DWT-SISA: a secure and effective discrete wavelet transform-based secret image sharing with authentication

被引:39
|
作者
Xiong, Lizhi [1 ]
Zhong, Xinwei [1 ]
Yang, Ching-Nung [2 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Sch Comp & Software, Nanjing, Jiangsu, Peoples R China
[2] Natl Dong Hwa Univ, Dept Comp Sci & Informat Engn, Hualien, Taiwan
基金
中国国家自然科学基金;
关键词
Secret image sharing; Data embedding; Authentication; DWT; VISUAL CRYPTOGRAPHY; SCHEME; STEGANOGRAPHY; ENCRYPTION; QUALITY; (T;
D O I
10.1016/j.sigpro.2020.107571
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Recently, Secret Image Sharing (SIS) has attracted more and more researchers' attention, in which a secret image is divided into several shadows for sharing. In practice, the produced shadows are meaningless, and are easy to be attacked if that shadows are directly used in transmission. In order to overcome the shortcoming, the shadows would be embedded into the cover image so as to be transmitted to participants securely. The embedding methods of most schemes are based on Least Significant Bit (LSB) replacement in the spatial domain, however, the embedded data can be easily detected by steganalysis algorithm. Moreover, the embedding capacity, visual quality and security need to be improved. In this paper, a secure and effective Discrete Wavelet Transform-based Secret Image Sharing with Authentication (DWT-SISA) is proposed. In DWT-SISA, the carrier has a better embedding capacity and a better visual quality after embedding. Furthermore, for the sake of solving the issue of cheater prevention, more authentication bits are embedded into the carrier. The experimental results and theoretical analysis show that the proposed scheme is secure and effective. (C) 2020 Elsevier B.V. All rights reserved.
引用
收藏
页数:9
相关论文
共 50 条
  • [1] Integer wavelet transform-based secret image sharing using rook polynomial and hamming code with authentication
    Charoghchi, Sara
    Saeidi, Zahra
    Mashhadi, Samaneh
    CAAI TRANSACTIONS ON INTELLIGENCE TECHNOLOGY, 2024, 9 (06) : 1435 - 1450
  • [2] Secret image sharing scheme with authentication and remedy abilities based on cellular automata and discrete wavelet transform
    Wu, Xiaotian
    Sun, Wei
    JOURNAL OF SYSTEMS AND SOFTWARE, 2013, 86 (04) : 1068 - 1088
  • [3] A scalable secret image sharing method based on discrete wavelet transform
    Kong, Jun
    Zhang, Yanfen
    Meng, Xiangbo
    Zheng, Ying
    Lu, Yinghua
    BIO-INSPIRED COMPUTATIONAL INTELLIGENCE AND APPLICATIONS, 2007, 4688 : 736 - 745
  • [4] DWTAT-DASIS: Fusion of discrete wavelet transform and access tree for distributed authentication in secret image sharing
    Cai, Chuanda
    Peng, Changgen
    Tang, Hanlin
    Xiao, Bin
    Tan, Weijie
    COMPUTER STANDARDS & INTERFACES, 2025, 93
  • [5] Image Inpainting Based on Discrete Wavelet Transform (DWT) Technique
    Trambadia, Smit
    Mayatra, Hemant
    PROCEEDINGS OF 2016 ONLINE INTERNATIONAL CONFERENCE ON GREEN ENGINEERING AND TECHNOLOGIES (IC-GET), 2016,
  • [6] Discrete Wavelet Transform-Based Satellite Image Resolution Enhancement
    Demirel, Hasan
    Anbarjafari, Gholamreza
    IEEE TRANSACTIONS ON GEOSCIENCE AND REMOTE SENSING, 2011, 49 (06): : 1997 - 2004
  • [7] Binary Wavelet Transform-Based Financial Text Image Authentication Algorithm
    Wang, Wenjin
    Lu, Miaomiao
    Dai, Xuanling
    Jiang, Ping
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2024, 58 (03) : 326 - 335
  • [8] Discrete Wavelet Transform based Watermarking for Image Content Authentication
    Ur-Rehman, Obaid
    Zivic, Natasa
    ICPRAM: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION APPLICATIONS AND METHODS, 2017, : 620 - 625
  • [9] DISCRETE WAVELET TRANSFORM-BASED STRUCTURAL SIMILARITY FOR IMAGE QUALITY ASSESSMENT
    Yang, Chun-Ling
    Gao, Wen-Rui
    Po, Lai-Man
    2008 15TH IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOLS 1-5, 2008, : 377 - 380
  • [10] A color image watermarking scheme based on secret sharing and wavelet transform
    Hsieh, Shang-Lin
    Ran, Jh-Jie
    Tsai, I-Ju
    Huang, Bin-Yuan
    2007 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS, VOLS 1-8, 2007, : 2952 - 2957