Steganography based image sharing with reversibility

被引:10
|
作者
Sirisha, B. Lakshmi [1 ]
Kumar, S. Srinivas [2 ]
Mohan, B. Chandra [3 ]
机构
[1] Jawaharlal Nehru Technol Univ, Kakinada 533003, Andhra Pradesh, India
[2] Jawaharlal Nehru Technol Univ, Dept ECE, Kakinada 533003, Andhra Pradesh, India
[3] Bapatla Engn Coll, Dept ECE, Bapatla 522101, Andhra Pradesh, India
来源
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY | 2016年 / 19卷 / 01期
关键词
Image hiding; Image processing; Modulus operation; Reversibility; Steganography; Visual secret sharing;
D O I
10.1080/09720529.2015.1086109
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Steganography is an art of hiding secret information in another information. The use of steganography is to maintain a covert communication between two parties. A (t, n) threshold secret sharing scheme is one popular method of implementing steganography. In this method, the secret image is distributed among n participants. Any t (or more) out of n authorized participants can recover the secret image and less than t participants cannot recover the secret image. In the proposed method, both secret and cover images are retrieved without any loss of information is called reversibility. The shadows can be successfully embedded in the cover image. The resulting stego images are visually good. Various image quality metrics are used to assess the quality of the stego images. The proposed scheme is efficient in terms of embedding capacity and is computationally faster compared to Pei-y.u et al., and other methods.
引用
收藏
页码:67 / 80
页数:14
相关论文
共 50 条
  • [1] Reversibility-oriented secret image sharing mechanism with steganography and authentication based on code division multiplexing
    Xie, Xiao-Zhu
    Chang, Chin-Chen
    Lin, Chia-Chen
    IET IMAGE PROCESSING, 2019, 13 (09) : 1411 - 1420
  • [2] A Lossless Secret Image Sharing Scheme Based on Steganography
    Li, Li
    Abd El-Latif, Ahmed A.
    Yan, Xuehu
    Wang, Shen
    Niu, Xiamu
    PROCEEDINGS OF THE 2012 SECOND INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2012), 2012, : 1247 - 1250
  • [3] Secret image sharing based on cellular automata and steganography
    Eslami, Z.
    Razzaghi, S. H.
    Ahmadabadi, J. Zarepour
    PATTERN RECOGNITION, 2010, 43 (01) : 397 - 404
  • [4] Secret Image Sharing with Reversible Steganography
    Chang, Chin-Chen
    Lin, Pei-Yu
    Chan, Chi-Shiang
    PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND NATURAL COMPUTING, VOL II, 2009, : 253 - +
  • [5] Secret image sharing with steganography and authentication
    Lin, CC
    Tsai, WH
    JOURNAL OF SYSTEMS AND SOFTWARE, 2004, 73 (03) : 405 - 414
  • [6] Improvements of image sharing with steganography and authentication
    Yang, Ching-Nung
    Chen, Tse-Shih
    Yu, Kun Hsuan
    Wang, Chung-Chun
    JOURNAL OF SYSTEMS AND SOFTWARE, 2007, 80 (07) : 1070 - 1076
  • [7] Invertible secret image sharing with steganography
    Lin, Pei-Yu
    Chan, Chi-Shiang
    PATTERN RECOGNITION LETTERS, 2010, 31 (13) : 1887 - 1893
  • [8] Enhance the image sharing with steganography and authentication
    Wu, Chia-Chun
    Kao, Shang-Juh
    Kuo, Wen-Chung
    Hwang, Min-Shiang
    2008 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PROCEEDINGS, 2008, : 1177 - +
  • [9] Steganography and image sharing of frobenius numbers
    Chen, Gouxi
    Xu, Yiwei
    Zhang, Meng
    Ma, Qiaomei
    Journal of Computational Information Systems, 2013, 9 (05): : 2067 - 2074
  • [10] IMAGE SHARING WITH STEGANOGRAPHY AND CHEATER IDENTIFICATION
    Tsai, Meng-Hsiun
    Lin, Yang-Bin
    Wang, Chung-Ming
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2010, 6 (3A): : 1165 - 1178