Back close

Secret image sharing using steganography with different cover images

Publication Type : Journal Article

Publisher : Communications in Computer and Information Science

Source : Communications in Computer and Information Science, Volume 191 CCIS, Number PART 2, Kochi, p.490-497 (2011)

Url :

Keywords : Cover-image, Image sharing, Lossless, modulo operator, Secret data, Secret image sharing, Secret images, Secret sharing, Secret sharing schemes, Steganography, Stego image, Threshold schemes, Vision, Visual cryptography, Visual perception, Visual secret sharing schemes

Campus : Coimbatore

School : Centre for Cybersecurity Systems and Networks

Department : cyber Security

Year : 2011

Abstract : A novel approach to secret image sharing based on a (t,n)-threshold scheme with steganography is proposed. A secret image is first processed into n-shares which are then hidden in n-user selected different cover/camouflage images. Any t out of n participants can cooperate to reveal the secret data. The important essential of secret image sharing approaches is that the revealed secret image must be lossless. In the earlier visual secret sharing (VSS) scheme, the secret image can be shared by generating n random like images, called shadows or shares. The produced shadows can be transmitted instead of the original secret image. Once involved participants stack more than t shadows, the secret image can be revealed by visual perception without computation. But the generated shadows are often meaningless. A malicious intruder may be attracted to such meaningless shadows delivered over an insecure channel. To handle such meaningless threat, the steganography approach is utilized to embed the shadows in different cover images, called stego images. From visual perception, the content of the stego image is meaningful and can conceal the shadows from intruders .This scheme is a novel image sharing technique that satisfies all of the essentials of the traditional secret sharing scheme. The use of n different cover images further prevent the intruders from imagining an secret being transferred when compared to the shares being embedded into n similar cover images. © 2011 Springer-Verlag.

Cite this Research Publication : N. Jagadeesh, Nandakumar, A., Harmya, P., and Anju, S. S., “Secret image sharing using steganography with different cover images”, Communications in Computer and Information Science, vol. 191 CCIS, pp. 490-497, 2011.

Admissions Apply Now