Proceedings ArticleDOI
A new steganographic method based on information sharing via PNG images
Che-Wei Lee,Wen-Hsiang Tsai +1 more
- Vol. 5, pp 807-811
Reads0
Chats0
TLDR
A new steganographic method via PNG images based on the information sharing technique is proposed, where the coefficients of the polynomial functions of the Shamir's (k, n)-threshold secret sharing method are utilized as carriers of a given secret data string to be hidden to generate shares.Abstract:
A new steganographic method via PNG images based on the information sharing technique is proposed. The coefficients of the polynomial functions of the Shamir's (k, n)-threshold secret sharing method are utilized as carriers of a given secret data string to be hidden to generate shares. The shares then are embedded into the alpha-channel plane of a cover PNG image. The resulting stego-image with perceptible white noise is further removed by mapping computed share values into suitable ranges. Appropriate measures for enhancing the security of the proposed method are also described. Experimental results show the effect of the proposed method.read more
Citations
More filters
Steganographic Techniques of Data Hiding using Digital Images
Babloo Saha,Shuchi Sharma +1 more
TL;DR: Steganography has been manifested long way back during the ancient Greek times as mentioned in this paper, i.e., Histiaeus in 499 BC shaved the head of his slave and wrote message on his scalp, after the hair grew back, slave was dispatched with the hidden message.
Journal ArticleDOI
Steganographic Techniques of Data Hiding Using Digital Images (Review Paper)
Babloo Saha,Shuchi Sharma +1 more
TL;DR: This paper intends to give thorough understanding and evolution of different existing digital image steganography techniques of data hiding in spatial, transform and compression domains.
Steganography Using Stochastic Diffusion for the Covert Communication of Digital Images
TL;DR: The theoretical background to the method, which includes a comprehensive study of the diffusion equation and its properties leading to a convolution model for encrypting data with a stochastic field that is fundamental to the approach considered, is introduced.
Application of Stochastic Diffusion for Hiding High Fidelity Encrypted Images
TL;DR: A new method of encrypting and then hiding full colour images in three full colour host images with out loss of fidelity following data extraction and decryption is presented.
References
More filters
Journal ArticleDOI
How to share a secret
TL;DR: This technique enables the construction of robust key management schemes for cryptographic systems that can function securely and reliably even when misfortunes destroy half the pieces and security breaches expose all but one of the remaining pieces.
Journal ArticleDOI
Hiding data in images by simple LSB substitution
Chi-Kwong Chan,Lee-Ming Cheng +1 more
TL;DR: By applying an optimal pixel adjustment process to the stego-image obtained by the simple LSB substitution method, the image quality of the stega-image can be greatly improved with low extra computational complexity.
Journal ArticleDOI
Image hiding by optimal LSB substitution and genetic algorithm
TL;DR: A novel method to embed important data in the host image so that the interceptors will not notice about the existence of the data is developed and an improved hiding technique is developed to obtain a high-quality embedding result.
Journal ArticleDOI
Secret image sharing with steganography and authentication
Chang-Chou Lin,Wen-Hsiang Tsai +1 more
TL;DR: A novel approach to secret image sharing based on a (k, n)-threshold scheme with the additional capabilities of steganography and authentication with the capability of authenticating the fidelity of each processed camouflage image, called a stego-image is proposed.
Journal ArticleDOI
Wavelet tree quantization for copyright protection watermarking
Shih-Hao Wang,Yuan-Pei Lin +1 more
TL;DR: This paper proposes a wavelet-tree-based blind watermarking scheme for copyright protection that embeds each watermark bit in perceptually important frequency bands, which renders the mark more resistant to frequency based attacks.
Related Papers (5)
Authentication of binary document images in PNG format based on a secret sharing technique
Che-Wei Lee,Wen-Hsiang Tsai +1 more