Sharing and hiding a secret image in color palette images with authentication

被引:7
|
作者
Wu, Xiaotian [1 ]
Yang, Ching-Nung [2 ]
Yang, Yi-Yun [2 ]
机构
[1] Jinan Univ, Dept Comp Sci, Guangzhou, Peoples R China
[2] Natl Dong Hwa Univ, Dept Comp Sci & Informat Engn, Hualien, Taiwan
基金
中国国家自然科学基金;
关键词
Secret image sharing; Steganography; Authentication; Color image; Palette image; Embedding; VISUAL CRYPTOGRAPHY; STEGANOGRAPHY; SCHEME; QUALITY; SIZE; (T;
D O I
10.1007/s11042-020-09253-2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Existing secret image sharing (SIS) schemes with steganography and authentication are only suitable for uncompressed grayscale images. To make it more practical, a scheme for sharing and hiding a secret image in color palette images with authentication is proposed in this paper. Three commonly used system color palettes are considered. In sharing phase, a secret image is encoded into shared bits by polynomial based SIS. The shared bits are concealed into the color palette cover image to form the stego images. Meanwhile, the authentication parity bits are generated and embedded as well. Two embedding strategies are developed for the color palette images. In authentication and recovery phase, the integrity of each stego image is verified. Then, the secret image are reconstructed by sufficient authentic stego images. Experimental results are demonstrated to show the effectiveness and merits of the proposed scheme.
引用
收藏
页码:25657 / 25677
页数:21
相关论文
共 50 条
  • [21] Efficient and Lossless Polynomial-Based Secret Image Sharing for Color Images
    Gong, Qinghong
    Wang, Yongjie
    Yan, Xuehu
    Liu, Lintao
    [J]. IEEE ACCESS, 2019, 7 : 113216 - 113222
  • [22] Adopting secret sharing for reversible data hiding in encrypted images
    Wu, Xiaotian
    Weng, Jian
    Yan, WeiQi
    [J]. SIGNAL PROCESSING, 2018, 143 : 269 - 281
  • [23] Hi-Tech Authentication for Palette Images Using Digital Signature and Data Hiding
    Jansirani, Arockia
    Rajesh, Rengansivagurunathan
    Balasubramanian, Ramasamy
    Eswaran, Perumal
    [J]. INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2011, 8 (02) : 117 - 123
  • [24] Adaptive data hiding in palette images by color ordering and mapping with security protection
    Tzeng, CH
    Yang, ZF
    Tsai, WH
    [J]. IEEE TRANSACTIONS ON COMMUNICATIONS, 2004, 52 (05) : 791 - 800
  • [25] Secret image sharing with separate shadow authentication ability
    Yan, Xuehu
    Gong, Qinghong
    Li, Longlong
    Yang, Guozheng
    Lu, Yuliang
    Liu, Jingju
    [J]. SIGNAL PROCESSING-IMAGE COMMUNICATION, 2020, 82
  • [26] A new approach to the secret image sharing with steganography and authentication
    Wu, C-C
    Hwang, M-S
    Kao, S-J
    [J]. IMAGING SCIENCE JOURNAL, 2009, 57 (03): : 140 - 151
  • [27] Secret image sharing scheme with adaptive authentication strength
    Ulutas, Guzin
    Ulutas, Mustafa
    Nabiyev, Vasif V.
    [J]. PATTERN RECOGNITION LETTERS, 2013, 34 (03) : 283 - 291
  • [28] Hiding Encrypted Multiple Secret Images in a Cover Image
    Guttikonda, Prashanti
    Cherukuri, Hemanthi
    Mundukur, Nirupama Bhat
    [J]. PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND DATA ENGINEERING, 2018, 9 : 95 - 104
  • [29] Hiding a secret colour image in two colour images
    Chang, CC
    Tai, WL
    Lin, CC
    [J]. IMAGING SCIENCE JOURNAL, 2005, 53 (04): : 229 - 240
  • [30] A Common Method of Share Authentication in Image Secret Sharing
    Yan, Xuehu
    Lu, Yuliang
    Yang, Ching-Nung
    Zhang, Xinpeng
    Wang, Shudong
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2021, 31 (07) : 2896 - 2908