Secret image sharing with authentication-chaining and dynamic embedding
A popular technique to share a secret image among n participants is to divide it first into some shadow images and then embed the shadows in n”cover” images. The resulting “stego” images, which contain the embedded data, are distributed among intended recipients. In order not to attract any attacker...
Gespeichert in:
Veröffentlicht in: | The Journal of systems and software 2011-05, Vol.84 (5), p.803-809 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 809 |
---|---|
container_issue | 5 |
container_start_page | 803 |
container_title | The Journal of systems and software |
container_volume | 84 |
creator | Eslami, Z. Ahmadabadi, J.Zarepour |
description | A popular technique to share a secret image among
n participants is to divide it first into some shadow images and then embed the shadows in
n”cover” images. The resulting “stego” images, which contain the embedded data, are distributed among intended recipients. In order not to attract any attacker’s attention, it is important to apply a suitable embedding such that high quality stego images are produced. Moreover, to ensure the integrity of stego data, a robust authentication mechanism which can detect tampering with high probability should be implemented.
Recently, a series of papers (
Lin and Tsai, 2004; Yang et al., 2007; Chang et al., 2008; Yang and Ciou, 2009) have considered polynomial-based secret image sharing with steganography and authentication. The embedding technique employed in all these papers is static, i.e. hidden bits are embedded in predetermined fixed-size blocks of each cover image. It is therefore possible that all the hidden data is replaced in only a subset of blocks of cover images while other blocks remain intact. As for authentication, the best of these schemes detects a tampered stego block with probability 15/16, however, since this is obtained at the cost of using 4 authentication bits per block, the visual quality of stego images is seriously degraded. In this paper, we propose a novel polynomial-based secret image sharing scheme with two achievements. First, a new embedding is proposed so that the block size is determined dynamically according to the size of hidden data and therefore, all the capacity of cover images is used for data hiding. Second, we introduce a new authentication-chaining method which achieves 15/16 as its tamper-detection ability while using only 2 authentication bits. Experimental results are provided to confirm the theory. |
doi_str_mv | 10.1016/j.jss.2011.01.002 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_869837159</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><els_id>S0164121211000033</els_id><sourcerecordid>2287010851</sourcerecordid><originalsourceid>FETCH-LOGICAL-c356t-c887db93319823b80a54b493ef38d80edd15aa2a235d9230e263e7ea17ce4ce53</originalsourceid><addsrcrecordid>eNp9kE1PwzAMhiMEEmPwA7hVXDi1OEk_UnFCEwykSRyAc5Qm3ppqTUfSgvbvyTROHJAs2bKf17JfQq4pZBRoeddlXQgZA0oziAHshMyoqHhKGROnZBaZPNaUnZOLEDoAqBiwGVm-ofY4JrZXG0xCq7x1m-Tbjm2iprFFN1qtRju4VLfKusNQOZOYvVO91Qn2DRoTu5fkbK22Aa9-85x8PD2-L57T1evyZfGwSjUvyjHVQlSmqTmntWC8EaCKvMlrjmsujIC4ixZKMcV4YWrGAVnJsUJFK425xoLPye1x784PnxOGUfY2aNxulcNhClKUteAVLepI3vwhu2HyLh4nRVECL2uWR4geIe2HEDyu5c5HK_xeUpAHY2Uno7HyYKyEGMCi5v6owfjnl0Uvg7boNBrrUY_SDPYf9Q9dSIAv</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>856036924</pqid></control><display><type>article</type><title>Secret image sharing with authentication-chaining and dynamic embedding</title><source>ScienceDirect Journals (5 years ago - present)</source><creator>Eslami, Z. ; Ahmadabadi, J.Zarepour</creator><creatorcontrib>Eslami, Z. ; Ahmadabadi, J.Zarepour</creatorcontrib><description>A popular technique to share a secret image among
n participants is to divide it first into some shadow images and then embed the shadows in
n”cover” images. The resulting “stego” images, which contain the embedded data, are distributed among intended recipients. In order not to attract any attacker’s attention, it is important to apply a suitable embedding such that high quality stego images are produced. Moreover, to ensure the integrity of stego data, a robust authentication mechanism which can detect tampering with high probability should be implemented.
