A new approach to the secret image sharing with steganography and authentication

被引:12
|
作者
Wu, C-C [2 ]
Hwang, M-S [1 ]
Kao, S-J [2 ]
机构
[1] Natl Chung Hsing Univ, Dept Management Informat Syst, Taichung 402, Taiwan
[2] Natl Chung Hsing Univ, Dept Comp Sci & Engn, Taichung 402, Taiwan
来源
IMAGING SCIENCE JOURNAL | 2009年 / 57卷 / 03期
关键词
cryptography; fragile watermark; secret image sharing; steganography;
D O I
10.1179/174313109X459887
中图分类号
TB8 [摄影技术];
学科分类号
0804 ;
摘要
Steganography can be viewed as cryptography. It includes a variety of secret communication methods that embed the existence of the message and makes it appear invisible. Both of them have been used to protect secret information. In 2004, Lin and Tsai proposed a novel secret image sharing method that was based on the (k, n)-threshold scheme with the additional capabilities of steganography and authentication. They protect a secret image by breaking it into n user-selected ordinary camouflage images. Besides, their methods also embed fragile watermark signals into the camouflage images by using parity bit checking. Recently, Yang et al. have shown three weaknesses in Lin-Tsai's scheme and further proposed improvements in 2007. They not only improve authentication ability and image quality of stego-image, but also introduce a lossless version image sharing scheme for secret image. Unfortunately, there is a common drawback both in Lin-Tsai's and Yang et al.'s scheme: The enlargement size of the camouflage images and stego-images must be 4 times of the secret image. The proposed scheme does only require 3.5 times enlargement. In addition, the experimental results of image quality analysing show that the proposed scheme has better image quality than previous methods. In other words, the proposed scheme is able to save storage space as well as to improve the image quality.
引用
收藏
页码:140 / 151
页数:12
相关论文
共 50 条
  • [41] Efficient Secret Image Sharing Scheme with Authentication and Cheating Prevention
    Zhang, Lina
    Dang, Xuan
    Feng, Li
    Yang, Junhan
    [J]. MATHEMATICAL PROBLEMS IN ENGINEERING, 2021, 2021
  • [42] Secret image sharing with authentication-chaining and dynamic embedding
    Eslami, Z.
    Ahmadabadi, J. Zarepour
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2011, 84 (05) : 803 - 809
  • [43] AUTHENTICATION OF GRAYSCALE FORENSIC IMAGE USING VISUAL SECRET SHARING
    Joshi, Akshata M.
    Jadhav, Dhanashree M.
    Kazi, Nida A.
    Suryawanshi, Amol N.
    Katti, Jayashree
    [J]. 2016 CONFERENCE ON EMERGING DEVICES AND SMART SYSTEMS (ICEDSS), 2016, : 56 - 60
  • [44] Image Based Steganography to Facilitate Improving Counting-Based Secret Sharing
    Gutub, Adnan
    Al-Ghamdi, Maimoona
    [J]. 3D RESEARCH, 2019, 10 (01):
  • [45] Multi-secret image sharing based on elementary cellular automata with steganography
    Shiguo Azza A.A.
    [J]. Multimedia Tools and Applications, 2020, 79 : 21241 - 21264
  • [46] Multi-secret image sharing based on elementary cellular automata with steganography
    Azza, A. A.
    Lian, Shiguo
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (29-30) : 21241 - 21264
  • [47] A novel joint secret image sharing and robust steganography method using wavelet
    Khosravi, Mohammad Javad
    Naghsh-Nilchi, Ahmad Reza
    [J]. MULTIMEDIA SYSTEMS, 2014, 20 (02) : 215 - 226
  • [48] A novel joint secret image sharing and robust steganography method using wavelet
    Mohammad Javad Khosravi
    Ahmad Reza Naghsh-Nilchi
    [J]. Multimedia Systems, 2014, 20 : 215 - 226
  • [49] Invertible Secret Image Sharing With Authentication for Embedding Color Palette Image Into True Color Image
    Xiong, Lizhi
    Ding, Rui
    Yang, Ching-Nung
    Fu, Zhangjie
    [J]. IEEE Transactions on Circuits and Systems for Video Technology, 2024, 34 (11) : 10987 - 10999
  • [50] A secret sharing scheme for EBTC using steganography
    Cheonshik Kim
    Dongkyoo Shin
    Dongil Shin
    Raylin Tso
    Chin-Nung Yang
    [J]. Journal of Intelligent Manufacturing, 2014, 25 : 241 - 249