Secret image sharing with authentication-chaining and dynamic embedding

A popular technique to share a secret image among n participants is to divide it first into some shadow images and then embed the shadows in n”cover” images. The resulting “stego” images, which contain the embedded data, are distributed among intended recipients. In order not to attract any attacker...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:The Journal of systems and software 2011-05, Vol.84 (5), p.803-809
Hauptverfasser: Eslami, Z., Ahmadabadi, J.Zarepour
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 809
container_issue 5
container_start_page 803
container_title The Journal of systems and software
container_volume 84
creator Eslami, Z.
Ahmadabadi, J.Zarepour
description A popular technique to share a secret image among n participants is to divide it first into some shadow images and then embed the shadows in n”cover” images. The resulting “stego” images, which contain the embedded data, are distributed among intended recipients. In order not to attract any attacker’s attention, it is important to apply a suitable embedding such that high quality stego images are produced. Moreover, to ensure the integrity of stego data, a robust authentication mechanism which can detect tampering with high probability should be implemented. Recently, a series of papers ( Lin and Tsai, 2004; Yang et al., 2007; Chang et al., 2008; Yang and Ciou, 2009) have considered polynomial-based secret image sharing with steganography and authentication. The embedding technique employed in all these papers is static, i.e. hidden bits are embedded in predetermined fixed-size blocks of each cover image. It is therefore possible that all the hidden data is replaced in only a subset of blocks of cover images while other blocks remain intact. As for authentication, the best of these schemes detects a tampered stego block with probability 15/16, however, since this is obtained at the cost of using 4 authentication bits per block, the visual quality of stego images is seriously degraded. In this paper, we propose a novel polynomial-based secret image sharing scheme with two achievements. First, a new embedding is proposed so that the block size is determined dynamically according to the size of hidden data and therefore, all the capacity of cover images is used for data hiding. Second, we introduce a new authentication-chaining method which achieves 15/16 as its tamper-detection ability while using only 2 authentication bits. Experimental results are provided to confirm the theory.
doi_str_mv 10.1016/j.jss.2011.01.002
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_869837159</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><els_id>S0164121211000033</els_id><sourcerecordid>2287010851</sourcerecordid><originalsourceid>FETCH-LOGICAL-c356t-c887db93319823b80a54b493ef38d80edd15aa2a235d9230e263e7ea17ce4ce53</originalsourceid><addsrcrecordid>eNp9kE1PwzAMhiMEEmPwA7hVXDi1OEk_UnFCEwykSRyAc5Qm3ppqTUfSgvbvyTROHJAs2bKf17JfQq4pZBRoeddlXQgZA0oziAHshMyoqHhKGROnZBaZPNaUnZOLEDoAqBiwGVm-ofY4JrZXG0xCq7x1m-Tbjm2iprFFN1qtRju4VLfKusNQOZOYvVO91Qn2DRoTu5fkbK22Aa9-85x8PD2-L57T1evyZfGwSjUvyjHVQlSmqTmntWC8EaCKvMlrjmsujIC4ixZKMcV4YWrGAVnJsUJFK425xoLPye1x784PnxOGUfY2aNxulcNhClKUteAVLepI3vwhu2HyLh4nRVECL2uWR4geIe2HEDyu5c5HK_xeUpAHY2Uno7HyYKyEGMCi5v6owfjnl0Uvg7boNBrrUY_SDPYf9Q9dSIAv</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>856036924</pqid></control><display><type>article</type><title>Secret image sharing with authentication-chaining and dynamic embedding</title><source>ScienceDirect Journals (5 years ago - present)</source><creator>Eslami, Z. ; Ahmadabadi, J.Zarepour</creator><creatorcontrib>Eslami, Z. ; Ahmadabadi, J.Zarepour</creatorcontrib><description>A popular technique to share a secret image among n participants is to divide it first into some shadow images and then embed the shadows in n”cover” images. The resulting “stego” images, which contain the embedded data, are distributed among intended recipients. In order not to attract any attacker’s attention, it is important to apply a suitable embedding such that high quality stego images are produced. Moreover, to ensure the integrity of stego data, a robust authentication mechanism which can detect tampering with high probability should be implemented. Recently, a series of papers ( Lin and Tsai, 2004; Yang et al., 2007; Chang et al., 2008; Yang and Ciou, 2009) have considered polynomial-based secret image sharing with steganography and authentication. The embedding technique employed in all these papers is static, i.e. hidden bits are embedded in predetermined fixed-size blocks of each cover image. It is therefore possible that all the hidden data is replaced in only a subset of blocks of cover images while other blocks remain intact. As for authentication, the best of these schemes detects a tampered stego block with probability 15/16, however, since this is obtained at the cost of using 4 authentication bits per block, the visual quality of stego images is seriously degraded. In this paper, we propose a novel polynomial-based secret image sharing scheme with two achievements. First, a new embedding is proposed so that the block size is determined dynamically according to the size of hidden data and therefore, all the capacity of cover images is used for data hiding. Second, we introduce a new authentication-chaining method which achieves 15/16 as its tamper-detection ability while using only 2 authentication bits. Experimental results are provided to confirm the theory.