate. As the method is similar to a secret sharing scheme, it tricks the attacker into falling into our trap. He may think that n restores the images to be output and follow his lead, which ends up going in the wrong direction. But to recover the secret image, the output data from level one must pass through level two. In the second level, we used the concept of steganography. The input to the second step is n recovered envelope images and one stego image. The experimental final result shows that the proposed scheme is clearly secured in both ranges, the change with arbitrary n proportions does not reveal any sub-statistics.
Article Details
Unique Paper ID: 159896

Publication Volume & Issue: Volume 9, Issue 12

Page(s): 691 - 695
Article Preview & Download


Share This Article

Join our RMS

Conference Alert

NCSEM 2024

National Conference on Sustainable Engineering and Management - 2024

Last Date: 15th March 2024

Call For Paper

Volume 11 Issue 1

Last Date for paper submitting for Latest Issue is 25 June 2024

About Us

IJIRT.org enables door in research by providing high quality research articles in open access market.

Send us any query related to your research on editor@ijirt.org

Social Media

Google Verified Reviews