Improvements of image sharing with steganography and authentication
نویسندگان
چکیده
Recently, Lin and Tsai proposed an image secret sharing scheme with steganography and authentication to prevent participants from the incidental or intentional provision of a false stego-image (an image containing the hidden secret image). However, dishonest participants can easily manipulate the stego-image for successful authentication but cannot recover the secret image, i.e., compromise the steganography. In this paper, we present a scheme to improve authentication ability that prevents dishonest participants from cheating. The proposed scheme also defines the arrangement of embedded bits to improve the quality of stego-image. Furthermore, by means of the Galois Field GF(2), we improve the scheme to a lossless version without additional pixels. 2006 Elsevier Inc. All rights reserved.
منابع مشابه
, and Akwinder Kaur Secret Image Sharing Scheme with Steganography and Authentication Based on Discrete Wavelet Transform
Secret image sharing is a technique to protect the sensitive data. Secret image sharing combined with steganography and transform domain improves authentication ability. The primary objective of the paper is to design a novel algorithm for hiding the secret data in the transform domain. The underlying concept is based on the discrete wavelet transform. A technique comprising of Haar filter and ...
متن کاملMeaningful Shadows for Image Secret Sharing with Steganography and Authentication Techniques
In this paper, we proposed a lossless secret sharing scheme using a steganography technique to improve the performances of Lin and Tsai’s as well as Yang et al.’s schemes. To ensure the reconstructed image is the true secret image, an authentication mechanism is imported into the proposed scheme to verify whether all the shadows are validated before reconstructing the secret image. In compariso...
متن کاملA Secret Image Sharing with Deep-steganography and Two-stage Authentication Based on Matrix Encoding
A secret image sharing with deep-steganography and twostage authentication based on matrix encoding is proposed. This scheme firstly employed Wang and Su’s sharing scheme to share a secret image into n shadows. Then, n shadows were embedded into the pre-selected cover images by using matrix encoding so as to generate n stego images. Different from the common schemes which directly use LSBs repl...
متن کاملA high quality image sharing with steganography and adaptive authentication scheme
With the rapid growth of numerous multimedia applications and communications through Internet, secret image sharing has been becoming a key technology for digital images in secured storage and confidential transmission. However, the stego-images are obtained by directly replacing the least-significant-bit planes (LSB) of cover-images with secret data and authentication code in most schemes, whi...
متن کاملSteganography and authentication in image sharing without parity bits
Article history: Received 27 March 2011 Received in revised form 10 October 2011 Accepted 1 December 2011 Available online 16 December 2011
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Journal of Systems and Software
دوره 80 شماره
صفحات -
تاریخ انتشار 2007