An Enhanced Approach of Image Steganographic Using Discrete Shearlet Transform and Secret Sharing

被引:4
|
作者
Hamza, Yasir Ahmed [1 ]
Tewfiq, Nada Elya [1 ]
Ahmed, Mohammed Qasim [2 ]
机构
[1] Nawroz Univ, Coll Comp & IT, Dept Comp Sci, Duhok, Iraq
[2] Univ Alhamdaniya, Coll Educ, Dept Comp Sci, Mosul, Iraq
关键词
Blue Layer; Discrete Shearlet Transform; Image Steganography; Stego Image; Secret Sharing;
D O I
10.21123/bsj.2022.19.1.0197
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Recently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512x512) is divided into three layers (red, green and blue). The blue layer is transformed using Discrete Shearlet Transform (DST) to obtain its coefficients. The first secret share is embedded at the coefficients of transformed blue layer to obtain a stego image. At extraction process, the first secret share is extracted from the coefficients of blue layer of the stego image and XORed with the second secret share to generate the original secret logo. According to the experimental results, the proposed method is achieved better imperceptibility for the stego image with the payload capacity equal to (1 bpp). In addition, the secret logo becomes more secured using (2 out 2 share) visual cryptography and the second secret share as a private key.
引用
收藏
页码:197 / 207
页数:11
相关论文
共 50 条
  • [41] Sharing secret image using section encoding
    Tso, H-K
    IMAGING SCIENCE JOURNAL, 2010, 58 (01): : 32 - 36
  • [42] Secret image sharing using eigenvalues and eigenvectors
    Sirisha, B. Lakshmi
    Kumar, S. Srinivas
    Mohan, B. Chandra
    JOURNAL OF INFORMATION & OPTIMIZATION SCIENCES, 2018, 39 (04): : 871 - 878
  • [43] A color image watermarking scheme based on secret sharing and wavelet transform
    Hsieh, Shang-Lin
    Ran, Jh-Jie
    Tsai, I-Ju
    Huang, Bin-Yuan
    2007 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS, VOLS 1-8, 2007, : 2952 - 2957
  • [44] Secret image sharing using quadratic residues
    Chen, Chang-Chu
    Chang, Chin-Chen
    2007 THIRD INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, VOL 1, PROCEEDINGS, 2007, : 515 - 518
  • [45] A new approach to the secret image sharing with steganography and authentication
    Wu, C-C
    Hwang, M-S
    Kao, S-J
    IMAGING SCIENCE JOURNAL, 2009, 57 (03): : 140 - 151
  • [46] A geometry-based secret image sharing approach
    Chen, Chien-Chang
    Fu, Wen-Yin
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2008, 24 (05) : 1567 - 1577
  • [47] Enhanced Modulo Based Multi Secret Image Sharing Scheme
    Deshmukh, Maroti
    Nain, Neeta
    Ahmed, Mushtaq
    INFORMATION SYSTEMS SECURITY, 2016, 10063 : 212 - 224
  • [48] Secret image sharing with enhanced visual quality and authentication mechanism
    Ulutas, M.
    Ulutas, G.
    Nabiyev, V. V.
    IMAGING SCIENCE JOURNAL, 2011, 59 (03): : 154 - 165
  • [49] Enhanced Matrix-Based Secret Image Sharing Scheme
    Yang, Ching-Nung
    Wu, Chih-Cheng
    Lin, Yi-Chin
    Kim, Cheonshik
    IEEE SIGNAL PROCESSING LETTERS, 2012, 19 (12) : 789 - 792
  • [50] Image sharing scheme based on discrete fractional random transform
    Liu, Zhengjun
    Liu, Shutian
    Ahmad, Muhammad Ashfaq
    OPTIK, 2010, 121 (06): : 495 - 499