SlideShare a Scribd company logo
Secret Image Sharing
Guided By:-
Prof. Dr.Sonali Patil.
----Problem Statement----
To Study image secret sharing using
Shamir’s secret sharing algorithm and
Steganography .
OBJECTIVES
 Providing more security for image
communication.
 To achieve transparency, authority
(resistance to various image tampering
and forgery methods), and high capacity
of the hidden data.
 Schemes are important tools in
cryptography and they are used as a
building box in many secure
protocols,threshold cryptography, access
control, attribute-based Encryption.
 Secret image sharing has become a key
technology for digital images in secured
storage and confidential transmission.
MOTIVATION
MOTIVATION
Image data is not secure over network
and
social networking sites.
Drawbacks in various secret sharing
algorithms.
Total image security and confidentiality
over transmission.
Hindrance to Image tampering.
Expected Outcome
LITERATURE SURVEY
Shamir’s Algorithm:-
Shamir developed a sharing method (a (t;
n)threshold scheme, t/n) for sharing a
secret image among n participants, such
that any t participants could cooperate to
reconstruct the secret image, while t−1 or
fewer participants could not.
LITERATURE SURVEY
Why Steganography???
1)Share images look like random noise
and thus draw attention of the malicious
users.
2)Confidentiality of the shares is realized
by Steganography.
LITERATURE SURVEY
What is Steganography:-
Steganography is the method used to hide
shares into natural looking cover images.
The dealer should select n natural looking
cover images of size 2W×2H to hide a
W×H secret image for a (k, n) secret
sharing scheme.
Steganographic Image
LITERATURE SURVEY
LSB Method:-
1)LSB method stands for “Least Significant
Bit Method”.
2) This method is used for embedding the
shares into the host images.
3)Share images are processed pixel by
pixel during embedding.
LITERATURE SURVEY
LSB Method continues…..
3)Share image pixel values are embedded
into corresponding 2×2 pixel groups called
cover blocks in cover image.
4)Therefore, two LSBs of each pixel in th
corresponding cover block is used to hide
the shared pixel with eight bits.
APPLICATIONS
1)Medical applications such telediagnosis
and to store electronic patient record
(EPR) in the medical image by
steganography.
2)Miltary applications such as, The
photographers who work in enemy areas
can use this system to transmit
photographs.
SECRET IMAGE SHAREING
A medical image to share
SHARES ARE GENERATED USING
ALGORITHM:-
STEGO IMAGES FOR THE SHARES:-
FUTURE SCOPE
Secret image sharing with Steganography
is that current space of analysis wherever
heap of scope exists.
The combination of both provides higher
levels of security to the information being
transmitted.
FUTURE SCOPE
The special attention is given to improve
the quality of the reconstructed image.
Cryptography techniques like RSA, AES
and hash functions can also be used with
steganography to provide more security.
REFERENCES
1)Sharing and hiding secret images with
size constraint Yu-Shan Wu, Chih-Ching
Thien, Ja-Chen Lin∗
2)Shamir A. How to share a secret.
Communication of the ACM
1979;22(11):612–3.
3)Medical image security and EPR hiding
using Shamir’s secret sharing scheme
Mustafa Ulutas, Güzin Ulutas , Vasif V.∗
Nabiyev
PRESENTED BY:-
SHRUTI T KULKARNI

More Related Content

PPTX
3 public key cryptography
PPTX
Asymmetric Cryptography.pptx
PDF
Public key Infrastructure (PKI)
PPTX
Dcn ppt on data link layer
PDF
Distance Vector Multicast Routing Protocol (DVMRP) : Combined Presentation
PPT
Network Protocol and TCP/IP
PPTX
ASYNCHRONOUS TRANSFER MODE (ATM)
PDF
8. mutual exclusion in Distributed Operating Systems
3 public key cryptography
Asymmetric Cryptography.pptx
Public key Infrastructure (PKI)
Dcn ppt on data link layer
Distance Vector Multicast Routing Protocol (DVMRP) : Combined Presentation
Network Protocol and TCP/IP
ASYNCHRONOUS TRANSFER MODE (ATM)
8. mutual exclusion in Distributed Operating Systems

What's hot (20)

