A high quality image sharing with steganography and adaptive authentication scheme
► We enhance the image quality under various authentication bits conditions. ► The proposed scheme has improved the image quality by 4.71%, 9.29%, and 11.10%. ► The efficacy of authentication capability of the proposed scheme is demonstrated. ► The authentication ability is maintains while enhances...
Gespeichert in:
Veröffentlicht in: | The Journal of systems and software 2011-12, Vol.84 (12), p.2196-2207 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 2207 |
---|---|
container_issue | 12 |
container_start_page | 2196 |
container_title | The Journal of systems and software |
container_volume | 84 |
creator | Wu, Chia-Chun Kao, Shang-Juh Hwang, Min-Shiang |
description | ► We enhance the image quality under various authentication bits conditions. ► The proposed scheme has improved the image quality by 4.71%, 9.29%, and 11.10%. ► The efficacy of authentication capability of the proposed scheme is demonstrated. ► The authentication ability is maintains while enhances the image quality.
With the rapid growth of numerous multimedia applications and communications through Internet, secret image sharing has been becoming a key technology for digital images in secured storage and confidential transmission. However, the stego-images are obtained by directly replacing the least-significant-bit planes (LSB) of cover-images with secret data and authentication code in most schemes, which will result in the distortion of the stego-images. In this paper, we proposed a novel secret image sharing scheme by applying optimal pixel adjustment process to enhance the image quality under different payload capacity and various authentication bits conditions. The experimental results showed that the proposed scheme has improved the image quality of stego images by 4.71%, 9.29%, and 11.10%, as compared with the schemes recently proposed by Yang et al., Chang et al., and Lin and Tsai. We also provide several experiments to demonstrate the efficacy of authentication capability of the proposed scheme. In other words, our scheme maintains the secret image sharing and authentication ability while enhances the image quality. |
doi_str_mv | 10.1016/j.jss.2011.06.021 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_963852013</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><els_id>S0164121211001488</els_id><sourcerecordid>963852013</sourcerecordid><originalsourceid>FETCH-LOGICAL-c356t-7e2d0f2e22ebe2cfde4ea5f579bb222838b37d10c2c8dc39e1ef81191c79755f3</originalsourceid><addsrcrecordid>eNp9kD1PwzAQhi0EEqXwA9gsFqYEfzSJI6aq4kuqhIRgthz7kjhqk9R2ivrvcVUmBqa74XlP7z0I3VKSUkLzhy7tvE8ZoTQleUoYPUMzKgqeUMbEOZpFZhF3yi7RlfcdIaRghM3QxxK3tmnxblIbGw7YblUD2LfK2b7B3za02AdoVD80To3tAaveYGXUGOwesJpCC32wWgU79NjrFrZwjS5qtfFw8zvn6Ov56XP1mqzfX95Wy3WieZaHpABmSM2AMaiA6drAAlRWZ0VZVSyW5qLihaFEMy2M5iVQqAWlJdVFWWRZzefo_nR3dMNuAh_k1noNm43qYZi8LHMusmiER_LuD9kNk-tjOSlKUbCMsDJC9ARpN3jvoJajizbcQVIij45lJ6NjeXQsSS6j45h5PGUg_rm34KTXFnoNxjrQQZrB_pP-Aas-hQk</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>898725029</pqid></control><display><type>article</type><title>A high quality image sharing with steganography and adaptive authentication scheme</title><source>Access via ScienceDirect (Elsevier)</source><creator>Wu, Chia-Chun ; Kao, Shang-Juh ; Hwang, Min-Shiang</creator><creatorcontrib>Wu, Chia-Chun ; Kao, Shang-Juh ; Hwang, Min-Shiang</creatorcontrib><description>► We enhance the image quality under various authentication bits conditions. ► The proposed scheme has improved the image quality by 4.71%, 9.29%, and 11.10%. ► The efficacy of authentication capability of the proposed scheme is demonstrated. ► The authentication ability is maintains while enhances the image quality.
