Communications of the ACM
Secret image sharing with steganography and authentication
Journal of Systems and Software
Improvements of image sharing with steganography and authentication
Journal of Systems and Software
A Steganographic Method with High Embedding Capacity by Improving Exploiting Modification Direction
IIH-MSP '07 Proceedings of the Third International Conference on International Information Hiding and Multimedia Signal Processing (IIH-MSP 2007) - Volume 01
Secret Image Sharing Using Quadratic Residues
IIH-MSP '07 Proceedings of the Third International Conference on International Information Hiding and Multimedia Signal Processing (IIH-MSP 2007) - Volume 01
Sharing secrets in stego images with authentication
Pattern Recognition
Threshold Secret Image Sharing by Chinese Remainder Theorem
APSCC '08 Proceedings of the 2008 IEEE Asia-Pacific Services Computing Conference
A comment on "Sharing secrets in stegoimages with authentication"
Pattern Recognition
Proceedings of the 1982 conference on Cryptography
Secret image sharing with authentication-chaining and dynamic embedding
Journal of Systems and Software
A modular approach to key safeguarding
IEEE Transactions on Information Theory
Hi-index | 0.10 |
Transmission of secret messages or images over the Internet using Shamir's secret sharing scheme has become popular. Some researchers use steganography with Shamir's method to hide noise like share images into natural looking cover images to improve secrecy. Stego images are authenticated against accidental or deliberate changes before recovering the secret. Authentication by a parity bit stream calculated by a keyed hash of stego images is commonly used. Researchers aim to increase the number of authentication bits to improve the authentication strength of their methods. Eslami and Ahmadabadi (2011) proposed a method with dynamic embedding strategy in 2011. They use a concatenated string of four bits, two from the current and two from previous block, to authenticate individual blocks. Even though chaining performs block based authentication, it cannot detect individual fake stego blocks and cannot authenticate the rest of the stego image blocks if it faces a changed block. This paper proposes a new secret image sharing method by selecting the number of authentication bits proportional to block size, contrary to Eslami and Ahmadabadi (2011) method which uses four bits to authenticate blocks regardless of block size. The proposed method has improved authentication for increased block size and can authenticate individual stego blocks as well. It produces good quality stego images and can still authenticate the rest of the stego image even after an altered stego block is encountered as shown in the experimental results.