PPT
Introduction to SSH
PPTX
SSL And TLS
PDF
Types of Cryptosystem and Cryptographic Attack
PDF
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
PPTX
Public key algorithm
PPSX
Multiple access control protocol
PDF
Federated Learning
PPTX
Demilitarized Zone (DMZ) in computer networking
PPTX
Dns server
PPT
Presentation of the IEEE 802.11a MAC Layer
PPTX
IAB-5039 : MQTT: A Protocol for the Internet of Things (InterConnect 2015)
PPTX
Routing algorithm
PPTX
Open shortest path first (ospf)
PPTX
DHCP & DNS
PPT
819 Static Channel Allocation
PPT
CCNA presentation.
PDF
2. Stream Ciphers
PPTX
Analog and Digital Transmission
PPTX
Unit 3 - Data Link Layer - Part A
PPT
Introduction to SSH
SSL And TLS
Types of Cryptosystem and Cryptographic Attack
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
Public key algorithm
Multiple access control protocol
Federated Learning
Demilitarized Zone (DMZ) in computer networking
Dns server
Presentation of the IEEE 802.11a MAC Layer
IAB-5039 : MQTT: A Protocol for the Internet of Things (InterConnect 2015)
Routing algorithm
Open shortest path first (ospf)
DHCP & DNS
819 Static Channel Allocation
CCNA presentation.
2. Stream Ciphers
Analog and Digital Transmission
Unit 3 - Data Link Layer - Part A
Ad

Viewers also liked (20)

PPTX
Image secret sharing using Shamir's Algorithm
PPT
Secret sharing schemes
PPTX
secret sharing schemes
PPTX
Visual Cryptography
PDF
Steganography using visual cryptography
PPTX
The Heartbleed Attack
PDF
Secret Sharing Cs416
PPTX
Shamir Secret Sharing Presentation
PPS
Visual Cryptography in Meaningful Shares
PDF
steganography using visual cryptography_report
PPTX
Visual Cryptography
PPTX
Steganography
PPT
Visual cryptography1
PPTX
Visual CryptoGraphy
PPTX
Image Steganography using LSB
PPTX
Steganography Project
PPTX
INFORMATION SECURITY SYSTEM
PPTX
Cybersecurity 2 cyber attacks
PPT
Visual Cryptography
PPTX
Ion exchange chromatography
Image secret sharing using Shamir's Algorithm
Secret sharing schemes
secret sharing schemes
Visual Cryptography
Steganography using visual cryptography
The Heartbleed Attack
Secret Sharing Cs416
Shamir Secret Sharing Presentation
Visual Cryptography in Meaningful Shares
steganography using visual cryptography_report
Visual Cryptography
Steganography
Visual cryptography1
Visual CryptoGraphy
Image Steganography using LSB
Steganography Project
INFORMATION SECURITY SYSTEM
Cybersecurity 2 cyber attacks
Visual Cryptography
Ion exchange chromatography
Ad

Similar to Image secret sharing using Shamir's scheme with Steganography (20)

PDF
Reversible Multiple Image Secret Sharing using Discrete Haar Wavelet Transform
PDF
V01 i010411
PDF
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...
PDF
Reversible Data Hiding in Encrypted Image: A Review
PDF
A novel steganographic scheme based on
PDF
Analysing secure image secret sharing schemes based on steganography
PDF
Image Steganography. Image Steganography. Image Steganography
PDF
F42022628
PDF
A Comparative Study And Literature Review Of Image Steganography Techniques
PDF
A Survey Paper On Different Steganography Technique
PDF
Welcome to International Journal of Engineering Research and Development (IJERD)
PDF
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
PDF
Survey on Different Image Encryption Techniques with Tabular Form
PDF
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
PPTX
novel Approach For Data Hiding by integrating Steganography and Extended Visu...
PDF
Genetic Algorithm based Mosaic Image Steganography for Enhanced Security
PPTX
Biometric Hashing technique for Authentication
PDF
IRJET- Machine Learning Application for Data Security
PDF
High Capacity and Security Steganography Using Discrete Wavelet Transform
PDF
Fx3610771081
Reversible Multiple Image Secret Sharing using Discrete Haar Wavelet Transform
V01 i010411
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...
Reversible Data Hiding in Encrypted Image: A Review
A novel steganographic scheme based on
Analysing secure image secret sharing schemes based on steganography
Image Steganography. Image Steganography. Image Steganography
F42022628
A Comparative Study And Literature Review Of Image Steganography Techniques
A Survey Paper On Different Steganography Technique
Welcome to International Journal of Engineering Research and Development (IJERD)
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
Survey on Different Image Encryption Techniques with Tabular Form
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
novel Approach For Data Hiding by integrating Steganography and Extended Visu...
Genetic Algorithm based Mosaic Image Steganography for Enhanced Security
Biometric Hashing technique for Authentication
IRJET- Machine Learning Application for Data Security
High Capacity and Security Steganography Using Discrete Wavelet Transform
Fx3610771081

Recently uploaded (20)

