A Novel Method for Distributed Image Steganography

被引:0
作者
Choudhury, Bismita [1 ]
Das, Rig [2 ]
Tuithung, Themrichon [3 ]
机构
[1] Don Bosco Coll Engn & Technol, Dept Comp Sci & Engn & Informat Technol, Gauhati 781017, Assam, India
[2] Natl Inst Technol, Dept Comp Sci & Engn, Rourkela 769008, Orissa, India
[3] Deemed Univ, North Eastern Reg Inst Sci & Technol, Dept Comp Sci & Engn, Itanagar 791109, Arunachal Prade, India
来源
ADVANCED COMPUTER AND COMMUNICATION ENGINEERING TECHNOLOGY | 2015年 / 315卷
关键词
Steganography; Distributed image steganography; PSNR; Shamir's secret sharing scheme;
D O I
10.1007/978-3-319-07674-4_58
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Distributed Image Steganography (DIS) is a new method of concealing secret information in several host images, leaving smaller traces than conventional steganographic techniques and requiring a collection of affected images for secret information retrieval. DIS, compared to other conventional steganographic techniques, can improve security and information hiding capacity because DIS leaves reduced signatures of hidden information in host images. This paper presents a novel technique for Distributed Image Steganography based on Shamir's (k, n) threshold based secret sharing scheme. An 8-bit, gray level, Secret Image of size P x Q is divided into several sections and embedded inside n-Cover Images of size M x N and only k-Stego Images (k <= n) are required to retrieve the secret image. The size of the secret image is also embedded inside every cover images, so that the stego images become standalone information to the receiver. Experimental result shows that the proposed novel method has high capacity and good invisibility.
引用
收藏
页码:615 / 625
页数:11
相关论文
共 9 条
  • [1] Bai L., 2007, 10 INT C INF FUS 9 1
  • [2] Digital image steganography: Survey and analysis of current methods
    Cheddad, Abbas
    Condell, Joan
    Curran, Kevin
    Mc Kevitt, Paul
    [J]. SIGNAL PROCESSING, 2010, 90 (03) : 727 - 752
  • [3] Das R., 2012, 3 IEEE NAT C EM TREN
  • [4] Filler T, 2010, IEEE INT WORKS INFOR
  • [5] Jhonson N.F., 1998, IEEE FEB
  • [6] Li B, 2011, J. Inf. Hiding Multim. Signal Process., V2, P142
  • [7] Provos N., 2003, IEEE Security & Privacy, V1, P32, DOI 10.1109/MSECP.2003.1203220
  • [8] HOW TO SHARE A SECRET
    SHAMIR, A
    [J]. COMMUNICATIONS OF THE ACM, 1979, 22 (11) : 612 - 613
  • [9] Thien CC, 2002, COMPUT GRAPH-UK, V26, P766