Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

Analysis of Secret Image Sharing using Shared Image

Print
PDF
International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 108 - Number 7
Year of Publication: 2014
Authors:
I. Edwin Dayanand
R. K. Selva Kumar
10.5120/18926-0283

Edwin I Dayanand and R.k.selva Kumar. Article: Analysis of Secret Image Sharing using Shared Image. International Journal of Computer Applications 108(7):35-39, December 2014. Full text available. BibTeX

@article{key:article,
	author = {I. Edwin Dayanand and R.k.selva Kumar},
	title = {Article: Analysis of Secret Image Sharing using Shared Image},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {108},
	number = {7},
	pages = {35-39},
	month = {December},
	note = {Full text available}
}

Abstract

A secret image sharing scheme with steganography lacks to provide the authentication, quality of stego-image and more cheating done by the dishonest participants. So, a secret image sharing using shared image technique is proposed to prevent the participants from the subsidiary stipulation of a false stego-image (an image containing the hidden secret image). A secret image is first processed into n shares which are then hidden in n user-selected suppression images. It is recommended to select these suppression images to contain well-known stuffing to increase the steganographic effect for the security protection. Additionally, an image watermarking technique is engaged to embed fragile watermark signals into the suppression images by the use of parity-bit checking, thus providing the ability of authenticating the reliability of each processed suppression image. During the secret image recovery process, each stego-image carry by a participant is first verified for its reliability by checking the uniformity of the parity conditions found in the image pixels. This facilitates to avert the participant from subsidiary stipulation of a false stego-image. Some effective techniques for handling large images as well as for enhancing security protection are employed. As a result, the secret image sharing using shared image scheme offers a high secure and effective mechanism for secret image sharing that is not found in existing secret image sharing methods. High-class experimental results proving the authentication capability, secret hiding effectiveness and quality of the proposed approach are included.

References

  • Chi-Shiang Chan. , Ping-En Sung. , "Secret Image Sharing with Steganography and Authentication Using Dynamic Programming Strategy," International Conference on Pervasive Computing Signal Processing and Applications, 2010.
  • Chin-Chen Chang. , Pei-Yu Lin. , Chi-Shiang Chan. , "Secret Image Sharing with Reversible Steganography," International Conference on Computational Intelligence and Natural Computing, 2009.
  • Pei-Yu Lin. , Chi-Shiang Chan. , "Invertible secret image sharing with steganography," Elsevier Science Inc, Volume 31 Issue 13, 2010.
  • Weiqi Luo. , Fangjun Huang. , Jiwu Huang. , "Edge Adaptive Image Steganography Based on LSB Matching Revisited," IEEE Transactions on Information Forensics and Security, Volume: 5, Issue: 2, 2010.
  • Anbarasi, L. J. , Kannan, S. , "Secured secret color image sharing with steganography," International Conference on Recent Trends in Information Technology, 2012.
  • Guo-Shiang Lin. , Yi-Ting Chang. , Wen-Nung Lie. ," A Framework of Enhancing Image Steganography With Picture Quality Optimization and Anti-Steganalysis Based on Simulated Annealing Algorithm," IEEE Transactions on Multimedia, Volume:12, Issue:5, 2010.
  • Ulutas, G. ,Ulutas, M. , Nabiyev, V. V. , "A new casccaded secret image sharing scheme," IEEE Conference on Signal Processing and Communications Applications, 2012.
  • An, L. , Gao, X. , Li, X. , Tao, D. , Deng, C. , Li, J. , "Robust Reversible Watermarking via Clustering and Enhanced Pixel-Wise Masking," IEEE Transactions on Image Processing, Volume :21, Issue: 8, 2012.
  • Chin-Chen Chang. , Chia-Chen Lin. , Chia-Hsuan Lin. , Yi-Hui Chen. , "A novel secret image sharing scheme in color images using small shadow images," Elsevier Science Inc. , Volume:178, Issue:11, 2008.
  • Chin-Pan Huang. , "Sharing secret images using integer single or multiple wavelets transform," Journal of Communications Technology and Electronics, Volume: 56, Issue: 1, pp 43-51, 2011.
  • Uttam Kr. Mondal. , Jyotsna Kumar Mandal. ," Secret Image Embedded Authentication of Song Signal through Wavelet Transform (IAWT)," IEEE Transaction on Advances in Computing and Information Technology, Volume: 176, pp 199-208, 2012.
  • Ya-Lin Li. ,Wen-Hsiang Tsai," New Image Steganography via Secret-Fragment-Visible Mosaic Images by Nearly-Reversible Color Transformation," IEEE transaction on Advances in Visual Computing, Volume: 6939, 2011.