International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



Research Paper | Computer Science & Engineering | India | Volume 5 Issue 12, December 2016

More Secure Way of Sharing Secret Text Message

Amit Patel, Sai Prasad Kousika VNH

The paper is about a more secure way of sharing the text data by hiding the text data in images by steganography (LSB algorithm). And convert the image into random shares through Multi-Secret Image Sharing scheme and sent to the receiver. Multi-Secret Image Sharing (MSIS) scheme shares n secret images among n shared images. In this scheme, there are n shares generated from n secrets images to recover all n secret image we need all n shared images, but if any shared imaged is lost that will stop the recovery of secret image. The proposed method uses the LSB algorithm which is used to store the secret information in the images and the multi secret image sharing scheme proposed in [3]. From the experimental results it is also found that the proposed scheme provides more randomness to the shares which makes this scheme more secure

Keywords: Secret sharing, steganography, stego image, shares, secrets,

Edition: Volume 5 Issue 12, December 2016

Pages: 1563 - 1568


How to Cite this Article?

Amit Patel, Sai Prasad Kousika VNH, "More Secure Way of Sharing Secret Text Message", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20162953, Volume 5 Issue 12, December 2016, 1563 - 1568

23 PDF Views | 28 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Secret sharing'

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 4, April 2014

Pages: 751 - 753

Study of Secret Sharing Schemes Using Access Structure

Ashwini Satpute, Reshma Batule, Shweta Wakalkar, Pooja Shelar

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1344 - 1346

A Quality Maintain Visual Cryptography Scheme

Anju G

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2382 - 2385

Data Sharing through Multimedia Steganocryptic and Visual Cryptography System

Gajangi Rahul Kumar, U.Shivaji

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2306 - 2309

Extended Approach of Visual Secret Sharing for Color Images

Khemutai Tighare, Chetan Bawankar

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2707 - 2709

NVSS Scheme Based ATM Authentication Using Fingerprint Matching

Nasla K, Hemand E P

Share this article



Similar Articles with Keyword 'steganography'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2319 - 2323

Performance Enhancement of a Transform Domain Based SteganographicTechnique Using Segmentation

Harjeet Kaur, Er Divya Goyal

Share this article

Review Papers, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 1547 - 1549

Various Approaches of Video and Image Stenography: A Review

Mandeep Singh, Garima Mahajan

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1467 - 1471

XOR Encryption Based Video Steganography

Ramandeep Kaur, Pooja

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2420 - 2425

Data hiding Using Texture Synthesis with Watermarking

Aruna M P, Maya Mathew

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 842 - 846

An Efficient Technique of Steganography

Latika, Yogita Gulati

Share this article



Similar Articles with Keyword 'stego image'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1175 - 1178

Steganographic Method of Data Hiding using JPEG Images

Shabana Vathelil Subair, Fathima A Muhammadali

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1773 - 1778

Image Steganography Scheme Using Neural Network in Wavelet Transform Domain

Anamika Sharma, Ajay Kushwaha

Share this article

Research Paper, Computer Science & Engineering, Iraq, Volume 6 Issue 8, August 2017

Pages: 1767 - 1769

New Steganography Technique

Shahbaa Mohammed

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 2281 - 2284

Hiding Image in Image Using LSB Insertion Method with Improved Security and Quality

Mekha Jose

Share this article

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 6, June 2017

Pages: 1082 - 1085

Secure Image Transmission using Cipher Block Chaining Mode & Visual Steganography

Manoj Dhande, Arjun Mudaliyar, Vineeta Pandey, Pranali Dalvi

Share this article



Similar Articles with Keyword 'shares'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1344 - 1346

A Quality Maintain Visual Cryptography Scheme

Anju G

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3262 - 3267

An Image Database Security Using Multilayer Multi Share Visual Cryptography

Apurva A. Mohod, Prof. Komal B. Bijwe

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2382 - 2385

Data Sharing through Multimedia Steganocryptic and Visual Cryptography System

Gajangi Rahul Kumar, U.Shivaji

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2306 - 2309

Extended Approach of Visual Secret Sharing for Color Images

Khemutai Tighare, Chetan Bawankar

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 560 - 563

Survey of Cheating Prevention Techniques in Visual Cryptography

Smita Patil, Jyoti Rao

Share this article
Top