An Enhanced Approach of Image Steganographic Using Discrete Shearlet Transform and Secret Sharing

被引:4
|
作者
Hamza, Yasir Ahmed [1 ]
Tewfiq, Nada Elya [1 ]
Ahmed, Mohammed Qasim [2 ]
机构
[1] Nawroz Univ, Coll Comp & IT, Dept Comp Sci, Duhok, Iraq
[2] Univ Alhamdaniya, Coll Educ, Dept Comp Sci, Mosul, Iraq
关键词
Blue Layer; Discrete Shearlet Transform; Image Steganography; Stego Image; Secret Sharing;
D O I
10.21123/bsj.2022.19.1.0197
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Recently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512x512) is divided into three layers (red, green and blue). The blue layer is transformed using Discrete Shearlet Transform (DST) to obtain its coefficients. The first secret share is embedded at the coefficients of transformed blue layer to obtain a stego image. At extraction process, the first secret share is extracted from the coefficients of blue layer of the stego image and XORed with the second secret share to generate the original secret logo. According to the experimental results, the proposed method is achieved better imperceptibility for the stego image with the payload capacity equal to (1 bpp). In addition, the secret logo becomes more secured using (2 out 2 share) visual cryptography and the second secret share as a private key.
引用
收藏
页码:197 / 207
页数:11
相关论文
共 50 条
  • [31] DWTAT-DASIS: Fusion of discrete wavelet transform and access tree for distributed authentication in secret image sharing
    Cai, Chuanda
    Peng, Changgen
    Tang, Hanlin
    Xiao, Bin
    Tan, Weijie
    COMPUTER STANDARDS & INTERFACES, 2025, 93
  • [32] A Novel Image Steganographic Technique using Fast Fourier Transform
    Shaukat, Afsha
    Chaurasia, Mahesh
    Sanyal, Goutam
    2016 5TH INTERNATIONAL CONFERENCE ON RECENT TRENDS IN INFORMATION TECHNOLOGY (ICRTIT), 2016,
  • [33] No-Reference Image Quality Assessment Using Shearlet Transform
    Li, Yuming
    Cao, Hanqiang
    Xu, Zijian
    MIPPR 2013: MULTISPECTRAL IMAGE ACQUISITION, PROCESSING, AND ANALYSIS, 2013, 8917
  • [34] Compressed Sensing MRI Using Discrete Nonseparable Shearlet Transform and FISTA
    Pejoski, Slavche
    Kafedziski, Venceslav
    Gleich, Dusan
    IEEE SIGNAL PROCESSING LETTERS, 2015, 22 (10) : 1566 - 1570
  • [35] Brain's tumor image processing using shearlet transform
    Cadena, Luis
    Espinosa, Nikolai
    Cadena, Franklin
    Korneeva, Anna
    Kruglyakov, Alexey
    Legalov, Alexander
    Romanenko, Alexey
    Zotin, Alexander
    APPLICATIONS OF DIGITAL IMAGE PROCESSING XL, 2017, 10396
  • [36] Shearlet Transform Based Image Denoising Using Histogram Thresholding
    Anju, T. S.
    Raj, Nelwin N. R.
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORKS (COMNET), 2016, : 162 - 166
  • [37] A Novel Medical Image Fusion Approach Based on Nonsubsampled Shearlet Transform
    Li, Liangliang
    Wang, Linli
    Wang, Zuoxu
    Jia, Zhenhong
    Si, Yujuan
    Yang, Jie
    Kasabov, Nikola
    JOURNAL OF MEDICAL IMAGING AND HEALTH INFORMATICS, 2019, 9 (09) : 1815 - 1826
  • [38] DSTnet: a new discrete shearlet transform-based CNN model for image denoising
    Lyu, Zhiyu
    Zhang, Chengkun
    Han, Min
    MULTIMEDIA SYSTEMS, 2021, 27 (06) : 1165 - 1177
  • [39] DSTnet: a new discrete shearlet transform-based CNN model for image denoising
    Zhiyu Lyu
    Chengkun Zhang
    Min Han
    Multimedia Systems, 2021, 27 : 1165 - 1177
  • [40] Secured image transmission using a novel neural network approach and secret image sharing technique
    Kumar, Rakesh
    Dhiman, Meenu
    International Journal of Signal Processing, Image Processing and Pattern Recognition, 2015, 8 (01): : 161 - 192