Enhance the image sharing with steganography and authentication

被引:8
|
作者
Wu, Chia-Chun [2 ]
Kao, Shang-Juh [2 ]
Kuo, Wen-Chung [3 ]
Hwang, Min-Shiang [1 ]
机构
[1] Natl Chung Hsing Univ, Dept Management Informat Syst, 250 Kuo Kuang Rd, Taichung 40227, Taiwan
[2] Natl Chung Hsing Univ, Dept Comp Sci & Engn, 250 Kuo Kuang Rd, Taichung 40227, Taiwan
[3] Natl Formosa Univ, Dept Comp Sci & Informat Engn, Huwei Township, Yunlin, Taiwan
关键词
steganography; cryptography; secret; sharing; fragile watermark; (k; n)-threshold scheme; galois field;
D O I
10.1109/IIH-MSP.2008.317
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Recently, Yang et al. showed that the Lin-Tsai scheme has three weaknesses and further proposed improvements in 2007. They are not only improve authentication ability and image quality of stego-image, but also introduce a lossless image sharing scheme for secret image. Unfortunately, the embedding algorithm in their scheme is obviously not optimal. To enhance Yang et al. 's scheme, a novel secret image sharing scheme based on the simple LSB substitution and an optimal pixel adjustment process will be proposed in this paper. The experimental results show that the proposed scheme has significantly better image quality than others. In other words, our scheme not only maintains secret image sharing and authentication ability but also enhances the image quality.
引用
收藏
页码:1177 / +
页数:2
相关论文
共 50 条
  • [21] Guest Editorial Special Issue on Steganography and Image Authentication
    Chin-Chen Chang
    Yung-Chen Chou
    [J]. Journal of Electronic Science and Technology, 2013, 11 (01) : 1 - 2
  • [22] Using steganography techniques for implicit authentication to enhance sensitive data hiding
    Kadhum, Rafal Najeh
    Ali, Nada Hussein M.
    [J]. INTERNATIONAL JOURNAL OF NONLINEAR ANALYSIS AND APPLICATIONS, 2022, 13 (01): : 3973 - 3983
  • [23] Reversible secret image sharing with steganography and dynamic embedding
    Hu, Wei-Tong
    Li, Ming-Chu
    Guo, Cheng
    Ren, Yi-Zhi
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (11) : 1267 - 1276
  • [24] A Lossless Secret Image Sharing Scheme Based on Steganography
    Li, Li
    Abd El-Latif, Ahmed A.
    Yan, Xuehu
    Wang, Shen
    Niu, Xiamu
    [J]. PROCEEDINGS OF THE 2012 SECOND INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2012), 2012, : 1247 - 1250
  • [25] Secret image sharing based on cellular automata and steganography
    Eslami, Z.
    Razzaghi, S. H.
    Ahmadabadi, J. Zarepour
    [J]. PATTERN RECOGNITION, 2010, 43 (01) : 397 - 404
  • [26] Web Authentication Security Using Image Steganography and AES Encryption
    Mogale, Hope
    Esiefarienrhe, Michael
    Letlonkane, Lucia
    [J]. 2018 INTERNATIONAL CONFERENCE ON INTELLIGENT AND INNOVATIVE COMPUTING APPLICATIONS (ICONIC), 2018, : 531 - 537
  • [27] Digital Image Authentication Model Based on Edge Adaptive Steganography
    Grover, Nidhi
    Mohapatra, A. K.
    [J]. 2013 SECOND INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, NETWORKING AND SECURITY (ADCONS 2013), 2013, : 238 - 242
  • [28] Message Segmentation to Enhance the Security of LSB Image Steganography
    Al-Husainy, Mohammed Abbas Fadhil
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2012, 3 (03) : 57 - 62
  • [29] Image steganography Based on Chaos Permutation, Authentication and Wiener Deconvolution
    Sheidaee, Ali
    Asadpour, Mohammad
    Farzinvash, Leili
    [J]. 2021 29TH IRANIAN CONFERENCE ON ELECTRICAL ENGINEERING (ICEE), 2021, : 573 - 578
  • [30] Novel Mutual Authentication Protocol for Cloud Computing using Secret Sharing and Steganography
    Nimmy, K.
    Sethumadhavan, M.
    [J]. 2014 FIFTH INTERNATIONAL CONFERENCE ON THE APPLICATIONS OF DIGITAL INFORMATION AND WEB TECHNOLOGIES (ICADIWT), 2014, : 101 - 106