Title :
Secret Sharing Systems with Authentication-Based Steganography
Author :
Wang, Shiuh-Jeng ; Lin, I-Shuan ; Hsieh, Ye-Lin ; Weng, Chi-Yao
Author_Institution :
Dept. of Inf. Manage., Central Police Univ., Taoyuan
Abstract :
Recently, Lin and Tsai proposed a secret image-sharing scheme using steganography and a parity-checking detection mechanism to provide effective security for secret image sharing. In this paper, we present a robust authentication method to detect stego-images, while retaining the same high capacity of embedding information, with a cyclic redundancy check and hash function both being applied for authentication detection. As observed from our experiments, the quality of shares embedded in the stego-image in our scheme was higher than that of previous studies. Therefore, in terms of precise detection and higher PSNR measures, the requirements for both authentication and fidelity were satisfied.
Keywords :
cryptography; image processing; authentication; parity-checking detection; secret image-sharing; steganography; stego-images detection; Authentication; Computer science; Computer security; Cryptography; Information management; Multimedia systems; Polynomials; Proposals; Signal processing; Steganography; Authentication; Cyclic Redundancy Code; Secret image sharing; Steganography; pattern LSB;
Conference_Titel :
Intelligent Information Hiding and Multimedia Signal Processing, 2008. IIHMSP '08 International Conference on
Conference_Location :
Harbin
Print_ISBN :
978-0-7695-3278-3
DOI :
10.1109/IIH-MSP.2008.243