(N, 1) Secret Sharing Approach Based on Steganography with Gray Digital Images

被引:4
作者
Baek, Jinsuk [1 ]
Kim, Cheonshik [2 ]
Fisher, Paul S. [1 ]
Chao, Hongyang [3 ]
机构
[1] Winston Salem State Univ, Dept Comp Sci, Winston Salem, NC 27110 USA
[2] Sejong Univ, Dept Comp Engn, Seoul, South Korea
[3] Sun Yet Sen Univ, Sch Software, Guangzhou, Guangdong, Peoples R China
来源
2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1 | 2010年
关键词
steganography; information hiding; secret sharing;
D O I
10.1109/WCINS.2010.5541793
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present a description of a technique to embed secret data to an image, called information hiding or stegnography. We utilize some simple observed relationships between the binary representation of a pixel, the gray code representation, and the utilization of a simple Exclusive-OR operation based upon N images available to the sender and the receiver, called the cover images. We present the algorithms for embedding the secret data in the altered, last image, N+1, called the stego image; as well as extracting this data on the receiving side. We present some experimental images utilizing two cover images, and one stego image and show that the procedure we propose has a high PSNR value, and an almost identical histogram when compared to the before stego image. We also discuss the robustness of this algorithm under attack methods such as steganalysis.
引用
收藏
页码:325 / +
页数:2
相关论文
共 14 条
[1]  
[Anonymous], 2001, PROC INFORM HIDING
[2]   Sharing secret images using shadow codebooks [J].
Chang, CC ;
Hwang, RJ .
INFORMATION SCIENCES, 1998, 111 (1-4) :335-345
[3]   A High Payload Steganographic Scheme Based on (7,4) Hamming Code for Digital Images [J].
Chang, Chin-Chen ;
Kieu, The Duc ;
Chou, Yung-Chen .
PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, 2008, :16-+
[4]   A new multi-secret images sharing scheme using Largrange's interpolation [J].
Feng, JB ;
Wu, HC ;
Tsai, CS ;
Chu, YP .
JOURNAL OF SYSTEMS AND SOFTWARE, 2005, 76 (03) :327-339
[5]   Secret image sharing with steganography and authentication [J].
Lin, CC ;
Tsai, WH .
JOURNAL OF SYSTEMS AND SOFTWARE, 2004, 73 (03) :405-414
[6]   Reliable steganalysis using a minimum set of samples and features [J].
Miche Y. ;
Bas P. ;
Lendasse A. ;
Jutten C. ;
Simula O. .
EURASIP Journal on Information Security, 2009 (1)
[7]  
Provos N., 2003, IEEE Security & Privacy, V1, P32, DOI 10.1109/MSECP.2003.1203220
[8]  
Sallee P, 2004, LECT NOTES COMPUT SC, V2939, P154
[9]   HOW TO SHARE A SECRET [J].
SHAMIR, A .
COMMUNICATIONS OF THE ACM, 1979, 22 (11) :612-613
[10]  
김천식, 2009, [Computer and Information, 전자공학회논문지 - CI], V46, P96