Secret image sharing based on cellular automata and steganography

被引:75
作者
Eslami, Z. [1 ]
Razzaghi, S. H. [1 ]
Ahmadabadi, J. Zarepour [1 ]
机构
[1] Shahid Beheshti Univ, Dept Comp Sci, GC, Tehran, Iran
关键词
Secret sharing scheme; Linear memory cellular automata; Digital signature; Authentication; Verifiability; SCHEME; SUBSTITUTION;
D O I
10.1016/j.patcog.2009.06.007
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Recently Lin and Tsai [Secret image sharing with steganography and authentication, The journal of Systems and Software 73 (2004) 405-414] and Yang et al. [Improvements of image sharing with steganography and authentication, The journal of Systems and Software 80 (2007) 1070-1076] proposed secret image sharing schemes combining steganography and authentication based on Shamir's polynomials. The schemes divide a secret image into some shadows which are then embedded in cover images in order to produce stego images for distributing among participants. To achieve better authentication ability Chang et al. [Sharing secrets in stego images with authentication, Pattern Recognition 41 (2008) 3130-3137] proposed in 2008 an improved scheme which enhances the visual quality of the stego images as well and the probability of successful verification for a fake stego block is 1/16. In this paper, we employ linear cellular automata, digital signatures, and hash functions to propose a novel (t, n)-threshold image sharing scheme with steganographic properties in which a double authentication mechanism is introduced which can detect tampering with probability 255/256. Employing cellular automata instead of Shamir's polynomials not only improves computational complexity from O(n log(2) n) to 0(n) but obviates the need to modify pixels of cover images unnecessarily. Compared to previous methods [C. Lin, W. Tsai, Secret image sharing with steganography and authentication, The journal of Systems and Software 73 (2004) 405-414; C. Yang, T. Chen, K. Yu, C. Wang, Improvements of image sharing with steganography and authentication, The journal of Systems and Software 80 (2007) 1070-1076; C. Chang, Y. Hsieh, C. Lin, Sharing secrets in stego images with authentication, Pattern Recognition 41 (2008) 3130-3137), we use fewer number of bits in each pixel of cover images for embedding data so that a better visual quality is guaranteed. We further present some experimental results. (C) 2009 Elsevier Ltd. All rights reserved.
引用
收藏
页码:397 / 404
页数:8
相关论文
共 27 条
[1]  
Aho A. V., 1974, The design and analysis of computer algorithms
[2]   Reversible cellular automata with memory: two-dimensional patterns from a single site seed [J].
Alonso-Sanz, R .
PHYSICA D-NONLINEAR PHENOMENA, 2003, 175 (1-2) :1-30
[3]  
Blakley G.R., 1979, INT WORKSH MAN REQ K, DOI [10.1109/MARK.1979.8817296, DOI 10.1109/MARK.1979.8817296]
[4]   Hiding data in images by simple LSB substitution [J].
Chan, CK ;
Cheng, LM .
PATTERN RECOGNITION, 2004, 37 (03) :469-474
[5]   A steganographic method based upon JPEG and quantization table modification [J].
Chang, CC ;
Chen, TS ;
Chung, LZ .
INFORMATION SCIENCES, 2002, 141 (1-2) :123-138
[6]   Image hiding scheme with modulus function and dynamic programming strategy on partitioned pixels [J].
Chang, CC ;
Chan, CS ;
Fan, YH .
PATTERN RECOGNITION, 2006, 39 (06) :1155-1167
[7]   Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy [J].
Chang, CC ;
Hsiao, JY ;
Chan, CS .
PATTERN RECOGNITION, 2003, 36 (07) :1583-1595
[8]   Sharing secrets in stego images with authentication [J].
Chang, Chin-Chen ;
Hsieh, Yi-Pei ;
Lin, Chia-Hsuan .
PATTERN RECOGNITION, 2008, 41 (10) :3130-3137
[9]   A secret sharing scheme based on cellular automata [J].
del Rey, AM ;
Mateus, JP ;
Sánchez, GR .
APPLIED MATHEMATICS AND COMPUTATION, 2005, 170 (02) :1356-1364
[10]   Exploring steganography: Seeing the unseen [J].
Johnson, NF ;
Jajodia, S .
COMPUTER, 1998, 31 (02) :26-+