Back to Search
Start Over
Sharing secrets in stego images with authentication
- Source :
-
Pattern Recognition . Oct2008, Vol. 41 Issue 10, p3130-3137. 8p. - Publication Year :
- 2008
-
Abstract
- Abstract: Recently, Lin and Tsai and Yang et al. proposed secret image sharing schemes with steganography and authentication, which divide a secret image into the shadows and embed the produced shadows in the cover images to form the stego images so as to be transmitted to authorized recipients securely. In addition, these schemes also involve their authentication mechanisms to verify the integrity of the stego images such that the secret image can be restored correctly. Unfortunately, these schemes still have two shortcomings. One is that the weak authentication cannot well protect the integrity of the stego images, so the secret image cannot be recovered completely. The other shortcoming is that the visual quality of the stego images is not good enough. To overcome such drawbacks, in this paper, we propose a novel secret image sharing scheme combining steganography and authentication based on Chinese remainder theorem (CRT). The proposed scheme not only improves the authentication ability but also enhances the visual quality of the stego images. The experimental results show that the proposed scheme is superior to the previously existing methods. [Copyright &y& Elsevier]
- Subjects :
- *CRYPTOGRAPHY
*AUTHENTICATION (Law)
*PAPER
*RELIABILITY (Personality trait)
Subjects
Details
- Language :
- English
- ISSN :
- 00313203
- Volume :
- 41
- Issue :
- 10
- Database :
- Academic Search Index
- Journal :
- Pattern Recognition
- Publication Type :
- Academic Journal
- Accession number :
- 32909475
- Full Text :
- https://doi.org/10.1016/j.patcog.2008.04.006