Publication Type:

Journal Article

Source:

Communications in Computer and Information Science, Volume 191 CCIS, Number PART 2, Kochi, p.490-497 (2011)

ISBN:

9783642227134

URL:

http://www.scopus.com/inward/record.url?eid=2-s2.0-80051558552&partnerID=40&md5=6867e7e25bc3e908be09f9d818ff92c3

Keywords:

Cover-image, Image sharing, Lossless, modulo operator, Secret data, Secret image sharing, Secret images, Secret sharing, Secret sharing schemes, Steganography, Stego image, Threshold schemes, Vision, Visual cryptography, Visual perception, Visual secret sharing schemes

Abstract:

A novel approach to secret image sharing based on a (t,n)-threshold scheme with steganography is proposed. A secret image is first processed into n-shares which are then hidden in n-user selected different cover/camouflage images. Any t out of n participants can cooperate to reveal the secret data. The important essential of secret image sharing approaches is that the revealed secret image must be lossless. In the earlier visual secret sharing (VSS) scheme, the secret image can be shared by generating n random like images, called shadows or shares. The produced shadows can be transmitted instead of the original secret image. Once involved participants stack more than t shadows, the secret image can be revealed by visual perception without computation. But the generated shadows are often meaningless. A malicious intruder may be attracted to such meaningless shadows delivered over an insecure channel. To handle such meaningless threat, the steganography approach is utilized to embed the shadows in different cover images, called stego images. From visual perception, the content of the stego image is meaningful and can conceal the shadows from intruders .This scheme is a novel image sharing technique that satisfies all of the essentials of the traditional secret sharing scheme. The use of n different cover images further prevent the intruders from imagining an secret being transferred when compared to the shares being embedded into n similar cover images. © 2011 Springer-Verlag.

Notes:

cited By (since 1996)0; Conference of org.apache.xalan.xsltc.dom.DOMAdapter@592ea4e2 ; Conference Date: org.apache.xalan.xsltc.dom.DOMAdapter@54b1f2c Through org.apache.xalan.xsltc.dom.DOMAdapter@6eb846b; Conference Code:86007

Cite this Research Publication

N. Jagadeesh, Nandakumar, A., Harmya, P., and Anju, S. S., “Secret image sharing using steganography with different cover images”, Communications in Computer and Information Science, vol. 191 CCIS, pp. 490-497, 2011.