We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Analysis of Secret Image Sharing using Shared Image

by I. Edwin Dayanand, R.k.selva Kumar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 108 - Number 7
Year of Publication: 2014
Authors: I. Edwin Dayanand, R.k.selva Kumar
10.5120/18926-0283

I. Edwin Dayanand, R.k.selva Kumar . Analysis of Secret Image Sharing using Shared Image. International Journal of Computer Applications. 108, 7 ( December 2014), 35-39. DOI=10.5120/18926-0283

@article{ 10.5120/18926-0283,
author = { I. Edwin Dayanand, R.k.selva Kumar },
title = { Analysis of Secret Image Sharing using Shared Image },
journal = { International Journal of Computer Applications },
issue_date = { December 2014 },
volume = { 108 },
number = { 7 },
month = { December },
year = { 2014 },
issn = { 0975-8887 },
pages = { 35-39 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume108/number7/18926-0283/ },
doi = { 10.5120/18926-0283 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:42:23.946459+05:30
%A I. Edwin Dayanand
%A R.k.selva Kumar
%T Analysis of Secret Image Sharing using Shared Image
%J International Journal of Computer Applications
%@ 0975-8887
%V 108
%N 7
%P 35-39
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A secret image sharing scheme with steganography lacks to provide the authentication, quality of stego-image and more cheating done by the dishonest participants. So, a secret image sharing using shared image technique is proposed to prevent the participants from the subsidiary stipulation of a false stego-image (an image containing the hidden secret image). A secret image is first processed into n shares which are then hidden in n user-selected suppression images. It is recommended to select these suppression images to contain well-known stuffing to increase the steganographic effect for the security protection. Additionally, an image watermarking technique is engaged to embed fragile watermark signals into the suppression images by the use of parity-bit checking, thus providing the ability of authenticating the reliability of each processed suppression image. During the secret image recovery process, each stego-image carry by a participant is first verified for its reliability by checking the uniformity of the parity conditions found in the image pixels. This facilitates to avert the participant from subsidiary stipulation of a false stego-image. Some effective techniques for handling large images as well as for enhancing security protection are employed. As a result, the secret image sharing using shared image scheme offers a high secure and effective mechanism for secret image sharing that is not found in existing secret image sharing methods. High-class experimental results proving the authentication capability, secret hiding effectiveness and quality of the proposed approach are included.

References
  1. Chi-Shiang Chan. , Ping-En Sung. , "Secret Image Sharing with Steganography and Authentication Using Dynamic Programming Strategy," International Conference on Pervasive Computing Signal Processing and Applications, 2010.
  2. Chin-Chen Chang. , Pei-Yu Lin. , Chi-Shiang Chan. , "Secret Image Sharing with Reversible Steganography," International Conference on Computational Intelligence and Natural Computing, 2009.
  3. Pei-Yu Lin. , Chi-Shiang Chan. , "Invertible secret image sharing with steganography," Elsevier Science Inc, Volume 31 Issue 13, 2010.
  4. Weiqi Luo. , Fangjun Huang. , Jiwu Huang. , "Edge Adaptive Image Steganography Based on LSB Matching Revisited," IEEE Transactions on Information Forensics and Security, Volume: 5, Issue: 2, 2010.
  5. Anbarasi, L. J. , Kannan, S. , "Secured secret color image sharing with steganography," International Conference on Recent Trends in Information Technology, 2012.
  6. Guo-Shiang Lin. , Yi-Ting Chang. , Wen-Nung Lie. ," A Framework of Enhancing Image Steganography With Picture Quality Optimization and Anti-Steganalysis Based on Simulated Annealing Algorithm," IEEE Transactions on Multimedia, Volume:12, Issue:5, 2010.
  7. Ulutas, G. ,Ulutas, M. , Nabiyev, V. V. , "A new casccaded secret image sharing scheme," IEEE Conference on Signal Processing and Communications Applications, 2012.
  8. An, L. , Gao, X. , Li, X. , Tao, D. , Deng, C. , Li, J. , "Robust Reversible Watermarking via Clustering and Enhanced Pixel-Wise Masking," IEEE Transactions on Image Processing, Volume :21, Issue: 8, 2012.
  9. Chin-Chen Chang. , Chia-Chen Lin. , Chia-Hsuan Lin. , Yi-Hui Chen. , "A novel secret image sharing scheme in color images using small shadow images," Elsevier Science Inc. , Volume:178, Issue:11, 2008.
  10. Chin-Pan Huang. , "Sharing secret images using integer single or multiple wavelets transform," Journal of Communications Technology and Electronics, Volume: 56, Issue: 1, pp 43-51, 2011.
  11. Uttam Kr. Mondal. , Jyotsna Kumar Mandal. ," Secret Image Embedded Authentication of Song Signal through Wavelet Transform (IAWT)," IEEE Transaction on Advances in Computing and Information Technology, Volume: 176, pp 199-208, 2012.
  12. Ya-Lin Li. ,Wen-Hsiang Tsai," New Image Steganography via Secret-Fragment-Visible Mosaic Images by Nearly-Reversible Color Transformation," IEEE transaction on Advances in Visual Computing, Volume: 6939, 2011.
Index Terms

Computer Science
Information Sciences

Keywords

Secret image sharing Steganography Authentication suppression image Data hiding Stego-image Fragile watermarking.