International Journal of Recent Trends in Engineering & Research

online ISSN


Publication Date : 15/05/2020

DOI : 10.23883/IJRTER.CONF.20200315.028.QDMZ0

Author(s) :

Mrs.P.Usha Rani , P.Angalaparameswari.

Conference Name :
2nd International Conference on New Scientific Creations in Engineering and Technology - 2020

Abstract :

Information/data hiding is a mechanism which ensures that the presence of the secret data remains undetected. Two types of data hiding techniques are most popular, they are cryptography and steganography. Where cryptography is science of writing secret code and steganography is art and science of hiding the secret code. In cryptography data is converted to unreadable form, so that unauthorized users cannot access the secret data. Steganography process hides message into cover file and forms a stego file. In image steganography there is a need of method which will increase the security, reduce the distortion in the stego file and recovers the data without any loss. In the era of multimedia and internet there is need of reducing time for transmission. The main objective of this project is to establish a secured communication between the sender and the receiver by using emails and other communicating modes. The secret text was hidden within the QR image. Then QR image can be hidden within secret image. The secret image can be obtained by super imposing the two shares. Conventional k out of n visual cryptography scheme is used to encrypt a single image into n shares. In this work, an XOR based multi secret sharing is proposed to send images from the source to the destination in a secured way. A text is written and hidden inside an image. LSB method is used for this purpose. Now the image is splitted into shares. Each share is encrypted using XOR method. The proposed method is n out of n multi secret sharing scheme. Transmission of multiple secret images simultaneously is achieved through this proposed work. The secret image can be revealed only when all the n shares are received by the receiver and decrypted. At the receiver end, the hidden data is extracted from the recovered image.

No. of Downloads :



Traffic Stats

Total Visits : 3,555