Académique Documents
Professionnel Documents
Culture Documents
Presented by
1
Under the Guidance of
7/26/2019
OUTLINE
Introduction
Literature Survey
Problem Statement
Purpose
Scope
Objectives
System Overview
2
System Architecture
References
Project Plan 1.0
7/26/2019
INTRODUCTION
7/26/2019
LITERATURE SURVEY(1/3)
7/26/2019
LITERATURE SURVEY (2/3)
AUTHOR NAME/ YEAR PROPOSED IMPLEMENTED CONCEPT
SR.N PAPER NAME SYSTEM
O
3. “Halftone visual 2009 The proposed method Research has focused on gray-level and color secret images to
cryptography is tradeoff between develop a use r-friendly VSS scheme that adds cover images
via error diffusion” by Z. the quality of the into the meaningless shares.
Wang, G. R. Arce, and G. shares, the quality of These studies had
D. Crescenzo the serious side effects in terms of pixel expansion and poor
Recovered images, display quality for the recovered images, although the display
and the pixel Quality of the shares was enhanced.
expansion of the
images.
4. “A novel secret 2009 This research had Implementation of steganography technique which is used to
5
image sharing scheme for used steganography hide secret images in cover images.
true-color images with techniques
size constraint” by D. S.
Tsai, G. Horng, T. H.
Chen, and Y. T. Huang
7/26/2019
LITERATURE SURVEY(3/3)
AUTHOR NAME/ YEAR PROPOSED IMPLEMENTED CONCEPT
SR.N PAPER NAME SYSTEM
O
5 “Improved nvss scheme 2016 In this paper Visual cryptography (VC) proposed a secret-sharing scheme
for diverse image proposed technique is based on black-and-white or binary images. The shares can
media” Miss improved NVSS Appear as noise-like pixels as meaningful images but it will
A.A.Naphade Dr. scheme for diverse produce suspicion and raise interception risk in transmission of
R.N.khobaragade image the shares.
Dr.V.M.Thakare media
6 “Secret sharing schemes 2015 This paper proposed NVSS shares secret images via various carrier media to
6
by diverse image media” a natural-image-based protect the secret and the participants during the
by ] G.Rajathi, VSS scheme (NVSS Transmission phase. This Process involved to Share a
G.Sangeetha, scheme) Secret image over arbitrary selected natural images and one
D.Tamizharasi, sound-like share.
S.Praveen Kumar
7/26/2019
PROBLEM STATEMENT
• With the help of this research we can protect our private data not only our
personal private but it can be also used to protect high profile secrets like
government important records, company secret file.
7/26/2019
PURPOSE
7/26/2019
OBJECTIVES
The main objective of this work is to share digital image without risk
and noiseless at time of transmission without effecting the original
feature of the digital images.
7/26/2019
SCOPE
7/26/2019
SYSTEM OVERVIEW
We have worked to facilitate the data security in getting secure transmission of
data over social media which maintain the data hiding inside texture image.
Hence this system is suitable for maintaining high level security for data
transmission or image preservation in the network.
In proposed work, stenography is used to hide the secret message in image and
also extract the secret message from texture image.
11
7/26/2019
ADVANTAGES OF PROPOSED SYSTEM
The recovered source texture image is exactly the same as the original source
texture, so no loss of pixels in this process.
Reducing distortion is the crucial issue in existing method this will overcome
by our system.
System provides the security to the important file and documents on which
there is a chance of hack or attack by the attackers.
To share digital image without risk and noiseless at time of transmission
12
7/26/2019
ARCHITECTURE
13
7/26/2019
REFRENCES
[1] Thanuganesh.M, Saranya.R, “Assorted Image Based Obscure Techniques in Visual Cryptography”, International Journal of Computer Science and
Information Technologies, Vol. 5 (6), 2014
[2] G. Ateniese, C. Blundo, A. D. Santis, and D. R. Stinson, “Extended capabilities for visual cryptography,” Theoretical Comput. Sci., vol. 250, nos. 1–
2, pp. 143–161, Jan. 2001.
[3] Z. Wang, G. R. Arce, and G. D. Crescenzo, “Halftone visual cryptography via error diffusion,” IEEE Trans. Inf. Forensics Security, vol. 4, no. 3, pp.
383–396, Sep. 2009.
[4] D. S. Tsai, G. Horng, T. H. Chen, and Y. T. Huang, “A novel secret image sharing scheme for true-color images with size constraint”.
[5] Miss A.A.Naphade Dr. R.N.khobaragade Dr.V.M.Thakare, “Improved nvss scheme for diverse image media”. International Conference on Science
and Technology for Sustainable Development, Kuala Lumpur, MALAYSIA, May 24-26, 2016
[6] G.Rajathi, G.Sangeetha, D.Tamizharasi, S.Praveen Kumar, “Secret sharing schemes by diverse image media”. International Journal of Innovative
Research in Computer and Communication Engineering an ISO 3297: 2007 Certified Organization Vol.3, Special Issue 1, February 2015
[7] Priyanka R. Pawar, Manjusha S. Borse, “Transmission risk reduction in image sharing scheme with diverse image media”. International Conference
on “Recent Research Development in Science, Engineering and Management” 2016.
[8] R.H. adekar, N.M. jadhav, N.D. Pergad, “Digital image sharing by diverse image media using nvss technique”. IJARIIE-ISSN (O)-2395-4396. Vol-
2 Issue-1 2016
14
[9] Mayuri Sonkusare, Prof. Nitin Janwe “Analysis of Digital Image Sharing By Diverse Image Media” ,Mayuri Sonkusare et al, / (IJCSIT)
International Journal of Computer Science and Information Technologies, Vol. 6 (4) , 2015, 3784-3786
7/26/2019
PROJECT PLAN
7/26/2019