A secure image sharing scheme with high quality stego-images based on steganography

被引:27
作者
He, Junhui [1 ]
Lan, Weiqiang [1 ]
Tang, Shaohua [1 ]
机构
[1] South China Univ Technol, Sch Comp Sci & Engn, Guangzhou Higher Educ Mega Ctr, Guangzhou 510006, Guangdong, Peoples R China
基金
中国国家自然科学基金;
关键词
Image sharing; Steganography; LOCO-I compression; Message authentication code; Dynamic embedding; SECRET; AUTHENTICATION;
D O I
10.1007/s11042-016-3429-8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Image sharing can be utilized to protect important commercial, military or private images against a single point of failure. Many existing image sharing schemes may have one or more of the security weaknesses as follows: First, noise-like image shares may easily arouse the attackers' attention; Second, cheating in the recovery of the secret image cannot be prevented effectively; Third, the requisite size of cover images may be very large; Finally, poor quality of the stego-images may lessen camouflage effects. In this paper, a novel secure image sharing scheme with high quality stego-images is proposed. With the use of LOCO-I compression as a preprocessing approach, the statistical correlations between neighboring pixels of a secret image drop significantly, which may greatly enhance the visual security of the proposed scheme. And the necessary size of cover images is reduced. Moreover, the PSNR values of stego-images are much higher than the related works. In order to detect three kinds of deception during secret image reconstruction, the hash-based message authentication codes of an image share, the value of argument x and the identity ID of a participant are embedded into a cover image together with the image share. In addition, the application of dynamic embedding with a random strategy further enhance the security of our scheme.
引用
收藏
页码:7677 / 7698
页数:22
相关论文
共 28 条
[1]   A multisecret sharing scheme for color images based on cellular automata [J].
Alvarez, G. ;
Encinas, L. Hernandez ;
del Rey, A. Martin .
INFORMATION SCIENCES, 2008, 178 (22) :4382-4395
[2]  
[Anonymous], 1979, P AFIPS NAT COMP C N
[3]  
[Anonymous], 1 INT C PERV COMP SI
[4]  
[Anonymous], 2014, J INFORM HIDING MULT
[5]  
Chan CS, 2012, INT J INNOV COMPUT I, V8, P375
[6]   Hiding data in images by simple LSB substitution [J].
Chan, CK ;
Cheng, LM .
PATTERN RECOGNITION, 2004, 37 (03) :469-474
[7]   Sharing secrets in stego images with authentication [J].
Chang, Chin-Chen ;
Hsieh, Yi-Pei ;
Lin, Chia-Hsuan .
PATTERN RECOGNITION, 2008, 41 (10) :3130-3137
[8]  
Chen C.R. J., 2015, Multimedia Tools and Applications, P1
[9]   Secret image sharing with authentication-chaining and dynamic embedding [J].
Eslami, Z. ;
Ahmadabadi, J. Zarepour .
JOURNAL OF SYSTEMS AND SOFTWARE, 2011, 84 (05) :803-809
[10]  
Gloe T., 2010, P 2010 ACM S APPL CO, V2, P1585, DOI [DOI 10.1145/1774088.1774427, DOI 10.1080/15567281.2010.531500]