With the rapid growth of numerous multimedia applications and communications through Internet, secret image sharing has been becoming a key technology for digital images in secured storage and confidential transmission. However, the stego-images are obtained by directly replacing the least-significant-bit planes (LSB) of cover-images with secret data and authentication code in most schemes, which will result in the distortion of the stego-images. In this paper, we proposed a novel secret image sharing scheme by applying optimal pixel adjustment process to enhance the image quality under different payload capacity and various authentication bits conditions. The experimental results showed that the proposed scheme has improved the image quality of stego images by 4.71%, 9.29%, and 11.10%, as compared with the schemes recently proposed by Yang et al., Chang et al., and Lin and Tsai. We also provide several experiments to demonstrate the efficacy of authentication capability of the proposed scheme. In other words, our scheme maintains the secret image sharing and authentication ability while enhances the image quality.</description><identifier>ISSN: 0164-1212</identifier><identifier>EISSN: 1873-1228</identifier><identifier>DOI: 10.1016/j.jss.2011.06.021</identifier><identifier>CODEN: JSSODM</identifier><language>eng</language><publisher>New York: Elsevier Inc</publisher><subject>( k, n)-Threshold scheme ; Authentication ; Authentication code ; Authentication protocols ; Cryptography ; Digital imaging ; Distortion ; Effectiveness ; Fragile watermark ; Hash message authentication code ; Image quality ; Information sharing ; Internet ; Multimedia ; Multimedia communications ; Optimal pixel adjustment ; Optimization ; Secret sharing ; Steganography ; Studies</subject><ispartof>The Journal of systems and software, 2011-12, Vol.84 (12), p.2196-2207</ispartof><rights>2011 Elsevier Inc.</rights><rights>Copyright Elsevier Sequoia S.A. Dec 2011</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c356t-7e2d0f2e22ebe2cfde4ea5f579bb222838b37d10c2c8dc39e1ef81191c79755f3</citedby><cites>FETCH-LOGICAL-c356t-7e2d0f2e22ebe2cfde4ea5f579bb222838b37d10c2c8dc39e1ef81191c79755f3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://dx.doi.org/10.1016/j.jss.2011.06.021$$EHTML$$P50$$Gelsevier$$H</linktohtml><link.rule.ids>314,780,784,3550,27924,27925,45995</link.rule.ids></links><search><creatorcontrib>Wu, Chia-Chun</creatorcontrib><creatorcontrib>Kao, Shang-Juh</creatorcontrib><creatorcontrib>Hwang, Min-Shiang</creatorcontrib><title>A high quality image sharing with steganography and adaptive authentication scheme</title><title>The Journal of systems and software</title><description>► We enhance the image quality under various authentication bits conditions. ► The proposed scheme has improved the image quality by 4.71%, 9.29%, and 11.10%. ► The efficacy of authentication capability of the proposed scheme is demonstrated. ► The authentication ability is maintains while enhances the image quality.
With the rapid growth of numerous multimedia applications and communications through Internet, secret image sharing has been becoming a key technology for digital images in secured storage and confidential transmission. However, the stego-images are obtained by directly replacing the least-significant-bit planes (LSB) of cover-images with secret data and authentication code in most schemes, which will result in the distortion of the stego-images. In this paper, we proposed a novel secret image sharing scheme by applying optimal pixel adjustment process to enhance the image quality under different payload capacity and various authentication bits conditions. The experimental results showed that the proposed scheme has improved the image quality of stego images by 4.71%, 9.29%, and 11.10%, as compared with the schemes recently proposed by Yang et al., Chang et al., and Lin and Tsai. We also provide several experiments to demonstrate the efficacy of authentication capability of the proposed scheme. In other words, our scheme maintains the secret image sharing and authentication ability while enhances the image quality.</description><subject>( k, n)-Threshold scheme</subject><subject>Authentication</subject><subject>Authentication code</subject><subject>Authentication protocols</subject><subject>Cryptography</subject><subject>Digital imaging</subject><subject>Distortion</subject><subject>Effectiveness</subject><subject>Fragile watermark</subject><subject>Hash message authentication code</subject><subject>Image quality</subject><subject>Information sharing</subject><subject>Internet</subject><subject>Multimedia</subject><subject>Multimedia communications</subject><subject>Optimal pixel adjustment</subject><subject>Optimization</subject><subject>Secret sharing</subject><subject>Steganography</subject><subject>Studies</subject><issn>0164-1212</issn><issn>1873-1228</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2011</creationdate><recordtype>article</recordtype><recordid>eNp9kD1PwzAQhi0EEqXwA9gsFqYEfzSJI6aq4kuqhIRgthz7kjhqk9R2ivrvcVUmBqa74XlP7z0I3VKSUkLzhy7tvE8ZoTQleUoYPUMzKgqeUMbEOZpFZhF3yi7RlfcdIaRghM3QxxK3tmnxblIbGw7YblUD2LfK2b7B3za02AdoVD80To3tAaveYGXUGOwesJpCC32wWgU79NjrFrZwjS5qtfFw8zvn6Ov56XP1mqzfX95Wy3WieZaHpABmSM2AMaiA6drAAlRWZ0VZVSyW5qLihaFEMy2M5iVQqAWlJdVFWWRZzefo_nR3dMNuAh_k1noNm43qYZi8LHMusmiER_LuD9kNk-tjOSlKUbCMsDJC9ARpN3jvoJajizbcQVIij45lJ6NjeXQsSS6j45h5PGUg_rm34KTXFnoNxjrQQZrB_pP-Aas-hQk</recordid><startdate>20111201</startdate><enddate>20111201</enddate><creator>Wu, Chia-Chun</creator><creator>Kao, Shang-Juh</creator><creator>Hwang, Min-Shiang</creator><general>Elsevier