A high quality image sharing with steganography and adaptive authentication scheme

With the rapid growth of numerous multimedia applications and communications through Internet, secret image sharing has been becoming a key technology for digital images in secured storage and confidential transmission. However, the stego-images are obtained by directly replacing the least-significant-bit planes (LSB) of cover-images with secret data and authentication code in most schemes, which will result in the distortion of the stego-images. In this paper, we proposed a novel secret image sharing scheme by applying optimal pixel adjustment process to enhance the image quality under different payload capacity and various authentication bits conditions. The experimental results showed that the proposed scheme has improved the image quality of stego images by 4.71%, 9.29%, and 11.10%, as compared with the schemes recently proposed by Yang et al., Chang et al., and Lin and Tsai. We also provide several experiments to demonstrate the efficacy of authentication capability of the proposed scheme. In other words, our scheme maintains the secret image sharing and authentication ability while enhances the image quality.

[1]  Ching-Nung Yang,et al.  Improvements of image sharing with steganography and authentication , 2007, J. Syst. Softw..

[2]  Deepa Kundur,et al.  Digital watermarking for telltale tamper proofing and authentication , 1999, Proc. IEEE.

[3]  K-C Liaoa,et al.  Security of fragile watermarking scheme for image authentication , 2006 .

[4]  L. Harn,et al.  Comment on "Multistage secret sharing based on one-way function" , 1995 .

[5]  Chin-Chen Chang,et al.  A secure fragile watermarking scheme based on chaos-and-hamming code , 2011, J. Syst. Softw..

[6]  Moni Naor,et al.  Visual Cryptography , 1994, Encyclopedia of Multimedia.

[7]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[8]  Alan T. Sherman,et al.  Key Establishment in Large Dynamic Groups Using One-Way Function Trees , 2003, IEEE Trans. Software Eng..

[9]  Ja-Chen Lin,et al.  A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function , 2003, Pattern Recognit..

[10]  Claudio Soriente,et al.  Taking advantages of a disadvantage: Digital forensics and steganography using document metadata , 2007, J. Syst. Softw..

[11]  Ja-Chen Lin,et al.  Secret image sharing , 2002, Comput. Graph..

[12]  J. He,et al.  Multisecret-sharing scheme based on one-way function , 1995 .

[13]  Shang-Juh Kao,et al.  Enhance the Image Sharing with Steganography and Authentication , 2008, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[14]  Lee-Ming Cheng,et al.  Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..

[15]  Chang-Chou Lin,et al.  Secret image sharing with steganography and authentication , 2004, J. Syst. Softw..

[16]  F. Chung,et al.  Fragile watermarking scheme for image authentication , 2003 .

[17]  Zhenxing Qian,et al.  Reference Sharing Mechanism for Watermark Self-Embedding , 2011, IEEE Transactions on Image Processing.

[18]  Iuon-Chang Lin,et al.  Reversible Watermarking: Current Status and Key Issues , 2006, Int. J. Netw. Secur..

[19]  Ching-Nung Yang,et al.  A comment on "Sharing secrets in stegoimages with authentication" , 2009, Pattern Recognit..

[20]  Ran-Zan Wang,et al.  Secret image sharing with smaller shadow images , 2006, Pattern Recognit. Lett..

[21]  Claudio Soriente,et al.  Security and privacy issues in the Portable Document Format , 2010, J. Syst. Softw..

[22]  Chin-Chen Chang,et al.  Sharing secrets in stego images with authentication , 2008, Pattern Recognit..

[23]  Wei-Bin Lee,et al.  A public verifiable copy protection technique for still images , 2002, J. Syst. Softw..

[24]  Shang-Juh Kao,et al.  A Robust-Fragile Watermarking Scheme for Image Authentication , 2008, 2008 3rd International Conference on Innovative Computing Information and Control.

[25]  Ziba Eslami,et al.  Secret image sharing with authentication-chaining and dynamic embedding , 2011, J. Syst. Softw..

[26]  Min-Shiang Hwang,et al.  Data Hiding: Current Status and Key Issues , 2007, Int. J. Netw. Secur..

[27]  Wei-Pang Yang,et al.  A new multi-stage secret sharing scheme using one-way function , 2005, OPSR.

[28]  Chin-Chen Chang,et al.  A watermarking technique based on one-way hash functions , 1999, IEEE Trans. Consumer Electron..

[29]  Chaur-Heh Hsieh,et al.  Progressive sharing for a secret image , 2010, J. Syst. Softw..

[30]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[31]  Ja-Chen Lin,et al.  An image-sharing method with user-friendly shadow images , 2003, IEEE Trans. Circuits Syst. Video Technol..

[32]  Min-Shiang Hwang,et al.  A high quality steganographic method with pixel-value differencing and modulus function , 2008, J. Syst. Softw..

[33]  Vasif V. Nabiyev,et al.  Medical image security and EPR hiding using Shamir's secret sharing scheme , 2011, J. Syst. Softw..

[34]  Chin-Feng Lee,et al.  A novel data hiding scheme based on modulus function , 2010, J. Syst. Softw..