LOGIN TO YOUR ACCOUNT

Username
Password
Remember Me
Or use your Academic/Social account:

CREATE AN ACCOUNT

Or use your Academic/Social account:

Congratulations!

You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.

Important!

Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message

CREATE AN ACCOUNT

Name:
Username:
Password:
Verify Password:
E-mail:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:
fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Metri, Priya; Desai, Sharmishtha; Patil, Dr. S. T (2014)
Publisher: Journal of Engineering Computers & Applied Sciences
Journal: Journal of Engineering Computers & Applied Sciences
Languages: English
Types: Article
Subjects:

Classified by OpenAIRE into

ACM Ref: ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION, TheoryofComputation_MISCELLANEOUS
Handling secret has been an issue of prominence from the time for a human. Important things and messages have been always there to be preserved and protected from possible misuse or loss. If secret will be kept with group of people then reliability of the secret information increases. In this paper we proposed a secret image sharing algorithm based on Shamirs secret sharing algorithm for gray scale and color images in different formats. Here we use (K,N) threshold sharing algorithm for secret image sharing along with image data hiding we use parity bit check policy for error detection to identify the tempering in image. Here, we divide the cover image into blocks of 2X2 . We select each pixel value form a secret image and generate a pair of a share (x ,F(x)) using a Lagrange polynomial equation .We use (R,G,B) values of each pixel to hide the pixel values of secret image into cover image using LSB substitution method .For reconstruction original image we use polynomial interpolation formula for getting the original pixel values of secret image. We show the experimental result in terms of execution time for various types of secret images. In a proposed scheme execution time required for hiding process of a secret image is based on the size of image. We shown the comparative study of different techniques for secret image sharing based on various properties.
  • No references.
  • No related research data.
  • No similar publications.

Share - Bookmark

Cite this article