Inc</general><general>Elsevier Sequoia S.A</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20111201</creationdate><title>A high quality image sharing with steganography and adaptive authentication scheme</title><author>Wu, Chia-Chun ; Kao, Shang-Juh ; Hwang, Min-Shiang</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c356t-7e2d0f2e22ebe2cfde4ea5f579bb222838b37d10c2c8dc39e1ef81191c79755f3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2011</creationdate><topic>( k, n)-Threshold scheme</topic><topic>Authentication</topic><topic>Authentication code</topic><topic>Authentication protocols</topic><topic>Cryptography</topic><topic>Digital imaging</topic><topic>Distortion</topic><topic>Effectiveness</topic><topic>Fragile watermark</topic><topic>Hash message authentication code</topic><topic>Image quality</topic><topic>Information sharing</topic><topic>Internet</topic><topic>Multimedia</topic><topic>Multimedia communications</topic><topic>Optimal pixel adjustment</topic><topic>Optimization</topic><topic>Secret sharing</topic><topic>Steganography</topic><topic>Studies</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Wu, Chia-Chun</creatorcontrib><creatorcontrib>Kao, Shang-Juh</creatorcontrib><creatorcontrib>Hwang, Min-Shiang</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>The Journal of systems and software</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Wu, Chia-Chun</au><au>Kao, Shang-Juh</au><au>Hwang, Min-Shiang</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A high quality image sharing with steganography and adaptive authentication scheme</atitle><jtitle>The Journal of systems and software</jtitle><date>2011-12-01</date><risdate>2011</risdate><volume>84</volume><issue>12</issue><spage>2196</spage><epage>2207</epage><pages>2196-2207</pages><issn>0164-1212</issn><eissn>1873-1228</eissn><coden>JSSODM</coden><abstract>► We enhance the image quality under various authentication bits conditions. ► The proposed scheme has improved the image quality by 4.71%, 9.29%, and 11.10%. ► The efficacy of authentication capability of the proposed scheme is demonstrated. ► The authentication ability is maintains while enhances the image quality.
With the rapid growth of numerous multimedia applications and communications through Internet, secret image sharing has been becoming a key technology for digital images in secured storage and confidential transmission. However, the stego-images are obtained by directly replacing the least-significant-bit planes (LSB) of cover-images with secret data and authentication code in most schemes, which will result in the distortion of the stego-images. In this paper, we proposed a novel secret image sharing scheme by applying optimal pixel adjustment process to enhance the image quality under different payload capacity and various authentication bits conditions. The experimental results showed that the proposed scheme has improved the image quality of stego images by 4.71%, 9.29%, and 11.10%, as compared with the schemes recently proposed by Yang et al., Chang et al., and Lin and Tsai. We also provide several experiments to demonstrate the efficacy of authentication capability of the proposed scheme. In other words, our scheme maintains the secret image sharing and authentication ability while enhances the image quality.</abstract><cop>New York</cop><pub>Elsevier Inc</pub><doi>10.1016/j.jss.2011.06.021</doi><tpages>12</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0164-1212 |
ispartof | The Journal of systems and software, 2011-12, Vol.84 (12), p.2196-2207 |
issn | 0164-1212 1873-1228 |
language | eng |
recordid | cdi_proquest_miscellaneous_963852013 |
source | Access via ScienceDirect (Elsevier) |
subjects | ( k, n)-Threshold scheme Authentication Authentication code Authentication protocols Cryptography Digital imaging Distortion Effectiveness Fragile watermark Hash message authentication code Image quality Information sharing Internet Multimedia Multimedia communications Optimal pixel adjustment Optimization Secret sharing Steganography Studies |
title | A high quality image sharing with steganography and adaptive authentication scheme |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-21T19%3A36%3A25IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20high%20quality%20image%20sharing%20with%20steganography%20and%20adaptive%20authentication%20scheme&rft.jtitle=The%20Journal%20of%20systems%20and%20software&rft.au=Wu,%20Chia-Chun&rft.date=2011-12-01&rft.volume=84&rft.issue=12&rft.spage=2196&rft.epage=2207&rft.pages=2196-2207&rft.issn=0164-1212&rft.eissn=1873-1228&rft.coden=JSSODM&rft_id=info:doi/10.1016/j.jss.2011.06.021&rft_dat=%3Cproquest_cross%3E963852013%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=898725029&rft_id=info:pmid/&rft_els_id=S0164121211001488&rfr_iscdi=true |