International Conference in Recent trends in Computational Methods, Communication and Controls |
Foundation of Computer Science USA |
ICON3C - Number 2 |
April 2012 |
Authors: M. Thaneshwari, N. Arumugam |
ad05ceee-cfb4-4cff-bafc-9a3a34bf7537 |
M. Thaneshwari, N. Arumugam . Implementation of Steganography Secret Sharing approach (N,1) for Color Digital Images. International Conference in Recent trends in Computational Methods, Communication and Controls. ICON3C, 2 (April 2012), 7-11.
Steganography has been considered as the solution for illicit interception and unauthorized copying of digital media. Steganography hides secret data in a host medium and conveys the hidden data. The intended recipient can then extract the secret data from the stego image. The hidden data should make a visually imperceptible change to the stego image when viewed by an unintended recipient. A remedy to achieve the imperceptibility of the stego image has been proposed, and is a concept called secret sharing. In a secret sharing approach, the sending party sends N stego images to one or multiple recipients and allows a receiving party to extract the secret data only when all N stego images are available. The (N,1) is a steganography secret sharing approach that utilises N+1 cover images. Both the sending party as well as the receiving party shares the N cover images through a secure channel. The remaining one cover image is converted to gray coded stego image at the sending party and is to be sent through an unsecure channel. The conversion is performed based on operations through the N+ 1 cover image pixels and secret data.