Abstract
This paper presents a framework that conceal large volume of secret information using distributed file system that permit implantation of decomposed secret images across multiple-cover images. The strong security is imposed utilizing Shamir’s threshold scheme and permutation generator framework. Three layers of security is being applied to protect the secret information, in first, secret image is decomposed into equal size of smaller sub-images and generate a framework of permutations from an integer for distributing and reassembling the circulated broken secret sub images among the intended participants. At the time of embedding purpose of permutation generator is to arrange the sub-images in unknown order for outsider. During the discloser stage only inverse of permutation can rearrange the distributed sub-images to reassemble into original image by authorized contributors. In second, Shamir’s threshold scheme is designed for authentication of shared associated stego-cover images before starting the extraction process. This process provides an extremely secured construction of shared secret information. In third, image is divided in 2x2 blocks of pixels and traverses it in zig-zag manner; the pixel value difference is computed for all Red, Green, and Blue (RGB) components between non-overlapping pixels of selected diagonal path with in targeted block. Secret bits are concealed inside RGB color pixels of cover image by utilizing proposed novel pixel-value differencing (PVD) scheme, furthermore varying embedding capacity may be obtained by controlling the selection of number of 2x2 block. Exploratory result displays that the proposed approach provides productive algorithms in term multilayer unbreakable security and higher payload of embedded information.
Publisher
Blue Eyes Intelligence Engineering and Sciences Engineering and Sciences Publication - BEIESP
Subject
Electrical and Electronic Engineering,Mechanics of Materials,Civil and Structural Engineering,General Computer Science
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A High-Payload Image Steganography Based on Shamir’s Secret Sharing Scheme;Lecture Notes in Networks and Systems;2024
2. DWT-SVD Based Image Steganography Using Threshold Value Encryption Method;Computers, Materials & Continua;2022
3. An Approach to Balance the Load in Cloud Environment;2021 10th International Conference on System Modeling & Advancement in Research Trends (SMART);2021-12-10
4. Cyber-Bullying Detection in Social Media Platform using Machine Learning;2021 10th International Conference on System Modeling & Advancement in Research Trends (SMART);2021-12-10