{"title":"秘密图像共享隐藏使用隐写术","authors":"Anil Kumar, Priyanka Dahiya, Garima","doi":"10.1109/icrito51393.2021.9596092","DOIUrl":null,"url":null,"abstract":"An epic methodology of steganography used to conceal the mysterious picture utilizing sharing dependent on a (k,n)- limit is proposed. First, Wavelet Transform is applied to the secret picture. Second, utilize Lagrange's Polynomial Interpolating Scheme to partition the picture information into n shares and select any k (k<n) shares. At last, conceal the mysterious offers inside the picture utilizing LFSR (Linear Feedback Shift Register) procedure, which has the best random properties.","PeriodicalId":259978,"journal":{"name":"2021 9th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Secret Image Share hiding using Steganography\",\"authors\":\"Anil Kumar, Priyanka Dahiya, Garima\",\"doi\":\"10.1109/icrito51393.2021.9596092\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"An epic methodology of steganography used to conceal the mysterious picture utilizing sharing dependent on a (k,n)- limit is proposed. First, Wavelet Transform is applied to the secret picture. Second, utilize Lagrange's Polynomial Interpolating Scheme to partition the picture information into n shares and select any k (k<n) shares. At last, conceal the mysterious offers inside the picture utilizing LFSR (Linear Feedback Shift Register) procedure, which has the best random properties.\",\"PeriodicalId\":259978,\"journal\":{\"name\":\"2021 9th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)\",\"volume\":\"39 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-09-03\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 9th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/icrito51393.2021.9596092\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 9th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/icrito51393.2021.9596092","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An epic methodology of steganography used to conceal the mysterious picture utilizing sharing dependent on a (k,n)- limit is proposed. First, Wavelet Transform is applied to the secret picture. Second, utilize Lagrange's Polynomial Interpolating Scheme to partition the picture information into n shares and select any k (k