International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-8, Issue-9S, July 2019 784 Published By: Blue Eyes Intelligence Engineering & Sciences Publication Retrieval Number: I11270789S19/19©BEIESP DOI: 10.35940/ijitee.I1127.0789S19 Abstract: This paper presents a framework that conceal large volume of secret information using distributed file system that permit implantation of decomposed secret images across multiple-cover images. The strong security is imposed utilizing Shamir’s threshold scheme and permutation generator framework. Three layers of security is being applied to protect the secret information, in first, secret image is decomposed into equal size of smaller sub-images and generate a framework of permutations from an integer for distributing and reassembling the circulated broken secret sub images among the intended participants. At the time of embedding purpose of permutation generator is to shuffle the sub-images in unknown order for outsider. During the discloser stage only inverse of permutation can rearrange the distributed sub-images to reassemble into original image by authorized contributors. In second, Shamir’s threshold scheme is designed for authentication of shared associated stego-cover images before starting the extraction process. This process provides an extremely secured construction of shared secret information. In third, image is divided in 2x2 blocks of pixels and traverses it in zig-zag manner; the pixel value difference is computed for all Red, Green, and Blue (RGB) components between non-overlapping pixels of selected diagonal path with in targeted block. Secret bits are concealed inside RGB color pixels of cover image by utilizing proposed novel pixel-value differencing (PVD) scheme, furthermore varying embedding capacity may be obtained by controlling the selection of number of 2x2 block. Exploratory result displays that the proposed approach provides productive algorithms in term multilayer unbreakable security and higher payload of embedded information. Index Terms: Secret sharing, Distributed steganography, Pixel value differencing, Cryptography. I. INTRODUCTION . Security is a fundamental part wherever in our life to keep the data ensured with the target that any unapproved could not take them. Consequently, there is an earnest interest for a safe communication of confidential information through the Internet. Thus, various information security strategies have been conceived to ensure the confidentiality of digital information like password protection, finger-printing protection, eye-lock protection, secret key, etc. However, today in global digital communication, activities like unlawful accessing, tempering, and breaking the copyright act are Revised Manuscript Received on June 15, 2019. Sanjive Tyagi, College of Computing Sciences and Information Technology, Teerthanker Mahaveer University, India. Rakesh Kumar Dwivedi, College of Computing Sciences and Information Technology, Teerthanker Mahaveer University, India. Ashendra K. Saxena, College of Computing Sciences and Information Technology, Teerthanker Mahaveer University, India. increasing tremendously, and in addition information on open network channel might be purposefully tempered by some rival who attempts to stop the information from being effectively sent or received. Therefore, there is a need to guarantee to protect confidential information by using digital security methodologies which can be cultivated by covering up secret digital information inside another digital file or by changing it into a non-understandable model. As such, steganography and cryptography developments can be expected an imperative part in digital data security structure. Cryptography has its own centrality to protect the secret data by making non-understandable. In this way, its shortcoming is encryption data can make the suspicious about its security and can be tempered by the outsider however favored point of view of steganography is, it protects the secret data by implanting it into another digital file covertly, so making the secret data subtle so there is less probability of vulnerability. Steganography is an emerging research field keeping the objective to give best in advancement of information security structure [1]. Pixel-Value Differencing (PVD) method was introduced by author in [2] to embed confidential data within gray valued images. Proposed technique trusts on the possibility that entire pixels cannot be utilized to embed to similar number of confidential bits. There are some chosen pixels which can be used to embed a greater number of pixel bits without affecting visual quality whereas some pixels can hide only less number secret bits for the reason if a greater number of bits are embedded then visual quality affects. In study authors found the quantity of bits to be implanted depends on the contrasts between sets of nearby pixels and also recommended that PVD technique can effectively give larger embedding limit with remarkable imperceptibility of stego-image. This approach partitions the cover image into non-overlapping squares containing two interfacing pixels and changes the pixel contrast in each square for implanting the secret data. PVD is planned such a way that pixel alteration does not disturb visual quality of gray scale images and 24-bits red, green and blue (RGB) color images as per the attributes of human vision affectability. A technique of PVD checks the cover image from the upper-left corner in crisscross and partitions it into blocks with two adjacent non-overlapping pixels in each square. Quantity of bits to be embedded is determined by properties of smoothness and contrast of cover image. A smoothness and contrast property of the cover image is classified on the basis of difference value of two-pixel blocks. In the edge region pixel-value difference is substantially larger High Capacity Steganography Protected using Shamir’s threshold scheme and Permutation Framework Sanjive Tyagi, Rakesh Kumar Dwivedi, Ashendra Kumar Saxena