Vous êtes sur la page 1sur 16

Project Review-1 on

“Image Steganography using Segmentation and


Encryption Decryption technique”

Presented by

1
Under the Guidance of

7/26/2019
OUTLINE

Introduction
Literature Survey
Problem Statement
Purpose
Scope
Objectives
System Overview
2

System Architecture
References
Project Plan 1.0
7/26/2019
INTRODUCTION

 Conventional visual secret sharing schemes hide secret images in shares


that are either printed on transparencies or are encoded and stored in a
digital form.
 The shares can appear as noise-like pixels or as meaningful images; but
it will arouse suspicion and increase interception risk during
transmission of the shares.
 Hence, VSS schemes suffer from a transmission risk problem for the
secret itself and for the participants who are involved in the visual secret
sharing scheme.
 To address this problem, we proposed a novel technique for palette
based steganography using a texture and also a natural-image-based
visual secret sharing scheme that shares secret images via various
carrier media to protect the secret and the participants during the
transmission phase.

7/26/2019
LITERATURE SURVEY(1/3)

AUTHOR NAME/ YEAR PROPOSED SYSTEM IMPLEMENTED CONCEPT


SR.N PAPER NAME
O
1. “Assorted Image Based 2014 The existing research focuses only using The technique Visual cryptography
Obscure Techniques In transparencies or digital media as carriers is the process of
Visual Cryptography” by for a VSS scheme. This is not friendly. obscure important information in
Thanuganesh.M, any variant media to transfer it
Saranya.R securely over the underlying
unreliable and unsecured
Communication media by the usage
of different image types like digital
image, natural image, grey image.
2. “Extended capabilities for 2001 This research has tried to enhance the This model has been extended the
visual cryptography” by friendliness general access structures and
Giuseppe Ateniese, Carlo of VSS schemes for participants due to general techniques to construct
Blundo, Alfredo De Santis simple and meaningful cover images are visual cryptography schemes for
and added to noise-like any access structure have been
4 Douglas R. Stinson shares for identification, making traditional proposed. the authors propose k out
VC schemes more of n visual cryptography schemes
Friendly and manageable. achieving a greater relative
difference than previously known
Schemes.

7/26/2019
LITERATURE SURVEY (2/3)
AUTHOR NAME/ YEAR PROPOSED IMPLEMENTED CONCEPT
SR.N PAPER NAME SYSTEM
O

3. “Halftone visual 2009 The proposed method Research has focused on gray-level and color secret images to
cryptography is tradeoff between develop a use r-friendly VSS scheme that adds cover images
via error diffusion” by Z. the quality of the into the meaningless shares.
Wang, G. R. Arce, and G. shares, the quality of These studies had
D. Crescenzo the serious side effects in terms of pixel expansion and poor
Recovered images, display quality for the recovered images, although the display
and the pixel Quality of the shares was enhanced.
expansion of the
images.
4. “A novel secret 2009 This research had Implementation of steganography technique which is used to
5
image sharing scheme for used steganography hide secret images in cover images.
true-color images with techniques
size constraint” by D. S.
Tsai, G. Horng, T. H.
Chen, and Y. T. Huang

7/26/2019
LITERATURE SURVEY(3/3)
AUTHOR NAME/ YEAR PROPOSED IMPLEMENTED CONCEPT
SR.N PAPER NAME SYSTEM
O

5 “Improved nvss scheme 2016 In this paper Visual cryptography (VC) proposed a secret-sharing scheme
for diverse image proposed technique is based on black-and-white or binary images. The shares can
media” Miss improved NVSS Appear as noise-like pixels as meaningful images but it will
A.A.Naphade Dr. scheme for diverse produce suspicion and raise interception risk in transmission of
R.N.khobaragade image the shares.
Dr.V.M.Thakare media

6 “Secret sharing schemes 2015 This paper proposed NVSS shares secret images via various carrier media to
6
by diverse image media” a natural-image-based protect the secret and the participants during the
by ] G.Rajathi, VSS scheme (NVSS Transmission phase. This Process involved to Share a
G.Sangeetha, scheme) Secret image over arbitrary selected natural images and one
D.Tamizharasi, sound-like share.
S.Praveen Kumar

7/26/2019
PROBLEM STATEMENT

• With the help of this research we can protect our private data not only our
personal private but it can be also used to protect high profile secrets like
government important records, company secret file.

7/26/2019
PURPOSE

Main Purpose of this research it to provide the security to the


important file and documents on which there is a no chance of hack
or attack by the attackers.

7/26/2019
OBJECTIVES

 The main objective of this work is to share digital image without risk
and noiseless at time of transmission without effecting the original
feature of the digital images.

