An Enhanced Approach of Image Steganographic Using Discrete Shearlet Transform and Secret Sharing

被引:4
|
作者
Hamza, Yasir Ahmed [1 ]
Tewfiq, Nada Elya [1 ]
Ahmed, Mohammed Qasim [2 ]
机构
[1] Nawroz Univ, Coll Comp & IT, Dept Comp Sci, Duhok, Iraq
[2] Univ Alhamdaniya, Coll Educ, Dept Comp Sci, Mosul, Iraq
关键词
Blue Layer; Discrete Shearlet Transform; Image Steganography; Stego Image; Secret Sharing;
D O I
10.21123/bsj.2022.19.1.0197
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Recently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512x512) is divided into three layers (red, green and blue). The blue layer is transformed using Discrete Shearlet Transform (DST) to obtain its coefficients. The first secret share is embedded at the coefficients of transformed blue layer to obtain a stego image. At extraction process, the first secret share is extracted from the coefficients of blue layer of the stego image and XORed with the second secret share to generate the original secret logo. According to the experimental results, the proposed method is achieved better imperceptibility for the stego image with the payload capacity equal to (1 bpp). In addition, the secret logo becomes more secured using (2 out 2 share) visual cryptography and the second secret share as a private key.
引用
收藏
页码:197 / 207
页数:11
相关论文
共 50 条
  • [21] Hierarchical secret image sharing using phase modulation based on the Fresnel transform
    Zhao, Tieyu
    Yuan, Lin
    Chi, Yingying
    JOURNAL OF MODERN OPTICS, 2019, 66 (14) : 1491 - 1497
  • [22] Target Feature Enhancement of SAR Image Based on Discrete Shearlet Transform
    Pan, Zhuo
    Zhan, Xueli
    Wang, Yanfei
    Pan, Zhigang
    GLOBAL INTELLIGENCE INDUSTRY CONFERENCE (GIIC 2018), 2018, 10835
  • [23] MEDICAL IMAGE FUSION ALGORITHM BASED ON FINITE DISCRETE SHEARLET TRANSFORM
    Cui, Z. Y.
    Wang, Y. Z.
    BASIC & CLINICAL PHARMACOLOGY & TOXICOLOGY, 2015, 117 : 43 - 43
  • [24] A Microscopic Image Classification Method using Shearlet Transform
    Rezaeilouyeh, Hadi
    Mahoor, Mohammad H.
    Mavadati, S. Mohammad
    Zhang, Jun Jason
    2013 IEEE INTERNATIONAL CONFERENCE ON HEALTHCARE INFORMATICS (ICHI 2013), 2013, : 382 - 386
  • [25] An Approach for Secret Sharing Using Randomised Visual Secret Sharing
    Dixit, Shubhra
    Jain, Deepak Kumar
    Saxena, Ankita
    2014 FOURTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT), 2014, : 847 - 850
  • [26] Secret image sharing scheme with authentication and remedy abilities based on cellular automata and discrete wavelet transform
    Wu, Xiaotian
    Sun, Wei
    JOURNAL OF SYSTEMS AND SOFTWARE, 2013, 86 (04) : 1068 - 1088
  • [27] Blind Image Watermark Detection Algorithm Based on Discrete Shearlet Transform Using Statistical Decision Theory
    Ahmaderaghi, Baharak
    Kurugollu, Fatih
    Del Rincon, Jesus Martinez
    Bouridane, Ahmed
    IEEE TRANSACTIONS ON COMPUTATIONAL IMAGING, 2018, 4 (01): : 46 - 59
  • [28] Optical essential secret image sharing using unequal modulus decomposition and gyrator transform
    Mohamed G. Abdelfattah
    Salem F. Hegazy
    Salah S. A. Obayya
    Optical and Quantum Electronics, 2024, 56
  • [29] Optical essential secret image sharing using unequal modulus decomposition and gyrator transform
    Abdelfattah, Mohamed G.
    Hegazy, Salem F.
    Obayya, Salah S. A.
    OPTICAL AND QUANTUM ELECTRONICS, 2024, 56 (01)
  • [30] DWT-SISA: a secure and effective discrete wavelet transform-based secret image sharing with authentication
    Xiong, Lizhi
    Zhong, Xinwei
    Yang, Ching-Nung
    SIGNAL PROCESSING, 2020, 173