Recently, a series of papers (
Lin and Tsai, 2004; Yang et al., 2007; Chang et al., 2008; Yang and Ciou, 2009) have considered polynomial-based secret image sharing with steganography and authentication. The embedding technique employed in all these papers is static, i.e. hidden bits are embedded in predetermined fixed-size blocks of each cover image. It is therefore possible that all the hidden data is replaced in only a subset of blocks of cover images while other blocks remain intact. As for authentication, the best of these schemes detects a tampered stego block with probability 15/16, however, since this is obtained at the cost of using 4 authentication bits per block, the visual quality of stego images is seriously degraded. In this paper, we propose a novel polynomial-based secret image sharing scheme with two achievements. First, a new embedding is proposed so that the block size is determined dynamically according to the size of hidden data and therefore, all the capacity of cover images is used for data hiding. Second, we introduce a new authentication-chaining method which achieves 15/16 as its tamper-detection ability while using only 2 authentication bits. Experimental results are provided to confirm the theory.</description><identifier>ISSN: 0164-1212</identifier><identifier>EISSN: 1873-1228</identifier><identifier>DOI: 10.1016/j.jss.2011.01.002</identifier><identifier>CODEN: JSSODM</identifier><language>eng</language><publisher>New York: Elsevier Inc</publisher><subject>Authentication ; Authentication protocols ; Computer programs ; Cryptography ; Data integrity ; Dynamical systems ; Dynamics ; Embedded systems ; Information sharing ; Integrity ; Polynomials ; Secret image sharing ; Shadows ; Software ; Steganography ; Studies ; Visual ; Visual quality</subject><ispartof>The Journal of systems and software, 2011-05, Vol.84 (5), p.803-809</ispartof><rights>2011 Elsevier Inc.</rights><rights>Copyright Elsevier Sequoia S.A. May 2011</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c356t-c887db93319823b80a54b493ef38d80edd15aa2a235d9230e263e7ea17ce4ce53</citedby><cites>FETCH-LOGICAL-c356t-c887db93319823b80a54b493ef38d80edd15aa2a235d9230e263e7ea17ce4ce53</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://dx.doi.org/10.1016/j.jss.2011.01.002$$EHTML$$P50$$Gelsevier$$H</linktohtml><link.rule.ids>314,778,782,3539,27913,27914,45984</link.rule.ids></links><search><creatorcontrib>Eslami, Z.</creatorcontrib><creatorcontrib>Ahmadabadi, J.Zarepour</creatorcontrib><title>Secret image sharing with authentication-chaining and dynamic embedding</title><title>The Journal of systems and software</title><description>A popular technique to share a secret image among
n participants is to divide it first into some shadow images and then embed the shadows in
n”cover” images. The resulting “stego” images, which contain the embedded data, are distributed among intended recipients. In order not to attract any attacker’s attention, it is important to apply a suitable embedding such that high quality stego images are produced. Moreover, to ensure the integrity of stego data, a robust authentication mechanism which can detect tampering with high probability should be implemented.
Recently, a series of papers (
Lin and Tsai, 2004; Yang et al., 2007; Chang et al., 2008; Yang and Ciou, 2009) have considered polynomial-based secret image sharing with steganography and authentication. The embedding technique employed in all these papers is static, i.e. hidden bits are embedded in predetermined fixed-size blocks of each cover image. It is therefore possible that all the hidden data is replaced in only a subset of blocks of cover images while other blocks remain intact. As for authentication, the best of these schemes detects a tampered stego block with probability 15/16, however, since this is obtained at the cost of using 4 authentication bits per block, the visual quality of stego images is seriously degraded. In this paper, we propose a novel polynomial-based secret image sharing scheme with two achievements. First, a new embedding is proposed so that the block size is determined dynamically according to the size of hidden data and therefore, all the capacity of cover images is used for data hiding. Second, we introduce a new authentication-chaining method which achieves 15/16 as its tamper-detection ability while using only 2 authentication bits. Experimental results are provided to confirm the theory.</description><subject>Authentication</subject><subject>Authentication protocols</subject><subject>Computer programs</subject><subject>Cryptography</subject><subject>Data integrity</subject><subject>Dynamical systems</subject><subject>Dynamics</subject><subject>Embedded systems</subject><subject>Information sharing</subject><subject>Integrity</subject><subject>Polynomials</subject><subject>Secret image sharing</subject><subject>Shadows</subject><subject>Software</subject><subject>Steganography</subject><subject>Studies</subject><subject>Visual</subject><subject>Visual quality</subject><issn>0164-1212</issn><issn>1873-1228</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2011</creationdate><recordtype>article</recordtype><recordid>eNp9kE1PwzAMhiMEEmPwA7hVXDi1OEk_UnFCEwykSRyAc5Qm3ppqTUfSgvbvyTROHJAs2bKf17JfQq4pZBRoeddlXQgZA0oziAHshMyoqHhKGROnZBaZPNaUnZOLEDoAqBiwGVm-ofY4JrZXG0xCq7x1m-Tbjm2iprFFN1qtRju4VLfKusNQOZOYvVO91Qn2DRoTu5fkbK22Aa9-85x8PD2-L57T1evyZfGwSjUvyjHVQlSmqTmntWC8EaCKvMlrjmsujIC4ixZKMcV4YWrGAVnJsUJFK425xoLPye1x784PnxOGUfY2aNxulcNhClKUteAVLepI3vwhu2HyLh4nRVECL2uWR4geIe2HEDyu5c5HK_xeUpAHY2Uno7HyYKyEGMCi5v6owfjnl0Uvg7boNBrrUY_SDPYf9Q9dSIAv</recordid><startdate>20110501</startdate><enddate>20110501</enddate><creator>Eslami, Z.