Cropping and Noise Resilient Steganography Algorithm using Secret Image Sharing

被引:3
作者
Juarez-Sandoval, Oswaldo [1 ]
Fierro-Radilla, Atoany [1 ]
Espejel-Trujillo, Angelina [1 ]
Nakano-Miyatake, Mariko [1 ]
Perez-Meana, Hector [1 ]
机构
[1] Natl Polytech Inst, ESIME Culhuacan, Postgrad Sect, Ciudad Mexico, DF, Mexico
来源
SIXTH INTERNATIONAL CONFERENCE ON GRAPHIC AND IMAGE PROCESSING (ICGIP 2014) | 2015年 / 9443卷
关键词
Steganography; data hiding; Secret image sharing; cropping resilient; modulo operation; Lagrange interpolation;
D O I
10.1117/12.2179745
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
This paper proposes an image steganography scheme, in which a secret image is hidden into a cover image using a secret image sharing (SIS) scheme. Taking advantage of the fault tolerant property of the (k,n)-threshold SIS, where using any k of n shares (k <= n), the secret data can be recovered without any ambiguity, the proposed steganography algorithm becomes resilient to cropping and impulsive noise contamination. Among many SIS schemes proposed until now, Lin and Chan's scheme is selected as SIS, due to its lossless recovery capability of a large amount of secret data. The proposed scheme is evaluated from several points of view, such as imperceptibility of the stegoimage respect to its original cover image, robustness of hidden data to cropping operation and impulsive noise contamination. The evaluation results show a high quality of the extracted secret image from the stegoimage when it suffered more than 20% cropping or high density noise contamination.
引用
收藏
页数:7
相关论文
共 10 条
[1]   New image steganographic methods using run-length approach [J].
Chang, Chin-Chen ;
Lin, Chih-Yang ;
Wang, Yu-Zheng .
INFORMATION SCIENCES, 2006, 176 (22) :3393-3408
[2]   Digital image steganography: Survey and analysis of current methods [J].
Cheddad, Abbas ;
Condell, Joan ;
Curran, Kevin ;
Mc Kevitt, Paul .
SIGNAL PROCESSING, 2010, 90 (03) :727-752
[3]   A verifiable multi-secret sharing scheme based on cellular automata [J].
Eslami, Z. ;
Ahmadabadi, J. Zarepour .
INFORMATION SCIENCES, 2010, 180 (15) :2889-2894
[4]   A hierarchical threshold secret image sharing [J].
Guo, Cheng ;
Chang, Chin-Chen ;
Qin, Chuan .
PATTERN RECOGNITION LETTERS, 2012, 33 (01) :83-91
[5]   A steganographic method based upon JPEG and particle swarm optimization algorithm [J].
Li, Xiaoxia ;
Wang, Jianjun .
INFORMATION SCIENCES, 2007, 177 (15) :3099-3109
[6]   Invertible secret image sharing with steganography [J].
Lin, Pei-Yu ;
Chan, Chi-Shiang .
PATTERN RECOGNITION LETTERS, 2010, 31 (13) :1887-1893
[7]   Scalable Secret Image Sharing With Smaller Shadow Images [J].
Lin, Yung-Yi ;
Wang, Ran-Zan .
IEEE SIGNAL PROCESSING LETTERS, 2010, 17 (03) :316-319
[8]   Application of bit-plane decomposition steganography to JPEG2000 encoded images [J].
Noda, H ;
Spaulding, J ;
Shirazi, MN ;
Kawaguchi, E .
IEEE SIGNAL PROCESSING LETTERS, 2002, 9 (12) :410-413
[9]   HOW TO SHARE A SECRET [J].
SHAMIR, A .
COMMUNICATIONS OF THE ACM, 1979, 22 (11) :612-613
[10]   BPCS steganography using EZW lossy compressed images [J].
Spaulding, J ;
Noda, H ;
Shirazi, MN ;
Kawaguchi, E .
PATTERN RECOGNITION LETTERS, 2002, 23 (13) :1579-1587