CFP last date
20 January 2025
Call for Paper
February Edition
IJCA solicits high quality original research papers for the upcoming February edition of the journal. The last date of research paper submission is 20 January 2025

Submit your paper
Know more
Reseach Article

Secret Sharing using Image Hashing

by Khaled Ahmed Nagaty
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 73 - Number 20
Year of Publication: 2013
Authors: Khaled Ahmed Nagaty
10.5120/13009-0130

Khaled Ahmed Nagaty . Secret Sharing using Image Hashing. International Journal of Computer Applications. 73, 20 ( July 2013), 14-22. DOI=10.5120/13009-0130

@article{ 10.5120/13009-0130,
author = { Khaled Ahmed Nagaty },
title = { Secret Sharing using Image Hashing },
journal = { International Journal of Computer Applications },
issue_date = { July 2013 },
volume = { 73 },
number = { 20 },
month = { July },
year = { 2013 },
issn = { 0975-8887 },
pages = { 14-22 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume73/number20/13009-0130/ },
doi = { 10.5120/13009-0130 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:40:36.801885+05:30
%A Khaled Ahmed Nagaty
%T Secret Sharing using Image Hashing
%J International Journal of Computer Applications
%@ 0975-8887
%V 73
%N 20
%P 14-22
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper presents a cryptographic technique that encrypts secret information using a coding image by transforming the pixels of this image from the intensity domain to the characters domain using a hash function. In the proposed technique, the coding image will be used to encrypt the secret information at the sender and decrypt it at the receiver using the pixels whose intensity values are transformed to characters. A matrix of characters corresponding to the coding image is generated where each character in this matrix corresponds to a pixel in the coding image and each character in the secret information is mapped to a character in the matrix of characters. The locations of characters in the matrix of characters that correspond to pixels in the coding image and correspond to characters in the secret information forms the pixels map. The pixels map is encrypted using a secret key before being sent to the receiver on a secure communication channel different from that used to send the coding image and at different times. Upon receiving the coding image and the encrypted pixels map the receiver uses the secret key to decrypt the pixels map and uses the coding image and the hash function to generate the matrix of characters. Each location in the pixels map is used to retrieve a character from the matrix of characters in order to decrypt the secret information. Experimental results showed the effectiveness and the efficiency of the proposed algorithm where a message was encrypted using a coding image without modifying its pixels and it was decrypted without errors.