</creator><creator>Ahmadabadi, J.Zarepour</creator><general>Elsevier Inc</general><general>Elsevier Sequoia S.A</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20110501</creationdate><title>Secret image sharing with authentication-chaining and dynamic embedding</title><author>Eslami, Z. ; Ahmadabadi, J.Zarepour</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c356t-c887db93319823b80a54b493ef38d80edd15aa2a235d9230e263e7ea17ce4ce53</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2011</creationdate><topic>Authentication</topic><topic>Authentication protocols</topic><topic>Computer programs</topic><topic>Cryptography</topic><topic>Data integrity</topic><topic>Dynamical systems</topic><topic>Dynamics</topic><topic>Embedded systems</topic><topic>Information sharing</topic><topic>Integrity</topic><topic>Polynomials</topic><topic>Secret image sharing</topic><topic>Shadows</topic><topic>Software</topic><topic>Steganography</topic><topic>Studies</topic><topic>Visual</topic><topic>Visual quality</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Eslami, Z.</creatorcontrib><creatorcontrib>Ahmadabadi, J.Zarepour</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>The Journal of systems and software</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Eslami, Z.</au><au>Ahmadabadi, J.Zarepour</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Secret image sharing with authentication-chaining and dynamic embedding</atitle><jtitle>The Journal of systems and software</jtitle><date>2011-05-01</date><risdate>2011</risdate><volume>84</volume><issue>5</issue><spage>803</spage><epage>809</epage><pages>803-809</pages><issn>0164-1212</issn><eissn>1873-1228</eissn><coden>JSSODM</coden><abstract>A popular technique to share a secret image among
n participants is to divide it first into some shadow images and then embed the shadows in
n”cover” images. The resulting “stego” images, which contain the embedded data, are distributed among intended recipients. In order not to attract any attacker’s attention, it is important to apply a suitable embedding such that high quality stego images are produced. Moreover, to ensure the integrity of stego data, a robust authentication mechanism which can detect tampering with high probability should be implemented.
Recently, a series of papers (
Lin and Tsai, 2004; Yang et al., 2007; Chang et al., 2008; Yang and Ciou, 2009) have considered polynomial-based secret image sharing with steganography and authentication. The embedding technique employed in all these papers is static, i.e. hidden bits are embedded in predetermined fixed-size blocks of each cover image. It is therefore possible that all the hidden data is replaced in only a subset of blocks of cover images while other blocks remain intact. As for authentication, the best of these schemes detects a tampered stego block with probability 15/16, however, since this is obtained at the cost of using 4 authentication bits per block, the visual quality of stego images is seriously degraded. In this paper, we propose a novel polynomial-based secret image sharing scheme with two achievements. First, a new embedding is proposed so that the block size is determined dynamically according to the size of hidden data and therefore, all the capacity of cover images is used for data hiding. Second, we introduce a new authentication-chaining method which achieves 15/16 as its tamper-detection ability while using only 2 authentication bits. Experimental results are provided to confirm the theory.</abstract><cop>New York</cop><pub>Elsevier Inc</pub><doi>10.1016/j.jss.2011.01.002</doi><tpages>7</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0164-1212 |
ispartof | The Journal of systems and software, 2011-05, Vol.84 (5), p.803-809 |
issn | 0164-1212 1873-1228 |
language | eng |
recordid | cdi_proquest_miscellaneous_869837159 |
source | ScienceDirect Journals (5 years ago - present) |
subjects | Authentication Authentication protocols Computer programs Cryptography Data integrity Dynamical systems Dynamics Embedded systems Information sharing Integrity Polynomials Secret image sharing Shadows Software Steganography Studies Visual Visual quality |
title | Secret image sharing with authentication-chaining and dynamic embedding |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-15T10%3A10%3A01IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Secret%20image%20sharing%20with%20authentication-chaining%20and%20dynamic%20embedding&rft.jtitle=The%20Journal%20of%20systems%20and%20software&rft.au=Eslami,%20Z.&rft.date=2011-05-01&rft.volume=84&rft.issue=5&rft.spage=803&rft.epage=809&rft.pages=803-809&rft.issn=0164-1212&rft.eissn=1873-1228&rft.coden=JSSODM&rft_id=info:doi/10.1016/j.jss.2011.01.002&rft_dat=%3Cproquest_cross%3E2287010851%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=856036924&rft_id=info:pmid/&rft_els_id=S0164121211000033&rfr_iscdi=true |