Securing Data through Steganography & Secret Sharing Schemes
Author(s):
K.Chandra Sekhar, A.Manju, Ch.Manuja Varma, B.Niranjan Naidu, D.Kiran Chandu, E.Durga Vara Prasad
Keywords:
Steganography, Stego, Visual Cryptography.
Abstract
Data hiding is a technique of hiding recognizable virtual facts into an unrecognizable form, i.e. imperceptible to the human eye. Secret sharing with steganography is a hot topic of debate. As the method is similar to a secret sharing scheme, it tricks the attacker into falling into our trap. He may think that n restores the images to be output and follow his lead, which ends up going in the wrong direction. But to recover the secret image, the output data from level one must pass through level two. In the second level, we used the concept of steganography. The input to the second step is n recovered envelope images and one stego image. The experimental final result shows that the proposed scheme is clearly secured in both ranges, the change with arbitrary n proportions does not reveal any sub-statistics.
Article Details
Unique Paper ID: 159896

Publication Volume & Issue: Volume 9, Issue 12

Page(s): 691 - 695
Article Preview & Download


Share This Article

Conference Alert

NCSST-2023

AICTE Sponsored National Conference on Smart Systems and Technologies

Last Date: 25th November 2023

SWEC- Management

LATEST INNOVATION’S AND FUTURE TRENDS IN MANAGEMENT

Last Date: 7th November 2023

Go To Issue



Call For Paper

Volume 10 Issue 1

Last Date for paper submitting for March Issue is 25 June 2023

About Us

IJIRT.org enables door in research by providing high quality research articles in open access market.

Send us any query related to your research on editor@ijirt.org

Social Media

Google Verified Reviews