A Secret Image Sharing with Deep-steganography and Two-stage Authentication Based on Matrix Encoding
نویسندگان
چکیده
A secret image sharing with deep-steganography and twostage authentication based on matrix encoding is proposed. This scheme firstly employed Wang and Su’s sharing scheme to share a secret image into n shadows. Then, n shadows were embedded into the pre-selected cover images by using matrix encoding so as to generate n stego images. Different from the common schemes which directly use LSBs replacement, our scheme performs deepsteganography, which hides 3-bit secret data but only modifies at most 1-bit via matrix encoding. Benefiting from the comparatively slight modification to the cover image, our scheme obtains enhancement in both the security of secret data and the visual quality of the stego image. As far as the authentication ability is concerned, our scheme explores a two-stage authentication: the first uses a sub-key to pass identity authentication, and the second performs tamper authentication. The experimental results show that our scheme achieves better authentication ability than the referenced schemes.
منابع مشابه
Steganography Scheme Based on Reed-Muller Code with Improving Payload and Ability to Retrieval of Destroyed Data for Digital Images
In this paper, a new steganography scheme with high embedding payload and good visual quality is presented. Before embedding process, secret information is encoded as block using Reed-Muller error correction code. After data encoding and embedding into the low-order bits of host image, modulus function is used to increase visual quality of stego image. Since the proposed method is able to embed...
متن کامل, and Akwinder Kaur Secret Image Sharing Scheme with Steganography and Authentication Based on Discrete Wavelet Transform
Secret image sharing is a technique to protect the sensitive data. Secret image sharing combined with steganography and transform domain improves authentication ability. The primary objective of the paper is to design a novel algorithm for hiding the secret data in the transform domain. The underlying concept is based on the discrete wavelet transform. A technique comprising of Haar filter and ...
متن کاملA New Hybrid Method for Colored Image Steganography Based On DWT
Data transmission security has become an extremely important field of research. Steganography is an art of hiding information in image, audio and video files in a way that would meet the security requirements in the form of overt or covert. In this study, we propose a new hybrid steganography technique for color images that hide secret messages in the frequency domain of a cover image's blu...
متن کاملMeaningful Shadows for Image Secret Sharing with Steganography and Authentication Techniques
In this paper, we proposed a lossless secret sharing scheme using a steganography technique to improve the performances of Lin and Tsai’s as well as Yang et al.’s schemes. To ensure the reconstructed image is the true secret image, an authentication mechanism is imported into the proposed scheme to verify whether all the shadows are validated before reconstructing the secret image. In compariso...
متن کاملSurvey of Cheating Prevention Techniques in Visual Cryptography
Visual cryptography (VC) is a technique of encoding a secret image into share images such that stacking a sufficient number of shares reveals the original secret image. Shares are generally presented in transparencies. So each participant holds a transparency. The original secret image is recovered after superimposing the transparencies one to other. Basically, the performance of visual cryptog...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- I. J. Network Security
دوره 19 شماره
صفحات -
تاریخ انتشار 2017