Loading

Secret Image Sharing Scheme Based on Pixel Segmentation Strategy Exploiting Modification Direction (PSSEMD) with High Quality Shadows
S. Lakshmi Narayanan1, K. Sankaranarayanan2, V. Vijayakumari3
1S. Lakshmi Narayanan Assistant Professor, Electronics and Communication Engineering, Sri Ramakrishna Engineering College, Coimbatore., Tamil Nadu, India.
2Dr.K. Sankaranarayanan, Dean, Department of Electronics and Communication Engineering, P.A. College of Engineering and Technology, Puliyampatti, Pollachi, Tamil Nadu, India.
3Dr.V. Vijayakumari Professor, Department of Electronics and Communications Engineering, Er. Perumal Manimekalai College of Engineering, Koneripalli, Hosur, Tamil Nadu, India.

Manuscript received on November 20, 2019. | Revised Manuscript received on November 28, 2019. | Manuscript published on 30 November, 2019. | PP: 7503-7510 | Volume-8 Issue-4, November 2019. | Retrieval Number: D5329118419/2019©BEIESP | DOI: 10.35940/ijrte.D5329.118419

Open Access | Ethics and Policies | Cite  | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Schemes of sharing a secret image are enhanced practically. The secret images are wrapped in cover imageon producing shadow images in this proposed scheme. In sequence,security is attained by means of methods of encryption and decryption while processing of sharing image. In the sharing step, cover image wrapped out the secret image by producing n images of shadow like cover image. This research dedicates a method of Improved Exploiting Modification Direction (IEMD) to conceal confidential data on preserving a high PSNR value. Pixel Segmentation Strategy EMD (PSSEMD) Method is used for wrapping confidential bit on all pixel cover image. the images as secret and cover are rebuilt by Shadow images. Lossless recovery of secret image is enriched by rebuilding the confidential image with lossless whereas by compressing the image before encryption and watermarking. Here Lossless image compression is done with the concern of sensitive information. Then chaotic encryption and decryption method is used for better security during image sharing process. Hence better embedding capacity and better quality in visual are attained in this proposed research results ensuring high security results in term of higher PSNR, lower MSE and higher correlation than the existing methods.
Keywords: Threshold Secret Sharing, Confidentiality, Transformation, Compression, Secret Image, Exploiting Modification Direction; Binary Image.
Scope of the Article: Aggregation, Integration, and Transformation.