International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 127 - Number 18 |
Year of Publication: 2015 |
Authors: Subharag Sarkar, Akash Dasgupta, Aloke Bhakta |
10.5120/ijca2015906729 |
Subharag Sarkar, Akash Dasgupta, Aloke Bhakta . Covert Image Transfer: A Secret Sharing Technique. International Journal of Computer Applications. 127, 18 ( October 2015), 10-13. DOI=10.5120/ijca2015906729
In cryptography, the art of secret sharing, is to share among a group of selected few an individual share of the secret. Individual shares are of no use on their own. The multifaceted implementation of this scheme in literature including Shamir, Blakley and Asmuth-Bloom to name a few, has led to the emergence of higher computational complexity during both sharing and reconstruction and generates noise like shares. In order to come up with a meaningful sharing scheme, Lin and Tsai proposed a method that uses Steganography using Shamir’s secret sharing scheme; again which led to high computational complexity. Therefore, in order to overcome the above problem, a new scheme is suggested which deploys simple graphical masking, done by simply ANDing, value substitution for share generation and reconstruction can be done by value re-substitution and then ORing the qualified set of shares. Also, this proposed method finally creates, meaningful shares by using Steganography; instead of noise like shares.