Loading

High Capacity Steganography Protected using Shamir’s threshold scheme and Permutation Framework
Sanjive Tyagi1, Rakesh Kumar Dwivedi2, Ashendra Kumar Saxena3

1Sanjive Tyagi, College of Computing Sciences and Information Technology, Teerthanker Mahaveer University, Moradabad (Uttar Pradesh), India.

2Rakesh Kumar Dwivedi, College of Computing Sciences and Information Technology, Teerthanker Mahaveer University, Moradabad (Uttar Pradesh), India.

3Ashendra K. Saxena, College of Computing Sciences and Information Technology, Teerthanker Mahaveer University, Moradabad (Uttar Pradesh), India.

Manuscript received on 05 August 2019 | Revised Manuscript received on 12 August 2019 | Manuscript Published on 26 August 2019 | PP: 784-795 | Volume-8 Issue-9S August 2019 | Retrieval Number: I11270789S19/19©BEIESP | DOI: 10.35940/ijitee.I1127.0789S19

Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open-access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: This paper presents a framework that conceal large volume of secret information using distributed file system that permit implantation of decomposed secret images across multiple-cover images. The strong security is imposed utilizing Shamir’s threshold scheme and permutation generator framework. Three layers of security is being applied to protect the secret information, in first, secret image is decomposed into equal size of smaller sub-images and generate a framework of permutations from an integer for distributing and reassembling the circulated broken secret sub images among the intended participants. At the time of embedding purpose of permutation generator is to shuffle the sub-images in unknown order for outsider. During the discloser stage only inverse of permutation can rearrange the distributed sub-images to reassemble into original image by authorized contributors. In second, Shamir’s threshold scheme is designed for authentication of shared associated stego-cover images before starting the extraction process. This process provides an extremely secured construction of shared secret information. In third, image is divided in 2×2 blocks of pixels and traverses it in zig-zag manner; the pixel value difference is computed for all Red, Green, and Blue (RGB) components between non-overlapping pixels of selected diagonal path with in targeted block. Secret bits are concealed inside RGB color pixels of cover image by utilizing proposed novel pixel-value differencing (PVD) scheme, furthermore varying embedding capacity may be obtained by controlling the selection of number of 2×2 block. Exploratory result displays that the proposed approach provides productive algorithms in term multilayer unbreakable security and higher payload of embedded information.

Keywords: Secret Sharing, Distributed Steganography, Pixel value Differencing, Cryptography.
Scope of the Article: Soft Computing Signal and Speech Processing