A data hiding method based on information sharing via PNG images for applications of color image authentication and metadata embedding

نویسندگان

  • Che-Wei Lee
  • Wen-Hsiang Tsai
چکیده

A new data hiding method via PNG images based on Shamir’s (k, n)-threshold secret sharing scheme is proposed. The coefficients of the polynomial used by the Shamir’s method are taken as carriers to carry given data. The data to be hidden then are transformed into partial shares and embedded into the alpha-channel plane of a cover PNG image. Undesired white noise created in the resulting stego-image is removed by skillfully mapping the computed share values into suitable ranges in the embedding process. An important application of the proposed method to color image authentication is also proposed, with detailed authentication algorithms for PNG images presented. Compared with existing methods, the proposed image authentication method possesses the merits of losslessness during image authentication, high sensitivity to image alterations, good tampering localization capability, and very low false acceptance and rejection ratios. Experimental results proving the effectiveness of the proposed methods are also included. & 2013 Elsevier B.V. All rights reserved.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Authentication and Recovery method for color Images

With Fast Advance Of Digital Technology Image Processing Is The Fastest Growing Area Of Research And Development. Sharing The Data And Authenticate The Same Is The Big Challenges Now A Days. To Overcome The Problem Of Pretending The Documents As Well As Image As On His /Her Name, We Invent The New Method Of An Authentication And Recovery Of Color Tampered Image Using Secure Shamir Secret Sharin...

متن کامل

Authentication of Gray Scale Document Images via the Use of PNG Image with Data Repairing

A new authentication method based on the secret sharing technique along with a data repairing capability for gray scale document images via the use of PNG (portable network graphics) is proposed. An authentication signal is generated for every and each block of a gray-scale document image, which, in conjunction with the binarized block content, is remodeled into many shares exploitation the Sha...

متن کامل

A survey on digital data hiding schemes: principals, algorithms, and applications

This paper investigates digital data hiding schemes. The concept of information hiding will be explained at first, and its traits, requirements, and applications will be described subsequently. In order to design a digital data hiding system, one should first become familiar with the concepts and criteria of information hiding. Having knowledge about the host signal, which may be audio, image, ...

متن کامل

Authentication of Grayscale Images and Data Repairing Using Secret Sharing Method

Digital images are used to safeguard confidential & important information. But the problem is providing authentication, integrity and data security to these digital images. In existing techniques of security and authentication conventional watermarking schemes are used. In these techniques cryptography is the basic method adopted which has problem of tampering of information easily by hackers. ...

متن کامل

Steganography Scheme Based on Reed-Muller Code with Improving Payload and Ability to Retrieval of Destroyed Data for Digital Images

In this paper, a new steganography scheme with high embedding payload and good visual quality is presented. Before embedding process, secret information is encoded as block using Reed-Muller error correction code. After data encoding and embedding into the low-order bits of host image, modulus function is used to increase visual quality of stego image. Since the proposed method is able to embed...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Signal Processing

دوره 93  شماره 

صفحات  -

تاریخ انتشار 2013