scispace - formally typeset
Proceedings ArticleDOI

A new steganographic method based on information sharing via PNG images

Che-Wei Lee, +1 more
- Vol. 5, pp 807-811
Reads0
Chats0
TLDR
A new steganographic method via PNG images based on the information sharing technique is proposed, where the coefficients of the polynomial functions of the Shamir's (k, n)-threshold secret sharing method are utilized as carriers of a given secret data string to be hidden to generate shares.
Abstract
A new steganographic method via PNG images based on the information sharing technique is proposed. The coefficients of the polynomial functions of the Shamir's (k, n)-threshold secret sharing method are utilized as carriers of a given secret data string to be hidden to generate shares. The shares then are embedded into the alpha-channel plane of a cover PNG image. The resulting stego-image with perceptible white noise is further removed by mapping computed share values into suitable ranges. Appropriate measures for enhancing the security of the proposed method are also described. Experimental results show the effect of the proposed method.

read more

Content maybe subject to copyright    Report

Citations
More filters

Steganographic Techniques of Data Hiding using Digital Images

Babloo Saha, +1 more
TL;DR: Steganography has been manifested long way back during the ancient Greek times as mentioned in this paper, i.e., Histiaeus in 499 BC shaved the head of his slave and wrote message on his scalp, after the hair grew back, slave was dispatched with the hidden message.
Journal ArticleDOI

Steganographic Techniques of Data Hiding Using Digital Images (Review Paper)

TL;DR: This paper intends to give thorough understanding and evolution of different existing digital image steganography techniques of data hiding in spatial, transform and compression domains.

Steganography Using Stochastic Diffusion for the Covert Communication of Digital Images

TL;DR: The theoretical background to the method, which includes a comprehensive study of the diffusion equation and its properties leading to a convolution model for encrypting data with a stochastic field that is fundamental to the approach considered, is introduced.

Application of Stochastic Diffusion for Hiding High Fidelity Encrypted Images

TL;DR: A new method of encrypting and then hiding full colour images in three full colour host images with out loss of fidelity following data extraction and decryption is presented.
References
More filters
Journal ArticleDOI

How to share a secret

TL;DR: This technique enables the construction of robust key management schemes for cryptographic systems that can function securely and reliably even when misfortunes destroy half the pieces and security breaches expose all but one of the remaining pieces.
Journal ArticleDOI

Hiding data in images by simple LSB substitution

TL;DR: By applying an optimal pixel adjustment process to the stego-image obtained by the simple LSB substitution method, the image quality of the stega-image can be greatly improved with low extra computational complexity.
Journal ArticleDOI

Image hiding by optimal LSB substitution and genetic algorithm

TL;DR: A novel method to embed important data in the host image so that the interceptors will not notice about the existence of the data is developed and an improved hiding technique is developed to obtain a high-quality embedding result.
Journal ArticleDOI

Secret image sharing with steganography and authentication

TL;DR: A novel approach to secret image sharing based on a (k, n)-threshold scheme with the additional capabilities of steganography and authentication with the capability of authenticating the fidelity of each processed camouflage image, called a stego-image is proposed.
Journal ArticleDOI

Wavelet tree quantization for copyright protection watermarking

TL;DR: This paper proposes a wavelet-tree-based blind watermarking scheme for copyright protection that embeds each watermark bit in perceptually important frequency bands, which renders the mark more resistant to frequency based attacks.
Related Papers (5)