DocumentCode :
2648863
Title :
Secret Sharing Systems with Authentication-Based Steganography
Author :
Wang, Shiuh-Jeng ; Lin, I-Shuan ; Hsieh, Ye-Lin ; Weng, Chi-Yao
Author_Institution :
Dept. of Inf. Manage., Central Police Univ., Taoyuan
fYear :
2008
fDate :
15-17 Aug. 2008
Firstpage :
1146
Lastpage :
1149
Abstract :
Recently, Lin and Tsai proposed a secret image-sharing scheme using steganography and a parity-checking detection mechanism to provide effective security for secret image sharing. In this paper, we present a robust authentication method to detect stego-images, while retaining the same high capacity of embedding information, with a cyclic redundancy check and hash function both being applied for authentication detection. As observed from our experiments, the quality of shares embedded in the stego-image in our scheme was higher than that of previous studies. Therefore, in terms of precise detection and higher PSNR measures, the requirements for both authentication and fidelity were satisfied.
Keywords :
cryptography; image processing; authentication; parity-checking detection; secret image-sharing; steganography; stego-images detection; Authentication; Computer science; Computer security; Cryptography; Information management; Multimedia systems; Polynomials; Proposals; Signal processing; Steganography; Authentication; Cyclic Redundancy Code; Secret image sharing; Steganography; pattern LSB;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Intelligent Information Hiding and Multimedia Signal Processing, 2008. IIHMSP '08 International Conference on
Conference_Location :
Harbin
Print_ISBN :
978-0-7695-3278-3
Type :
conf
DOI :
10.1109/IIH-MSP.2008.243
Filename :
4604246
Link To Document :
بازگشت