</description><identifier>ISSN: 0164-1212</identifier><identifier>EISSN: 1873-1228</identifier><identifier>DOI: 10.1016/j.jss.2011.01.002</identifier><identifier>CODEN: JSSODM</identifier><language>eng</language><publisher>New York: Elsevier Inc</publisher><subject>Authentication ; Authentication protocols ; Computer programs ; Cryptography ; Data integrity ; Dynamical systems ; Dynamics ; Embedded systems ; Information sharing ; Integrity ; Polynomials ; Secret image sharing ; Shadows ; Software ; Steganography ; Studies ; Visual ; Visual quality</subject><ispartof>The Journal of systems and software, 2011-05, Vol.84 (5), p.803-809</ispartof><rights>2011 Elsevier Inc.</rights><rights>Copyright Elsevier Sequoia S.A. May 2011</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c356t-c887db93319823b80a54b493ef38d80edd15aa2a235d9230e263e7ea17ce4ce53</citedby><cites>FETCH-LOGICAL-c356t-c887db93319823b80a54b493ef38d80edd15aa2a235d9230e263e7ea17ce4ce53</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://dx.doi.org/10.1016/j.jss.2011.01.002$$EHTML$$P50$$Gelsevier$$H</linktohtml><link.rule.ids>314,778,782,3539,27913,27914,45984</link.rule.ids></links><search><creatorcontrib>Eslami, Z.</creatorcontrib><creatorcontrib>Ahmadabadi, J.Zarepour</creatorcontrib><title>Secret image sharing with authentication-chaining and dynamic embedding</title><title>The Journal of systems and software</title><description>A popular technique to share a secret image among n participants is to divide it first into some shadow images and then embed the shadows in n”cover” images. The resulting “stego” images, which contain the embedded data, are distributed among intended recipients. In order not to attract any attacker’s attention, it is important to apply a suitable embedding such that high quality stego images are produced. Moreover, to ensure the integrity of stego data, a robust authentication mechanism which can detect tampering with high probability should be implemented. Recently, a series of papers ( Lin and Tsai, 2004; Yang et al., 2007; Chang et al., 2008; Yang and Ciou, 2009) have considered polynomial-based secret image sharing with steganography and authentication. The embedding technique employed in all these papers is static, i.e. hidden bits are embedded in predetermined fixed-size blocks of each cover image. It is therefore possible that all the hidden data is replaced in only a subset of blocks of cover images while other blocks remain intact. As for authentication, the best of these schemes detects a tampered stego block with probability 15/16, however, since this is obtained at the cost of using 4 authentication bits per block, the visual quality of stego images is seriously degraded. In this paper, we propose a novel polynomial-based secret image sharing scheme with two achievements. First, a new embedding is proposed so that the block size is determined dynamically according to the size of hidden data and therefore, all the capacity of cover images is used for data hiding. Second, we introduce a new authentication-chaining method which achieves 15/16 as its tamper-detection ability while using only 2 authentication bits. Experimental results are provided to confirm the theory.</description><subject>Authentication</subject><subject>Authentication protocols</subject><subject>Computer programs</subject><subject>Cryptography</subject><subject>Data integrity</subject><subject>Dynamical systems</subject><subject>Dynamics</subject><subject>Embedded systems</subject><subject>Information sharing</subject><subject>Integrity</subject><subject>Polynomials</subject><subject>Secret image sharing</subject><subject>Shadows</subject><subject>Software</subject><subject>Steganography</subject><subject>Studies</subject><subject>Visual</subject><subject>Visual quality</subject><issn>0164-1212</issn><issn>1873-1228</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2011</creationdate><recordtype>article</recordtype><recordid>eNp9kE1PwzAMhiMEEmPwA7hVXDi1OEk_UnFCEwykSRyAc5Qm3ppqTUfSgvbvyTROHJAs2bKf17JfQq4pZBRoeddlXQgZA0oziAHshMyoqHhKGROnZBaZPNaUnZOLEDoAqBiwGVm-ofY4JrZXG0xCq7x1m-Tbjm2iprFFN1qtRju4VLfKusNQOZOYvVO91Qn2DRoTu5fkbK22Aa9-85x8PD2-L57T1evyZfGwSjUvyjHVQlSmqTmntWC8EaCKvMlrjmsujIC4ixZKMcV4YWrGAVnJsUJFK425xoLPye1x784PnxOGUfY2aNxulcNhClKUteAVLepI3vwhu2HyLh4nRVECL2uWR4geIe2HEDyu5c5HK_xeUpAHY2Uno7HyYKyEGMCi5v6owfjnl0Uvg7boNBrrUY_SDPYf9Q9dSIAv</recordid><startdate>20110501</startdate><enddate>20110501</enddate><creator>Eslami, Z.