(N, 1) secret sharing approach based on steganography with gray digital images

We present a description of a technique to embed secret data to an image, called information hiding or stegnography. We utilize some simple observed relationships between the binary representation of a pixel, the gray code representation, and the utilization of a simple Exclusive-OR operation based upon N images available to the sender and the receiver, called the cover images. We present the algorithms for embedding the secret data in the altered, last image, N+1, called the stego image; as well as extracting this data on the receiving side. We present some experimental images utilizing two cover images, and one stego image and show that the procedure we propose has a high PSNR value, and an almost identical histogram when compared to the before stego image. We also discuss the robustness of this algorithm under attack methods such as steganalysis.

[1]  Weiming Zhang,et al.  Improving Embedding Efficiency of Covering Codes for Applications in Steganography , 2007, IEEE Communications Letters.

[2]  Ja-Chen Lin,et al.  Secret image sharing , 2002, Comput. Graph..

[3]  Amaury Lendasse,et al.  Reliable Steganalysis Using a Minimum Set of Samples and Features , 2009, EURASIP J. Inf. Secur..

[4]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[5]  Niels Provos,et al.  Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..

[6]  홍유식,et al.  Secret Sharing Scheme using Gray Code based on Steganography , 2009 .

[7]  Andreas Westfeld,et al.  F5—A Steganographic Algorithm High Capacity Despite Better Steganalysis , 2001 .

[8]  Andreas Pfitzmann,et al.  Attacks on Steganographic Systems , 1999, Information Hiding.

[9]  Chang-Chou Lin,et al.  Secret image sharing with steganography and authentication , 2004, J. Syst. Softw..

[10]  Anindya Sarkar,et al.  YASS: Yet Another Steganographic Scheme That Resists Blind Steganalysis , 2007, Information Hiding.

[11]  Andreas Westfeld,et al.  F5-A Steganographic Algorithm , 2001, Information Hiding.

[12]  Chin-Chen Chang,et al.  Sharing Secret Omages using Shadow Codebooks , 1998, Inf. Sci..

[13]  Phil Sallee,et al.  Model-Based Steganography , 2003, IWDW.

[14]  Chin-Chen Chang,et al.  A High Payload Steganographic Scheme Based on (7, 4) Hamming Code for Digital Images , 2008, 2008 International Symposium on Electronic Commerce and Security.

[15]  Jen-Bang Feng,et al.  A new multi-secret images sharing scheme using Largrange's interpolation , 2005, J. Syst. Softw..