An Enhanced Approach of Image Steganographic Using Discrete Shearlet Transform and Secret Sharing

被引:4
|
作者
Hamza, Yasir Ahmed [1 ]
Tewfiq, Nada Elya [1 ]
Ahmed, Mohammed Qasim [2 ]
机构
[1] Nawroz Univ, Coll Comp & IT, Dept Comp Sci, Duhok, Iraq
[2] Univ Alhamdaniya, Coll Educ, Dept Comp Sci, Mosul, Iraq
关键词
Blue Layer; Discrete Shearlet Transform; Image Steganography; Stego Image; Secret Sharing;
D O I
10.21123/bsj.2022.19.1.0197
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Recently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512x512) is divided into three layers (red, green and blue). The blue layer is transformed using Discrete Shearlet Transform (DST) to obtain its coefficients. The first secret share is embedded at the coefficients of transformed blue layer to obtain a stego image. At extraction process, the first secret share is extracted from the coefficients of blue layer of the stego image and XORed with the second secret share to generate the original secret logo. According to the experimental results, the proposed method is achieved better imperceptibility for the stego image with the payload capacity equal to (1 bpp). In addition, the secret logo becomes more secured using (2 out 2 share) visual cryptography and the second secret share as a private key.
引用
收藏
页码:197 / 207
页数:11
相关论文
共 50 条
  • [1] An Efficient Approach for Colour Image Enhancement Using Discrete Shearlet Transform
    Premkumar, S.
    Parthasarathi, K. A.
    SECOND INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ENGINEERING AND TECHNOLOGY (ICCTET 2014), 2014, : 363 - 366
  • [2] Quality Controllable Progressive Secret Image Sharing - Discrete Cosine Transform Approach
    Fang, Wen-Pinn
    INTERNATIONAL JOURNAL OF EDUCATION AND INFORMATION TECHNOLOGIES, 2007, 1 (01): : 43 - 47
  • [3] Secret Image Sharing Using Multiwavelet Transform
    Huang, Chin-Pan
    Li, Ching-Chung
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2011, 27 (02) : 733 - 748
  • [4] Sparse directional image representations using the discrete shearlet transform
    Easley, Glenn
    Labate, Demetrio
    Lim, Wang-Q
    APPLIED AND COMPUTATIONAL HARMONIC ANALYSIS, 2008, 25 (01) : 25 - 46
  • [5] A scalable secret image sharing method based on discrete wavelet transform
    Kong, Jun
    Zhang, Yanfen
    Meng, Xiangbo
    Zheng, Ying
    Lu, Yinghua
    BIO-INSPIRED COMPUTATIONAL INTELLIGENCE AND APPLICATIONS, 2007, 4688 : 736 - 745
  • [6] An adaptive secret image sharing with a new bitwise steganographic property
    Zarepour-Ahmadabadi, Jamal
    Ahmadabadi, MohammadEbrahim Shiri
    Latif, AliMohammad
    INFORMATION SCIENCES, 2016, 369 : 467 - 480
  • [7] Infrared Image Watermarking Based on the Discrete Shearlet Transform
    Wu, Na-na
    Zhou, Hui-xin
    Qin, Han-lin
    Yao, Bo
    Zhao, Dong
    AOPC 2017: OPTICAL SENSING AND IMAGING TECHNOLOGY AND APPLICATIONS, 2017, 10462
  • [8] A secret image sharing method using integer wavelet transform
    Huang, Chin-Pan
    Li, Ching-Chung
    EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING, 2007, 2007 (1)
  • [9] A Secret Image Sharing Method Using Integer Wavelet Transform
    Chin-Pan Huang
    Ching-Chung Li
    EURASIP Journal on Advances in Signal Processing, 2007
  • [10] A secret image sharing method using integer multiwavelet transform
    Huang, Chin-Pan
    Li, Ching-Chung
    2006 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, ICIP 2006, PROCEEDINGS, 2006, : 1969 - +