Enhance the image sharing with steganography and authentication

被引:8
|
作者
Wu, Chia-Chun [2 ]
Kao, Shang-Juh [2 ]
Kuo, Wen-Chung [3 ]
Hwang, Min-Shiang [1 ]
机构
[1] Natl Chung Hsing Univ, Dept Management Informat Syst, 250 Kuo Kuang Rd, Taichung 40227, Taiwan
[2] Natl Chung Hsing Univ, Dept Comp Sci & Engn, 250 Kuo Kuang Rd, Taichung 40227, Taiwan
[3] Natl Formosa Univ, Dept Comp Sci & Informat Engn, Huwei Township, Yunlin, Taiwan
关键词
steganography; cryptography; secret; sharing; fragile watermark; (k; n)-threshold scheme; galois field;
D O I
10.1109/IIH-MSP.2008.317
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Recently, Yang et al. showed that the Lin-Tsai scheme has three weaknesses and further proposed improvements in 2007. They are not only improve authentication ability and image quality of stego-image, but also introduce a lossless image sharing scheme for secret image. Unfortunately, the embedding algorithm in their scheme is obviously not optimal. To enhance Yang et al. 's scheme, a novel secret image sharing scheme based on the simple LSB substitution and an optimal pixel adjustment process will be proposed in this paper. The experimental results show that the proposed scheme has significantly better image quality than others. In other words, our scheme not only maintains secret image sharing and authentication ability but also enhances the image quality.
引用
收藏
页码:1177 / +
页数:2
相关论文
共 50 条
  • [1] Improvements of image sharing with steganography and authentication
    Yang, Ching-Nung
    Chen, Tse-Shih
    Yu, Kun Hsuan
    Wang, Chung-Chun
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2007, 80 (07) : 1070 - 1076
  • [2] Secret image sharing with steganography and authentication
    Lin, CC
    Tsai, WH
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2004, 73 (03) : 405 - 414
  • [3] A new approach to the secret image sharing with steganography and authentication
    Wu, C-C
    Hwang, M-S
    Kao, S-J
    [J]. IMAGING SCIENCE JOURNAL, 2009, 57 (03): : 140 - 151
  • [4] Steganography and authentication in image sharing without parity bits
    Yang, Ching-Nung
    Ouyang, Jin-Fwu
    Harn, Lein
    [J]. OPTICS COMMUNICATIONS, 2012, 285 (07) : 1725 - 1735
  • [5] A high quality image sharing with steganography and adaptive authentication scheme
    Wu, Chia-Chun
    Kao, Shang-Juh
    Hwang, Min-Shiang
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2011, 84 (12) : 2196 - 2207
  • [6] Invertible secret image sharing with steganography and authentication for AMBTC compressed images
    Wu, Xiaotian
    Yang, Ching-Nung
    [J]. SIGNAL PROCESSING-IMAGE COMMUNICATION, 2019, 78 : 437 - 447
  • [7] Authentication of Secret Information in Image Steganography
    Babu, K. Suresh
    Raja, K. B.
    Kumar, Kiran K.
    Devi, Manjula T. H.
    Venugopal, K. R.
    Patnaik, L. M.
    [J]. 2008 IEEE REGION 10 CONFERENCE: TENCON 2008, VOLS 1-4, 2008, : 1659 - +
  • [8] Image Protection System with Steganography and Authentication
    Kang, Hyunho
    Iwamura, Keiichi
    [J]. 2014 TENTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2014), 2014, : 467 - 470
  • [9] Secret sharing systems with authentication-based steganography
    Wang, Shiuh-Jeng
    Lin, I-Shuan
    Hsieh, Ye-Lin
    Weng, Chi-Yao
    [J]. 2008 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PROCEEDINGS, 2008, : 1146 - +
  • [10] Secret Image Sharing with Reversible Steganography
    Chang, Chin-Chen
    Lin, Pei-Yu
    Chan, Chi-Shiang
    [J]. PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND NATURAL COMPUTING, VOL II, 2009, : 253 - +