International Journal of Innovative Technology and Exploring Engineering (IJITEE)
ISSN: 2278-3075, Volume-8, Issue-9S, July 2019
784
Published By:
Blue Eyes Intelligence Engineering
& Sciences Publication
Retrieval Number:
I11270789S19/19©BEIESP DOI:
10.35940/ijitee.I1127.0789S19
Abstract: This paper presents a framework that conceal large
volume of secret information using distributed file system that
permit implantation of decomposed secret images across
multiple-cover images. The strong security is imposed utilizing
Shamir’s threshold scheme and permutation generator
framework. Three layers of security is being applied to protect
the secret information, in first, secret image is decomposed into
equal size of smaller sub-images and generate a framework of
permutations from an integer for distributing and reassembling
the circulated broken secret sub images among the intended
participants. At the time of embedding purpose of permutation
generator is to shuffle the sub-images in unknown order for
outsider. During the discloser stage only inverse of permutation
can rearrange the distributed sub-images to reassemble into
original image by authorized contributors. In second, Shamir’s
threshold scheme is designed for authentication of shared
associated stego-cover images before starting the extraction
process. This process provides an extremely secured
construction of shared secret information. In third, image is
divided in 2x2 blocks of pixels and traverses it in zig-zag
manner; the pixel value difference is computed for all Red,
Green, and Blue (RGB) components between non-overlapping
pixels of selected diagonal path with in targeted block. Secret
bits are concealed inside RGB color pixels of cover image by
utilizing proposed novel pixel-value differencing (PVD) scheme,
furthermore varying embedding capacity may be obtained by
controlling the selection of number of 2x2 block. Exploratory
result displays that the proposed approach provides productive
algorithms in term multilayer unbreakable security and higher
payload of embedded information.
Index Terms: Secret sharing, Distributed steganography,
Pixel value differencing, Cryptography.
I. INTRODUCTION
. Security is a fundamental part wherever in our life to keep
the data ensured with the target that any unapproved could not
take them. Consequently, there is an earnest interest for a safe
communication of confidential information through the
Internet. Thus, various information security strategies have
been conceived to ensure the confidentiality of digital
information like password protection, finger-printing
protection, eye-lock protection, secret key, etc. However,
today in global digital communication, activities like unlawful
accessing, tempering, and breaking the copyright act are
Revised Manuscript Received on June 15, 2019.
Sanjive Tyagi, College of Computing Sciences and Information
Technology, Teerthanker Mahaveer University, India.
Rakesh Kumar Dwivedi, College of Computing Sciences and
Information Technology, Teerthanker Mahaveer University, India.
Ashendra K. Saxena, College of Computing Sciences and Information
Technology, Teerthanker Mahaveer University, India.
increasing tremendously, and in addition information on open
network channel might be purposefully tempered by some
rival who attempts to stop the information from being
effectively sent or received. Therefore, there is a need to
guarantee to protect confidential information by using digital
security methodologies which can be cultivated by covering
up secret digital information inside another digital file or by
changing it into a non-understandable model. As such,
steganography and cryptography developments can be
expected an imperative part in digital data security structure.
Cryptography has its own centrality to protect the secret data
by making non-understandable. In this way, its shortcoming is
encryption data can make the suspicious about its security and
can be tempered by the outsider however favored point of
view of steganography is, it protects the secret data by
implanting it into another digital file covertly, so making the
secret data subtle so there is less probability of vulnerability.
Steganography is an emerging research field keeping the
objective to give best in advancement of information security
structure [1].
Pixel-Value Differencing (PVD) method was introduced
by author in [2] to embed confidential data within gray valued
images. Proposed technique trusts on the possibility that
entire pixels cannot be utilized to embed to similar number of
confidential bits. There are some chosen pixels which can be
used to embed a greater number of pixel bits without affecting
visual quality whereas some pixels can hide only less number
secret bits for the reason if a greater number of bits are
embedded then visual quality affects. In study authors found
the quantity of bits to be implanted depends on the contrasts
between sets of nearby pixels and also recommended that
PVD technique can effectively give larger embedding limit
with remarkable imperceptibility of stego-image. This
approach partitions the cover image into non-overlapping
squares containing two interfacing pixels and changes the
pixel contrast in each square for implanting the secret data.
PVD is planned such a way that pixel alteration does not
disturb visual quality of gray scale images and 24-bits red,
green and blue (RGB) color images as per the attributes of
human vision affectability.
A technique of PVD checks the cover image from the
upper-left corner in crisscross and partitions it into blocks
with two adjacent non-overlapping pixels in each square.
Quantity of bits to be embedded is determined by properties
of smoothness and contrast of cover image. A smoothness and
contrast property of the cover image is classified on the basis
of difference value of
two-pixel blocks. In the edge
region pixel-value difference
is substantially larger
High Capacity Steganography Protected using
Shamir’s threshold scheme and Permutation
Framework
Sanjive Tyagi, Rakesh Kumar Dwivedi, Ashendra Kumar Saxena