DocumentCode :
3081858
Title :
Image Secret Sharing and Hiding with Authentication
Author :
Li, Peng ; Ma, Peijun ; Su, Xiaohong
Author_Institution :
Sch. of Comput. Sci. & Technol., Harbin Inst. of Technol., Harbin, China
fYear :
2010
fDate :
17-19 Sept. 2010
Firstpage :
367
Lastpage :
370
Abstract :
Recently, Lin-Tsai, Yang et al., and Chang et al. proposed image secret sharing and hiding schemes with authentication. The secret image is shared and hided into ordinary cover images to form the stego images so as to be transmitted securely. Unfortunately, there is a common weakness that each stego image should be expanded to 4 times of the secret image. In this paper, we propose an enhanced (t, n) threshold scheme with smaller size expansion of the stego images. The size of each stego image is reduced to 3.5/t times of the secret image with the image quality better than the previous schemes. In addition, the authentication property is improved based on hash function. Finally, the experimental results show that our scheme is superior to the compared schemes.
Keywords :
image coding; steganography; authentication property; cover images; hash function; hiding schemes; image quality; image secret sharing; secret image; stego images; Authentication; Bismuth; Cryptography; Image quality; PSNR; Pixel; Polynomials; (t; authentication; image hiding; n) threshold; secret sharing;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Pervasive Computing Signal Processing and Applications (PCSPA), 2010 First International Conference on
Conference_Location :
Harbin
Print_ISBN :
978-1-4244-8043-2
Electronic_ISBN :
978-0-7695-4180-8
Type :
conf
DOI :
10.1109/PCSPA.2010.95
Filename :
5635579
Link To Document :
بازگشت