Improvements of image sharing with steganography and authentication

نویسندگان

  • Ching-Nung Yang
  • Tse-Shih Chen
  • Kun-Hsuan Yu
  • Chung-Chun Wang
چکیده

Recently, Lin and Tsai proposed an image secret sharing scheme with steganography and authentication to prevent participants from the incidental or intentional provision of a false stego-image (an image containing the hidden secret image). However, dishonest participants can easily manipulate the stego-image for successful authentication but cannot recover the secret image, i.e., compromise the steganography. In this paper, we present a scheme to improve authentication ability that prevents dishonest participants from cheating. The proposed scheme also defines the arrangement of embedded bits to improve the quality of stego-image. Furthermore, by means of the Galois Field GF(2), we improve the scheme to a lossless version without additional pixels. 2006 Elsevier Inc. All rights reserved.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

, and Akwinder Kaur Secret Image Sharing Scheme with Steganography and Authentication Based on Discrete Wavelet Transform

Secret image sharing is a technique to protect the sensitive data. Secret image sharing combined with steganography and transform domain improves authentication ability. The primary objective of the paper is to design a novel algorithm for hiding the secret data in the transform domain. The underlying concept is based on the discrete wavelet transform. A technique comprising of Haar filter and ...

متن کامل

Meaningful Shadows for Image Secret Sharing with Steganography and Authentication Techniques

In this paper, we proposed a lossless secret sharing scheme using a steganography technique to improve the performances of Lin and Tsai’s as well as Yang et al.’s schemes. To ensure the reconstructed image is the true secret image, an authentication mechanism is imported into the proposed scheme to verify whether all the shadows are validated before reconstructing the secret image. In compariso...

متن کامل

A Secret Image Sharing with Deep-steganography and Two-stage Authentication Based on Matrix Encoding

A secret image sharing with deep-steganography and twostage authentication based on matrix encoding is proposed. This scheme firstly employed Wang and Su’s sharing scheme to share a secret image into n shadows. Then, n shadows were embedded into the pre-selected cover images by using matrix encoding so as to generate n stego images. Different from the common schemes which directly use LSBs repl...

متن کامل

A high quality image sharing with steganography and adaptive authentication scheme

With the rapid growth of numerous multimedia applications and communications through Internet, secret image sharing has been becoming a key technology for digital images in secured storage and confidential transmission. However, the stego-images are obtained by directly replacing the least-significant-bit planes (LSB) of cover-images with secret data and authentication code in most schemes, whi...

متن کامل

Steganography and authentication in image sharing without parity bits

Article history: Received 27 March 2011 Received in revised form 10 October 2011 Accepted 1 December 2011 Available online 16 December 2011

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Journal of Systems and Software

دوره 80  شماره 

صفحات  -

تاریخ انتشار 2007