A secret image sharing scheme with steganography lacks to provide the authentication, quality of stego-image and more cheating done by the dishonest participants. So, a secret image sharing using shared image technique is proposed to prevent the participants from the subsidiary stipulation of a false stego-image (an image containing the hidden secret image). A secret image is first processed into n shares which are then hidden in n user-selected suppression images. It is recommended to select these suppression images to contain well-known stuffing to increase the steganographic effect for the security protection.Additionally, an image watermarking technique is engaged to embed fragile watermark signals into the suppression images by the use of parity-bit checking, thus providing the ability of authenticating the reliability of each processed suppression image. During the secret image recovery process, each stegoimage carry by a participant is first verified for its reliability by checking the uniformity of the parity conditions found in the image pixels. This facilitates to avert the participant from subsidiary stipulation of a false stego-image.Some effective techniques for handling large images as well as for enhancing security protection are employed. As a result, the secret image sharing using shared image scheme offers a high secure and effective mechanism for secret image sharing that is not found in existing secret image sharing methods. High-class experimental results proving the authentication capability, secret hiding effectiveness and quality of the proposed approach are included.
With the increasing threats on multimedia information sharing, degradation of security is one of the most important concerns. Visual Cryptography is an emerging field for improving the security level by encoding the secret video using encryption scheme and performs computational free decoding process. The secret sharing through visual cryptographic techniques for multiple stack users is not sufficient in providing high percentage result on video sharing domain. Video sharing did not develop source key properties for individual frames and as a result the quality estimation strategy on video frame was not achieved. Moreover, the target rate constraint for video quality under the encryption-decryption was not achieved. This encryption-decryption target key rate declines on arranging multiple sequences of frames from multiple stack users. To improve the quality of visual secret video sharing scheme, a Discrete Cosine Transform Chaos Cryptographic (DCTCC) mechanism is proposed in this paper. The main objective of DCTCC is to enhance the security level of different level video frame using the encryption key properties. Initially, sender takes the video of differing frame length and compresses the video on image using the Discrete Cosine Transformer. The Discrete Cosine Transformer based visual secret sharing of video in the image takes the luminance values and provides high lossless compression. Second, the embedded video frame is encrypted to perform the secret sharing (i.e., visual cryptographic) using the chaos method. The Chaos method uses the enhanced RSA key properties to improve the video quality estimation strategy. Chaos method in DCTCC works effectively with non-linear dynamic set of video frames from users and also with the discrete time dynamical video cryptographic system. On the decryption side, the chaos method is applied in the reverse procedural order to fetch the video quality of video frames from original image. Experiment is conducted on factors such as mean square error rate, and secret video sharing efficacy level and encryption time.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2025 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.