Improvements of image sharing with steganography and authentication

被引:212
|
作者
Yang, Ching-Nung [1 ]
Chen, Tse-Shih [1 ]
Yu, Kun Hsuan [1 ]
Wang, Chung-Chun [1 ]
机构
[1] Natl Dong Hwa Univ, Dept Comp Sci & Informat Engn, Hualien, Taiwan
关键词
image secret sharing scheme; steganography; authentication;
D O I
10.1016/j.jss.2006.11.022
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Recently, Lin and Tsai proposed an image secret sharing scheme with steganography and authentication to prevent participants from the incidental or intentional provision of a false stego-image (an image containing the hidden secret image). However, dishonest participants can easily manipulate the stego-image for successful authentication but cannot recover the secret image, i.e., compromise the steganography. In this paper, we present a scheme to improve authentication ability that prevents dishonest participants from cheating. The proposed scheme also defines the arrangement of embedded bits to improve the quality of stego-image. Furthermore, by means of the Galois Field GF(2(8)), we improve the scheme to a lossless version without additional pixels. (C) 2006 Elsevier Inc. All rights reserved.
引用
收藏
页码:1070 / 1076
页数:7
相关论文
共 50 条
  • [1] Secret image sharing with steganography and authentication
    Lin, CC
    Tsai, WH
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2004, 73 (03) : 405 - 414
  • [2] Enhance the image sharing with steganography and authentication
    Wu, Chia-Chun
    Kao, Shang-Juh
    Kuo, Wen-Chung
    Hwang, Min-Shiang
    [J]. 2008 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PROCEEDINGS, 2008, : 1177 - +
  • [3] A new approach to the secret image sharing with steganography and authentication
    Wu, C-C
    Hwang, M-S
    Kao, S-J
    [J]. IMAGING SCIENCE JOURNAL, 2009, 57 (03): : 140 - 151
  • [4] Steganography and authentication in image sharing without parity bits
    Yang, Ching-Nung
    Ouyang, Jin-Fwu
    Harn, Lein
    [J]. OPTICS COMMUNICATIONS, 2012, 285 (07) : 1725 - 1735
  • [5] A high quality image sharing with steganography and adaptive authentication scheme
    Wu, Chia-Chun
    Kao, Shang-Juh
    Hwang, Min-Shiang
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2011, 84 (12) : 2196 - 2207
  • [6] Invertible secret image sharing with steganography and authentication for AMBTC compressed images
    Wu, Xiaotian
    Yang, Ching-Nung
    [J]. SIGNAL PROCESSING-IMAGE COMMUNICATION, 2019, 78 : 437 - 447
  • [7] Improvements in Geometry-Based Secret Image Sharing Approach with Steganography
    Ulutas, Mustafa
    Nabiyev, Vasif V.
    Ulutas, Guzin
    [J]. MATHEMATICAL PROBLEMS IN ENGINEERING, 2009, 2009
  • [8] Authentication of Secret Information in Image Steganography
    Babu, K. Suresh
    Raja, K. B.
    Kumar, Kiran K.
    Devi, Manjula T. H.
    Venugopal, K. R.
    Patnaik, L. M.
    [J]. 2008 IEEE REGION 10 CONFERENCE: TENCON 2008, VOLS 1-4, 2008, : 1659 - +
  • [9] Image Protection System with Steganography and Authentication
    Kang, Hyunho
    Iwamura, Keiichi
    [J]. 2014 TENTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2014), 2014, : 467 - 470
  • [10] Secret sharing systems with authentication-based steganography
    Wang, Shiuh-Jeng
    Lin, I-Shuan
    Hsieh, Ye-Lin
    Weng, Chi-Yao
    [J]. 2008 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PROCEEDINGS, 2008, : 1146 - +