Back to Search Start Over

Sharing secrets in stego images with authentication

Authors :
Chang, Chin-Chen
Hsieh, Yi-Pei
Lin, Chia-Hsuan
Source :
Pattern Recognition. Oct2008, Vol. 41 Issue 10, p3130-3137. 8p.
Publication Year :
2008

Abstract

Abstract: Recently, Lin and Tsai and Yang et al. proposed secret image sharing schemes with steganography and authentication, which divide a secret image into the shadows and embed the produced shadows in the cover images to form the stego images so as to be transmitted to authorized recipients securely. In addition, these schemes also involve their authentication mechanisms to verify the integrity of the stego images such that the secret image can be restored correctly. Unfortunately, these schemes still have two shortcomings. One is that the weak authentication cannot well protect the integrity of the stego images, so the secret image cannot be recovered completely. The other shortcoming is that the visual quality of the stego images is not good enough. To overcome such drawbacks, in this paper, we propose a novel secret image sharing scheme combining steganography and authentication based on Chinese remainder theorem (CRT). The proposed scheme not only improves the authentication ability but also enhances the visual quality of the stego images. The experimental results show that the proposed scheme is superior to the previously existing methods. [Copyright &y& Elsevier]

Details

Language :
English
ISSN :
00313203
Volume :
41
Issue :
10
Database :
Academic Search Index
Journal :
Pattern Recognition
Publication Type :
Academic Journal
Accession number :
32909475
Full Text :
https://doi.org/10.1016/j.patcog.2008.04.006