Securing Data through Steganography & Secret Sharing Schemes

  • Unique Paper ID: 159896
  • Volume: 9
  • Issue: 12
  • PageNo: 691-695
  • Abstract:
  • Data hiding is a technique of hiding recognizable virtual facts into an unrecognizable form, i.e. imperceptible to the human eye. Secret sharing with steganography is a hot topic of debate. As the method is similar to a secret sharing scheme, it tricks the attacker into falling into our trap. He may think that n restores the images to be output and follow his lead, which ends up going in the wrong direction. But to recover the secret image, the output data from level one must pass through level two. In the second level, we used the concept of steganography. The input to the second step is n recovered envelope images and one stego image. The experimental final result shows that the proposed scheme is clearly secured in both ranges, the change with arbitrary n proportions does not reveal any sub-statistics.

Copyright & License

Copyright © 2025 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

BibTeX

@article{159896,
        author = {K.Chandra Sekhar and A.Manju and Ch.Manuja Varma and B.Niranjan Naidu and D.Kiran Chandu and E.Durga Vara Prasad},
        title = {Securing Data through Steganography & Secret Sharing Schemes},
        journal = {International Journal of Innovative Research in Technology},
        year = {},
        volume = {9},
        number = {12},
        pages = {691-695},
        issn = {2349-6002},
        url = {https://ijirt.org/article?manuscript=159896},
        abstract = {Data hiding is a technique of hiding recognizable virtual facts into an unrecognizable form, i.e. imperceptible to the human eye. Secret sharing with steganography is a hot topic of debate. As the method is similar to a secret sharing scheme, it tricks the attacker into falling into our trap. He may think that n restores the images to be output and follow his lead, which ends up going in the wrong direction. But to recover the secret image, the output data from level one must pass through level two. In the second level, we used the concept of steganography. The input to the second step is n recovered envelope images and one stego image. The experimental final result shows that the proposed scheme is clearly secured in both ranges, the change with arbitrary n proportions does not reveal any sub-statistics.},
        keywords = {Steganography, Stego, Visual Cryptography.},
        month = {},
        }

Cite This Article

  • ISSN: 2349-6002
  • Volume: 9
  • Issue: 12
  • PageNo: 691-695

Securing Data through Steganography & Secret Sharing Schemes

Related Articles