7/26/2019
SCOPE

 In today’s world, information is the most important part of any

organization. The information is often shared between the


organizations or transferred from person to person. Hence,
information security plays a vital role in the field of
communication. Hence, there is need to protect the information
that is being shared. This work reduced transmission risk and
provides the security.
10

7/26/2019
SYSTEM OVERVIEW

We have worked to facilitate the data security in getting secure transmission of
data over social media which maintain the data hiding inside texture image.

Hence this system is suitable for maintaining high level security for data
transmission or image preservation in the network.

In proposed work, stenography is used to hide the secret message in image and
also extract the secret message from texture image.

11

7/26/2019
ADVANTAGES OF PROPOSED SYSTEM

The recovered source texture image is exactly the same as the original source
texture, so no loss of pixels in this process.

Reducing distortion is the crucial issue in existing method this will overcome
by our system.

System provides the security to the important file and documents on which
there is a chance of hack or attack by the attackers.

To share digital image without risk and noiseless at time of transmission
12

without effecting the original feature of the digital images.

7/26/2019
ARCHITECTURE

13

7/26/2019
REFRENCES

[1] Thanuganesh.M, Saranya.R, “Assorted Image Based Obscure Techniques in Visual Cryptography”, International Journal of Computer Science and
Information Technologies, Vol. 5 (6), 2014

[2] G. Ateniese, C. Blundo, A. D. Santis, and D. R. Stinson, “Extended capabilities for visual cryptography,” Theoretical Comput. Sci., vol. 250, nos. 1–
2, pp. 143–161, Jan. 2001.

[3] Z. Wang, G. R. Arce, and G. D. Crescenzo, “Halftone visual cryptography via error diffusion,” IEEE Trans. Inf. Forensics Security, vol. 4, no. 3, pp.
383–396, Sep. 2009.

[4] D. S. Tsai, G. Horng, T. H. Chen, and Y. T. Huang, “A novel secret image sharing scheme for true-color images with size constraint”.

[5] Miss A.A.Naphade Dr. R.N.khobaragade Dr.V.M.Thakare, “Improved nvss scheme for diverse image media”. International Conference on Science
and Technology for Sustainable Development, Kuala Lumpur, MALAYSIA, May 24-26, 2016

[6] G.Rajathi, G.Sangeetha, D.Tamizharasi, S.Praveen Kumar, “Secret sharing schemes by diverse image media”. International Journal of Innovative
Research in Computer and Communication Engineering an ISO 3297: 2007 Certified Organization Vol.3, Special Issue 1, February 2015

[7] Priyanka R. Pawar, Manjusha S. Borse, “Transmission risk reduction in image sharing scheme with diverse image media”. International Conference
on “Recent Research Development in Science, Engineering and Management” 2016.

[8] R.H. adekar, N.M. jadhav, N.D. Pergad, “Digital image sharing by diverse image media using nvss technique”. IJARIIE-ISSN (O)-2395-4396. Vol-
2 Issue-1 2016
14
[9] Mayuri Sonkusare, Prof. Nitin Janwe “Analysis of Digital Image Sharing By Diverse Image Media” ,Mayuri Sonkusare et al, / (IJCSIT)
International Journal of Computer Science and Information Technologies, Vol. 6 (4) , 2015, 3784-3786

[10] (2013). QR Code.com [Online]. Available: http://www.qrcode.com/en/index.html (Accessed)

7/26/2019
PROJECT PLAN

Schedule Date Project Activity


July 1stWeek 01/04/2019 Project Topic Searching
2ndWeek 09/04/2019 Project Topic Selection
3rd Week 15/04/2019 Synopsis Submission
August 1stWeek 05/09/2019 Presentation On Project Ideas
2ndWeek 12/09/2019 Submission Of Literature Survey
3rd Week 19/09/2019 Feasibility Assessment
September 1stWeek 02/09/2019 Documentation for paper publishing.
3rdWeek 16/09/2019 Design Of Mathematical Model
4thWeek 23/09/2019 Paper is publish.
October 1stWeek 08/10/2019 Report Preparation And Submission
December 3rdWeek 19/12/2019 1stmodule presentation
4thWeek 26/12/2019 Discussion and implementation of
2ndmodule
15 January 1stWeek 02/01/2020 Preparation for conference
2ndWeek 09/01/2020 Study of algorithm.
3rdWeek 16/01/2020 Discussion about modification.
4thWeek 23/01/2020 1stand 2ndmodule presentation
5thWeek 30/01/2020 Discussion on flow of project and
designing new module

UCOER COMP 7/26/2019


Thank You!!!
16

7/26/2019

Vous aimerez peut-être aussi