z-logo
open-access-imgOpen Access
Secret Image Sharing Scheme Based on Pixel Segmentation Strategy Exploiting Modification Direction (PSSEMD) with High Quality Shadows
Author(s) -
S. Lakshmi Narayanan,
Dr.K. Sankaranarayanan,
Dr.V. Vijayakumari
Publication year - 2019
Publication title -
international journal of recent technology and engineering
Language(s) - English
Resource type - Journals
ISSN - 2277-3878
DOI - 10.35940/ijrte.d5329.118419
Subject(s) - lossless compression , encryption , computer science , image sharing , cover (algebra) , computer vision , artificial intelligence , image (mathematics) , digital watermarking , pixel , image quality , watermark , shadow (psychology) , computer security , data compression , mechanical engineering , psychology , engineering , psychotherapist
Schemes of sharing a secret image are enhanced practically. The secret images are wrapped in cover imageon producing shadow images in this proposed scheme. In sequence,security is attained by means of methods of encryption and decryption while processing of sharing image. In the sharing step, cover image wrapped out the secret image by producing n images of shadow like cover image. This research dedicates a method of Improved Exploiting Modification Direction (IEMD) to conceal confidential data on preserving a high PSNR value. Pixel Segmentation Strategy EMD (PSSEMD) Method is used for wrapping confidential bit on all pixel cover image. the images as secret and cover are rebuilt by Shadow images. Lossless recovery of secret image is enriched by rebuilding the confidential image with lossless whereas by compressing the image before encryption and watermarking. Here Lossless image compression is done with the concern of sensitive information. Then chaotic encryption and decryption method is used for better security during image sharing process. Hence better embedding capacity and better quality in visual are attained in this proposed research results ensuring high security results in term of higher PSNR, lower MSE and higher correlation than the existing methods.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here