PDF
PPT on Performance Review to get promotions
PPTX
Fundamentals of safety and accident prevention -final (1).pptx
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PDF
III.4.1.2_The_Space_Environment.p pdffdf
PPTX
Construction Project Organization Group 2.pptx
PPTX
OOP with Java - Java Introduction (Basics)
PPTX
UNIT 4 Total Quality Management .pptx
PPTX
CH1 Production IntroductoryConcepts.pptx
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PDF
737-MAX_SRG.pdf student reference guides
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PPTX
Artificial Intelligence
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PPTX
web development for engineering and engineering
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PPT on Performance Review to get promotions
Fundamentals of safety and accident prevention -final (1).pptx
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
III.4.1.2_The_Space_Environment.p pdffdf
Construction Project Organization Group 2.pptx
OOP with Java - Java Introduction (Basics)
UNIT 4 Total Quality Management .pptx
CH1 Production IntroductoryConcepts.pptx
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
Model Code of Practice - Construction Work - 21102022 .pdf
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
Embodied AI: Ushering in the Next Era of Intelligent Systems
Foundation to blockchain - A guide to Blockchain Tech
737-MAX_SRG.pdf student reference guides
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
Artificial Intelligence
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
R24 SURVEYING LAB MANUAL for civil enggi
web development for engineering and engineering
Mitigating Risks through Effective Management for Enhancing Organizational Pe...

Image secret sharing using Shamir's scheme with Steganography

  • 1. Secret Image Sharing Guided By:- Prof. Dr.Sonali Patil.
  • 2. ----Problem Statement---- To Study image secret sharing using Shamir’s secret sharing algorithm and Steganography .
  • 3. OBJECTIVES  Providing more security for image communication.  To achieve transparency, authority (resistance to various image tampering and forgery methods), and high capacity of the hidden data.
  • 4.  Schemes are important tools in cryptography and they are used as a building box in many secure protocols,threshold cryptography, access control, attribute-based Encryption.  Secret image sharing has become a key technology for digital images in secured storage and confidential transmission. MOTIVATION
  • 5. MOTIVATION Image data is not secure over network and social networking sites. Drawbacks in various secret sharing algorithms.
  • 6. Total image security and confidentiality over transmission. Hindrance to Image tampering. Expected Outcome
  • 7. LITERATURE SURVEY Shamir’s Algorithm:- Shamir developed a sharing method (a (t; n)threshold scheme, t/n) for sharing a secret image among n participants, such that any t participants could cooperate to reconstruct the secret image, while t−1 or fewer participants could not.
  • 8. LITERATURE SURVEY Why Steganography??? 1)Share images look like random noise and thus draw attention of the malicious users. 2)Confidentiality of the shares is realized by Steganography.
  • 9. LITERATURE SURVEY What is Steganography:- Steganography is the method used to hide shares into natural looking cover images. The dealer should select n natural looking cover images of size 2W×2H to hide a W×H secret image for a (k, n) secret sharing scheme.
  • 11. LITERATURE SURVEY LSB Method:- 1)LSB method stands for “Least Significant Bit Method”. 2) This method is used for embedding the shares into the host images. 3)Share images are processed pixel by pixel during embedding.
  • 12. LITERATURE SURVEY LSB Method continues….. 3)Share image pixel values are embedded into corresponding 2×2 pixel groups called cover blocks in cover image. 4)Therefore, two LSBs of each pixel in th corresponding cover block is used to hide the shared pixel with eight bits.
  • 13. APPLICATIONS 1)Medical applications such telediagnosis and to store electronic patient record (EPR) in the medical image by steganography. 2)Miltary applications such as, The photographers who work in enemy areas can use this system to transmit photographs.
  • 14. SECRET IMAGE SHAREING A medical image to share
  • 15. SHARES ARE GENERATED USING ALGORITHM:-
  • 16. STEGO IMAGES FOR THE SHARES:-
  • 17. FUTURE SCOPE Secret image sharing with Steganography is that current space of analysis wherever heap of scope exists. The combination of both provides higher levels of security to the information being transmitted.
  • 18. FUTURE SCOPE The special attention is given to improve the quality of the reconstructed image. Cryptography techniques like RSA, AES and hash functions can also be used with steganography to provide more security.
  • 19. REFERENCES 1)Sharing and hiding secret images with size constraint Yu-Shan Wu, Chih-Ching Thien, Ja-Chen Lin∗ 2)Shamir A. How to share a secret. Communication of the ACM 1979;22(11):612–3. 3)Medical image security and EPR hiding using Shamir’s secret sharing scheme Mustafa Ulutas, Güzin Ulutas , Vasif V.∗ Nabiyev