Invertible secret image sharing with steganography and authentication for AMBTC compressed images

被引:28
|
作者
Wu, Xiaotian [1 ]
Yang, Ching-Nung [2 ]
机构
[1] Jinan Univ, Dept Comp Sci, Guangzhou, Guangdong, Peoples R China
[2] Natl Dong Hwa Univ, Dept Comp Sci & Informat Engn, Hualien, Taiwan
基金
中国国家自然科学基金;
关键词
Secret image sharing; AMBTC; Steganography; Authentication; Invertible; Distortion-free; VISUAL CRYPTOGRAPHY SCHEMES; GENERAL ACCESS STRUCTURES; CONTRAST; QUALITY; COMBINATION;
D O I
10.1016/j.image.2019.08.007
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Existing secret image sharing (SIS) schemes provided steganography and authentication abilities. But those schemes cannot deal with Absolute Moment Block Truncation Coding (AMBTC) compressed images. Moreover, if the cover image is significant, the distorted stego image cannot be reverted into the original form. In this paper, an invertible SIS scheme with steganography and authentication for AMBTC compressed images is proposed. The AMBTC compressed secret image is shared and embedded into the cover image to generate n AMBTC compressed stego images. To ensure the integrity of the stego image, parity bits are constructed and concealed into stego images. When revealing the secret image, the stego images are verified. By using those successfully verified stego images, distortion-free secret image and cover image are both obtained. Experimental results are demonstrated to show the effectiveness and advantages of the proposed scheme.
引用
收藏
页码:437 / 447
页数:11
相关论文
共 50 条
  • [21] Enhance the image sharing with steganography and authentication
    Wu, Chia-Chun
    Kao, Shang-Juh
    Kuo, Wen-Chung
    Hwang, Min-Shiang
    [J]. 2008 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PROCEEDINGS, 2008, : 1177 - +
  • [22] Secret sharing systems with authentication-based steganography
    Wang, Shiuh-Jeng
    Lin, I-Shuan
    Hsieh, Ye-Lin
    Weng, Chi-Yao
    [J]. 2008 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PROCEEDINGS, 2008, : 1146 - +
  • [23] Authentication of Encrypted Secret Information in Image Steganography
    Kalaivani, B.
    Padmaa, M.
    [J]. 2014 INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND SIGNAL PROCESSING (ICCSP), 2014,
  • [24] Steganography Using Quotient Value Differencing and LSB Substitution for AMBTC Compressed Images
    Horng, Ji-Hwei
    Chang, Chin-Chen
    Li, Guan-Long
    [J]. IEEE ACCESS, 2020, 8 : 129347 - 129358
  • [25] An Authentication Method for AMBTC Compressed Images Using Dual Embedding Strategies
    Zhou, Xiaoyu
    Chen, Jeanne
    Yang, Guangsong
    Lin, Zheng-Feng
    Hong, Wien
    [J]. APPLIED SCIENCES-BASEL, 2023, 13 (03):
  • [26] K Out of N Secret Sharing Scheme with Steganography and Authentication
    Fathimal, P. Mohamed
    Rani, P. Arockia Jansi
    [J]. COMPUTATIONAL INTELLIGENCE, CYBER SECURITY AND COMPUTATIONAL MODELS, ICC3 2015, 2016, 412 : 413 - 425
  • [27] AMBTC-based secret image sharing by simple modular arithmetic
    Yang, Ching-Nung
    Wu, Xiaotian
    Chung, Min-Jung
    Zhang, Xuliang
    [J]. JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2022, 84
  • [28] A Steganography Framework for Easy Secret Sharing through Images
    Palanisamy, Praveen
    Rajagopal, Manoj Kumar
    [J]. 2013 IEEE SECOND INTERNATIONAL CONFERENCE ON IMAGE INFORMATION PROCESSING (ICIIP), 2013, : 309 - 312
  • [29] Hiding Secret Data into an AMBTC-Compressed Image Using Genetic Algorithm
    Chang, Chin-Chen
    Yu, Yuan-Hui
    Hu, Yu-Chen
    [J]. 2008 SECOND INTERNATIONAL CONFERENCE ON FUTURE GENERATION COMMUNICATION AND NETWORKING SYMPOSIA, VOLS 1-5, PROCEEDINGS, 2008, : 321 - +
  • [30] An effective compressed image authentication scheme based on N-variant AMBTC
    Su, Guo-Dong
    Chang, Chin-Chen
    Lin, Chia-Chen
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 83 (2) : 3801 - 3829