Reversible data hiding based on histogram and prediction error for sharing secret data

被引:2
作者
Islamy, Chaidir Chalaf [1 ]
Ahmad, Tohari [1 ]
Ijtihadie, Royyana Muslim [1 ]
机构
[1] Inst Teknol Sepuluh Nopember ITS, Dept Informat, Kampus ITS Keputih Sukolilo, Surabaya 60111, Indonesia
关键词
Data hiding; Secret image sharing; Prediction error expansion; Histogram-based embedding; Network infrastructure;
D O I
10.1186/s42400-023-00147-y
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the advancement of communication technology, a large number of data are constantly transmitted through the internet for various purposes, which are prone to be illegally accessed by third parties. Therefore, securing such data is crucial to protect the transmitted information from falling into the wrong hands. Among data protection schemes, Secret Image Sharing is one of the most popular methods. It protects critical messages or data by embedding them in an image and sharing it with some users. Furthermore, it combines the security concepts in that private data are embedded into a cover image and then secured using the secret-sharing method. Despite its advantages, this method may produce noise, making the resulting stego file much different from its cover. Moreover, the size of private data that can be embedded is limited. This research works on these problems by utilizing prediction-error expansion and histogram-based approaches to embed the data. To recover the cover image, the SS method based on the Chinese remainder theorem is used. The experimental results indicate that this proposed method performs better than similar methods in several cover images and scenarios.
引用
收藏
页数:14
相关论文
共 43 条
[1]  
Ahmad T, 2014, 2014 INTERNATIONAL CONFERENCE ON COMPUTER, CONTROL, INFORMATICS AND ITS APPLICATIONS (IC3INA), P87, DOI 10.1109/IC3INA.2014.7042606
[2]  
AL Huti MHA, 2015, INT CONF INFORM COMM, P225, DOI 10.1109/ICTS.2015.7379903
[3]   Securing matrix counting-based secret-sharing involving crypto steganography [J].
Al-Shaarani, Faiza ;
Gutub, Adnan .
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (09) :6909-6924
[4]  
[Anonymous], 2021, USC SIPI SIPI
[5]  
Ardiansyah G, 2017, 2017 2ND INTERNATIONAL CONFERENCES ON INFORMATION TECHNOLOGY, INFORMATION SYSTEMS AND ELECTRICAL ENGINEERING (ICITISEE), P249, DOI 10.1109/ICITISEE.2017.8285505
[6]  
Chaidir chalaf islamy, 2022, ICIC Express Letters, V16, P307, DOI 10.24507/icicel.16.03.307
[7]   High capacity reversible data hiding scheme based on residual histogram shifting for block truncation coding [J].
Chang, I-Cheng ;
Hu, Yu-Chen ;
Chen, Wu-Lin ;
Lo, Chun-Chi .
SIGNAL PROCESSING, 2015, 108 :376-388
[8]   Digital image steganography: Survey and analysis of current methods [J].
Cheddad, Abbas ;
Condell, Joan ;
Curran, Kevin ;
Mc Kevitt, Paul .
SIGNAL PROCESSING, 2010, 90 (03) :727-752
[9]  
Department of Informatics Institut Teknologi Sepuluh Nopember Kampus ITS Surabaya 60111 Indonesia, 2018, Journal of Communications, P325, DOI 10.12720/jcm.13.6.325-332
[10]   Local-Prediction-Based Difference Expansion Reversible Watermarking [J].
Dragoi, Ioan-Catalin ;
Coltuc, Dinu .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2014, 23 (04) :1779-1790