</creator><creator>Ahmadabadi, J.Zarepour</creator><general>Elsevier Inc</general><general>Elsevier Sequoia S.A</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20110501</creationdate><title>Secret image sharing with authentication-chaining and dynamic embedding</title><author>Eslami, Z. ; Ahmadabadi, J.Zarepour</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c356t-c887db93319823b80a54b493ef38d80edd15aa2a235d9230e263e7ea17ce4ce53</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2011</creationdate><topic>Authentication</topic><topic>Authentication protocols</topic><topic>Computer programs</topic><topic>Cryptography</topic><topic>Data integrity</topic><topic>Dynamical systems</topic><topic>Dynamics</topic><topic>Embedded systems</topic><topic>Information sharing</topic><topic>Integrity</topic><topic>Polynomials</topic><topic>Secret image sharing</topic><topic>Shadows</topic><topic>Software</topic><topic>Steganography</topic><topic>Studies</topic><topic>Visual</topic><topic>Visual quality</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Eslami, Z.</creatorcontrib><creatorcontrib>Ahmadabadi, J.Zarepour</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>The Journal of systems and software</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Eslami, Z.</au><au>Ahmadabadi, J.Zarepour</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Secret image sharing with authentication-chaining and dynamic embedding</atitle><jtitle>The Journal of systems and software</jtitle><date>2011-05-01</date><risdate>2011</risdate><volume>84</volume><issue>5</issue><spage>803</spage><epage>809</epage><pages>803-809</pages><issn>0164-1212</issn><eissn>1873-1228</eissn><coden>JSSODM</coden><abstract>A popular technique to share a secret image among n participants is to divide it first into some shadow images and then embed the shadows in n”cover” images. The resulting “stego” images, which contain the embedded data, are distributed among intended recipients. In order not to attract any attacker’s attention, it is important to apply a suitable embedding such that high quality stego images are produced. Moreover, to ensure the integrity of stego data, a robust authentication mechanism which can detect tampering with high probability should be implemented. Recently, a series of papers ( Lin and Tsai, 2004; Yang et al., 2007; Chang et al., 2008; Yang and Ciou, 2009) have considered polynomial-based secret image sharing with steganography and authentication. The embedding technique employed in all these papers is static, i.e. hidden bits are embedded in predetermined fixed-size blocks of each cover image. It is therefore possible that all the hidden data is replaced in only a subset of blocks of cover images while other blocks remain intact. As for authentication, the best of these schemes detects a tampered stego block with probability 15/16, however, since this is obtained at the cost of using 4 authentication bits per block, the visual quality of stego images is seriously degraded. In this paper, we propose a novel polynomial-based secret image sharing scheme with two achievements. First, a new embedding is proposed so that the block size is determined dynamically according to the size of hidden data and therefore, all the capacity of cover images is used for data hiding. Second, we introduce a new authentication-chaining method which achieves 15/16 as its tamper-detection ability while using only 2 authentication bits. Experimental results are provided to confirm the theory.</abstract><cop>New York</cop><pub>Elsevier Inc</pub><doi>10.1016/j.jss.2011.01.002</doi><tpages>7</tpages></addata></record>
fulltext fulltext
identifier ISSN: 0164-1212
ispartof The Journal of systems and software, 2011-05, Vol.84 (5), p.803-809
issn 0164-1212
1873-1228
language eng
recordid cdi_proquest_miscellaneous_869837159
source ScienceDirect Journals (5 years ago - present)
subjects Authentication
Authentication protocols
Computer programs
Cryptography
Data integrity
Dynamical systems
Dynamics
Embedded systems
Information sharing
Integrity
Polynomials
Secret image sharing
Shadows
Software
Steganography
Studies
Visual
Visual quality
title Secret image sharing with authentication-chaining and dynamic embedding
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-15T10%3A10%3A01IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Secret%20image%20sharing%20with%20authentication-chaining%20and%20dynamic%20embedding&rft.jtitle=The%20Journal%20of%20systems%20and%20software&rft.au=Eslami,%20Z.&rft.date=2011-05-01&rft.volume=84&rft.issue=5&rft.spage=803&rft.epage=809&rft.pages=803-809&rft.issn=0164-1212&rft.eissn=1873-1228&rft.coden=JSSODM&rft_id=info:doi/10.1016/j.jss.2011.01.002&rft_dat=%3Cproquest_cross%3E2287010851%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=856036924&rft_id=info:pmid/&rft_els_id=S0164121211000033&rfr_iscdi=true