References
  1. B. Dunbar. 2002. A detailed look at Steganographic Techniques and their use in an Open-Systems Environment, Sans Institute, 1.
  2. C. Christian. 1998. An Information-Theoretic Model for Steganography, Proceedings of 2nd Workshop on Information Hiding, MIT Laboratory for Computer Science.
  3. M. Chen, N. Memon, E. K. Wong. 2008. Data hiding in document images, in: H. Nemati (Ed. ). Premier Reference Source–Information Security and Ethics: Concepts Methodologies, Tools and Applications, New York: Information Science Reference, 2008, 438-450.
  4. Nagham Hamid, Abid Yahya, R. Badlishah Ahmad & Osamah M. Al-Qershi. 2012. "Image Steganography Techniques: An Overview", International Journal of Computer Science and Security (IJCSS), Volume (6): Issue (3): 2012, 168-187.
  5. M. Kharazi, H. T. Sencar, and N. Memon. (2004, Apr). Image steganography: Concepts and practice. WSPC/Lecture Notes Series: 9in x 6in, [On line], pp. 1-49. Available on: http://iwearshorts. com/Mike/uploads/2011/06/10. 1. 1. 62. 8194. pdf [Aug. 2011].
  6. P. Kruus, C. Scace, M. Heyman, and M. Mundy. (2003). A survey of steganography techniques for image files. Advanced Security Research Journal. [On line], 5(1), pp. 41-52. Available on: http://www. isso. sparta. com/documents/asrjv5. pdf#page=47 [Oct. , 2011].
  7. N. F. Johnson and S. Jajodia. (1998, Feb. ). Exploring steganography: seeing the unseen. IEEE Computer Journal. [On line]. 31(2), 26-34. Available: http://www. jjtc. com/pub/r2026. pdf [Jun. 2011].
  8. A. Cheddad, J. Condell, K. Curran and P. M. Kevitt. 2010. Digital image steganography: survey and analysis of current methods. Signal Processing Journal. [On line]. 90(3),727-752. Available: http://www. abbascheddad. net/Survey. pdf [Aug. 2011].
  9. A. Westfeld. 2001. F5-A steganographic algorithm: high capacity despite better steganalysis. In Proc. of the 4th Information Hiding Workshop, LNCS, 2001, 289-302.
  10. H. S. Majunatha Reddy and K. B. Raja. (2009). "High capacity and security steganography using discrete wavelet transform. " International Journal of Computer Science and Security. [On line]. 3(6), 462-472. Available:http://www. cscjournals. org/csc/manuscript/Journals/IJCSS/volume3/Issue6/IJCSS-163. pdf [Jun. , 2011].
  11. S. Areepongsa, N. Kaewkammerd, Y. F. Syed, and K. R. Rao. 2000. Exploring on steganography for low bit rate Wavelet based coder in image retrieval system. In Proc. of IEEE TENCON, 2000, pp. 250-255.
  12. S. Areepongsa, N. Kaewkammerd, Y. F. Syed, and K. R. Rao. 2000. Steganography for low bitrate Wavelet based image coder. In Proc. of IEEE ICIP, 2000, pp. 597-600.
  13. N. K. Abdulaziz and K. K. Pang. 2000. Robust data hiding for images. In Proc. of IEEE International Conference on Communication Technology, 2000, 380-383.
  14. L. D. Paulson. (2006, Aug. ). New system fights steganography. News briefs. IEEE Computer Society. [On line]. 39(8), 25-27. Available:http://journals2. scholarsportal. info/details. xqy?uri=/00189162/v39i0008/25_nsfs. xml [Jul. ,2011].
  15. A. A. Abdelwahab and L. A. Hasan. 2008. A discrete Wavelet Transform based technique for image data hiding. In Proc. of 25th National Radio Science Conference, 2008, 1-9.
  16. P. Kruus, C. Scace, M. Heyman, and M. Mundy. (2003), A survey of steganography techniques for image files. Advanced Security Research Journal. [On line], 5(1), pp. 41-52. Available: http://www. isso. sparta. com/documents/asrjv5. pdf#page=47 [Oct. , 2011].
  17. A. Westfeld and A. Pfittzmann. 1999. Attacks on steganographic systems- breaking the steganographic utilities Ezstego, Jsteg, Steganos, and S-tools-and some lessons learned. In Proc. of the 3rd Internet Workshop on Information Hiding, 1999, 61-76.
  18. H. Wang and S. Wang. (2004, Oct. ). "Cyber Warfare: steganography vs. steganalysis. "Communications of the ACM. [On line]. 47(10), 76-82. Available: www. csc. liv. ac. uk/~leszek/COMP526/week4/comp526-3. pdf [Mar. , 2011].
  19. L. M. Marvel, C. G. Boncelet Jr. , C. T. Retter. 1999. Spread spectrum image steganography. IEEE Trans. image processing. [On line]. 8(8), pp. 1075-1083. Available:http://www. mendeley. com/research/spread-spectrum-image-steganography-1/[Apr. , 2011].
  20. F. Alturki and R. Merserau. 2001. Secure blind image steganographic technique using Discrete Fourier Transform. In Proc. IEEE International Conference on Image Processing, 2001 ,16-162.
  21. R. J. Anderson and F. A. P. Petitcolas. (1998, May). On the limits of steganography. IEEE Journal of Selected Area in Communications. [On line]. 16(4), 474-481. Available: http://www. cl. cam. ac. uk/~rja14/Papers/jsac98-limsteg. pdf [Jun. , 2011].
  22. K. C. Widadi, P. H. C. C. Wah. Blind steganography using direct sequence/frequency hopping spread spectrum technique. Information, Communications and Signal Processing, 5th International Conference, 2006. pp. 1125-1129.
  23. M. Kharazi, H. T. Sencar, and N. Memon. (2004, Apr. ). "Image steganography: Concepts and practice. " WSPC/Lecture Notes Series: 9in x 6in, [On line], pp. 1-49. Available: http://iwearshorts. com/Mike/uploads/2011/06/10. 1. 1. 62. 8194. pdf. [Aug. 2011].
  24. S. C. Katzenbeisser. 2000. Principles of Steganography. In Information Hiding Techniques for Steganography and Digital Watermarking, S. Katzenbeisser and F. Petitcolas, Ed. London: Artech House, 2000, 43-78.
  25. R. Radhakrishnan, K. Shanmugasundaram, and N. Memon. 2002. Data masking: a secure-coding channel paradigm. In IEEE Workshop on Multimedia Signal Processing, 2002, 339- 342.
  26. P. Sallee. 2004. Model-based steganography. In Proc. the 2nd International Workshop on Digital Watermarking, LNCS, 2004. , 254-260.
  27. Y. O. Yildiz, K. Panetta, and S. Agaian. (2007, Apr. ). New quantization matrices for jpeg steganography. " International Society for Optical Engineering. [On line]. 6579(1), pp. 6579OD. Available: link. aip. org/link/?PSISDG/6579/65790D/1. [Nov. , 2011].
  28. IconArchive, 2013. Available: http://www. iconarchive. com/tag/file. Visited 18/07/2013.
  29. Pei-Yu Lin, Chi-Shiang Chan. 2010. Invertible secret image sharing with steganography, Pattern Recognition Characters 31, 1887–1893.
  30. Chang-Chou Lin, Wen-Hsiang Tsai. 2004 Secret image sharing with steganography and authentication, Journal of Systems and Software, Volume 73, Issue 3, November–December 2004, Pages 405-414
Index Terms

Computer Science
Information Sciences

Keywords

Secret sharing Image pixels Image transformation Cryptography Steganography Information Data hiding