Steganography based image sharing with reversibility

被引:10
|
作者
Sirisha, B. Lakshmi [1 ]
Kumar, S. Srinivas [2 ]
Mohan, B. Chandra [3 ]
机构
[1] Jawaharlal Nehru Technol Univ, Kakinada 533003, Andhra Pradesh, India
[2] Jawaharlal Nehru Technol Univ, Dept ECE, Kakinada 533003, Andhra Pradesh, India
[3] Bapatla Engn Coll, Dept ECE, Bapatla 522101, Andhra Pradesh, India
来源
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY | 2016年 / 19卷 / 01期
关键词
Image hiding; Image processing; Modulus operation; Reversibility; Steganography; Visual secret sharing;
D O I
10.1080/09720529.2015.1086109
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Steganography is an art of hiding secret information in another information. The use of steganography is to maintain a covert communication between two parties. A (t, n) threshold secret sharing scheme is one popular method of implementing steganography. In this method, the secret image is distributed among n participants. Any t (or more) out of n authorized participants can recover the secret image and less than t participants cannot recover the secret image. In the proposed method, both secret and cover images are retrieved without any loss of information is called reversibility. The shadows can be successfully embedded in the cover image. The resulting stego images are visually good. Various image quality metrics are used to assess the quality of the stego images. The proposed scheme is efficient in terms of embedding capacity and is computationally faster compared to Pei-y.u et al., and other methods.
引用
收藏
页码:67 / 80
页数:14
相关论文
共 50 条
  • [21] A secure image sharing scheme with high quality stego-images based on steganography
    He, Junhui
    Lan, Weiqiang
    Tang, Shaohua
    MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (06) : 7677 - 7698
  • [22] Hiding shares by multimedia image steganography for optimized counting-based secret sharing
    Gutub, Adnan
    Al-Ghamdi, Maimoona
    MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (11-12) : 7951 - 7985
  • [23] A (t,n)- Secret image sharing with steganography based on Rook polynomial and LWE problem
    Samaneh Mashhadi
    Zahra Saeedi
    Multimedia Tools and Applications, 2023, 82 : 39077 - 39097
  • [24] A (t,n)- Secret image sharing with steganography based on Rook polynomial and LWE problem
    Mashhadi, Samaneh
    Saeedi, Zahra
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (25) : 39077 - 39097
  • [25] Meaningful Secret Image Sharing Scheme with High Visual Quality Based on Natural Steganography
    Sun, Yuyuan
    Lu, Yuliang
    Chen, Jinrui
    Zhang, Weiming
    Yan, Xuehu
    MATHEMATICS, 2020, 8 (09)
  • [26] A secure image sharing scheme with high quality stego-images based on steganography
    Junhui He
    Weiqiang Lan
    Shaohua Tang
    Multimedia Tools and Applications, 2017, 76 : 7677 - 7698
  • [27] Hiding shares by multimedia image steganography for optimized counting-based secret sharing
    Adnan Gutub
    Maimoona Al-Ghamdi
    Multimedia Tools and Applications, 2020, 79 : 7951 - 7985
  • [28] Secret image sharing using grayscale payload decomposition and irreversible image steganography
    Chakraborty, Soumendu
    Jalal, Anand Singh
    Bhatnagar, Charul
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2013, 18 (04) : 180 - 192
  • [29] Steganography Based on Image Morphing
    Zhao, Qiangfu
    Kunii, Tosiyasu L.
    2013 INTERNATIONAL JOINT CONFERENCE ON AWARENESS SCIENCE AND TECHNOLOGY & UBI-MEDIA COMPUTING (ICAST-UMEDIA), 2013, : 157 - +
  • [30] A high quality image sharing with steganography and adaptive authentication scheme
    Wu, Chia-Chun
    Kao, Shang-Juh
    Hwang, Min-Shiang
    JOURNAL OF SYSTEMS AND SOFTWARE, 2011, 84 (12) : 2196 - 2207