Advertisement

Multimedia Tools and Applications

, Volume 76, Issue 6, pp 7677–7698 | Cite as

A secure image sharing scheme with high quality stego-images based on steganography

  • Junhui HeEmail author
  • Weiqiang Lan
  • Shaohua Tang
Article

Abstract

Image sharing can be utilized to protect important commercial, military or private images against a single point of failure. Many existing image sharing schemes may have one or more of the security weaknesses as follows: First, noise-like image shares may easily arouse the attackers’ attention; Second, cheating in the recovery of the secret image cannot be prevented effectively; Third, the requisite size of cover images may be very large; Finally, poor quality of the stego-images may lessen camouflage effects. In this paper, a novel secure image sharing scheme with high quality stego-images is proposed. With the use of LOCO-I compression as a preprocessing approach, the statistical correlations between neighboring pixels of a secret image drop significantly, which may greatly enhance the visual security of the proposed scheme. And the necessary size of cover images is reduced. Moreover, the PSNR values of stego-images are much higher than the related works. In order to detect three kinds of deception during secret image reconstruction, the hash-based message authentication codes of an image share, the value of argument x and the identity ID of a participant are embedded into a cover image together with the image share. In addition, the application of dynamic embedding with a random strategy further enhance the security of our scheme.

Keywords

Image sharing Steganography LOCO-I compression Message authentication code Dynamic embedding 

Notes

Acknowledgments

The authors thank the anonymous reviewers for their insightful comments and suggestions. This work was partially supported by the 973 Program (No. 2014CB360501), the National Natural Science Foundation of China (No. U1135004 and No. 61170080), Guangdong Provincial Natural Science Foundation (No. 2014A030308006), and Guangdong Province Universities and Colleges Pearl River Scholar Funded Scheme (2011).

References

  1. 1.
    Alvarez G, Hernández Encinas L, Martín del Rey A (2008) A multisecret sharing scheme for color images based on cellular automata. Inf Sci 178(22):4382–4395. doi: 10.1016/j.ins.2008.07.010 CrossRefzbMATHGoogle Scholar
  2. 2.
    Blakley G (1979) Safeguarding cryptographic keys. In: Proceedings of national computer conference (AFIPS1979), vol 48, pp 313–317Google Scholar
  3. 3.
    Chan CK, Cheng LM (2004) Hiding data in images by simple LSB substitution. Pattern Recogn 37(3):469–474CrossRefzbMATHGoogle Scholar
  4. 4.
    Chan CS, Sung PE (2010) Secret image sharing with steganography and authentication using dynamic programming strategy. In: First International Conference on Pervasive Computing Signal Processing and Applications (PCSPA), pp 382–385. doi: 10.1109/PCSPA.2010.98
  5. 5.
    Chan CS, Lin CY, Lin YH (2012) Apply the modulus function to secret image sharing. International Journal of Innovative Computing Information and Control 8(1A):375–385Google Scholar
  6. 6.
    Chang CC, Hsieh YP, Lin CH (2008) Sharing secrets in stego images with authentication. Pattern Recogn 41(10):3130–3137CrossRefzbMATHGoogle Scholar
  7. 7.
    Chen CC, Wu WJ, Chen JL (2015) Highly efficient and secure multi-secret image sharing scheme. Multimedia Tools and Applications:1–16Google Scholar
  8. 8.
    Eslami Z, Ahmadabadi J (2011) Secret image sharing with authentication-chaining and dynamic embedding. J Syst Softw 84(5):803–809CrossRefGoogle Scholar
  9. 9.
    Gloe T, Bhme R (2010) The ‘Dresden Image Database’ for benchmarking digital image forensics. In: Proceedings of the 25th symposium on applied computing (ACM SAC 2010), vol 2, pp 1585–1591Google Scholar
  10. 10.
    Guo C, Chang CC, Qin C (2012) A hierarchical threshold secret image sharing. Pattern Recogn Lett 33(1):83–91CrossRefGoogle Scholar
  11. 11.
    Hsieh SL, Tsai IJ, Yeh CP, Chang CM (2011) An image authentication scheme based on digital watermarking and image secret sharing. Multimedia Tools and Applications 52(2–3):597–619CrossRefGoogle Scholar
  12. 12.
    Islam N, Puech W, Hayat K, Brouzet R (2011) Application of homomorphism to secure image sharing. Opt Commun 284(19):4412–4429CrossRefGoogle Scholar
  13. 13.
    Jin J, hong Wu Z (2012) A secret image sharing based on neighborhood configurations of 2-D cellular automata. Opt Laser Technol 44(3):538–548CrossRefGoogle Scholar
  14. 14.
    Khosravi M, Naghsh-Nilchi A (2014) A novel joint secret image sharing and robust steganography method using wavelet. Multimedia Systems 20(2):215–226CrossRefGoogle Scholar
  15. 15.
    Lee CW, Tsai WH (2012) A secret-sharing-based method for authentication of grayscale document images via the use of the PNG image with a data repair capability. IEEE Trans Image Process 21(1):207–218MathSciNetCrossRefGoogle Scholar
  16. 16.
    Li P, Kong Q, Ma Y (2014) Image secret sharing and hiding with authentication based on PSNR estimation. Journal of Information Hiding and Multimedia Signal Processing 5(3):353–366Google Scholar
  17. 17.
    Lin CC, Tsai WH (2004) Secret image sharing with steganography and authentication. J Syst Softw 7(3):405–414CrossRefGoogle Scholar
  18. 18.
    Lin PY, Chang CC (2011) Cheating resistance and reversibility-oriented secret sharing mechanism. IET Inf Secur 5(2):81–92CrossRefGoogle Scholar
  19. 19.
    Naor M, Shamir A (1995) Visual cryptography. In: Advances in cryptology - EUROCRYPT’94, Perugia, Italy, LNCS, vol 950, pp 1–12Google Scholar
  20. 20.
    Shamir A (1979) How to share a secret. Commun ACM 22(11):612–613MathSciNetCrossRefzbMATHGoogle Scholar
  21. 21.
    Thien CC, Lin JC (2002) Secret image sharing. Comput Graph 26(5):765–770CrossRefGoogle Scholar
  22. 22.
    Ulutas G, Ulutas M, Nabiyev VV (2013) Secret image sharing scheme with adaptive authentication strength. Pattern Recogn Lett 34(3):283–291CrossRefzbMATHGoogle Scholar
  23. 23.
    Wang RZ, Su CH (2006) Secret image sharing with smaller shadow images. Pattern Recogn Lett 27(6):551–555CrossRefGoogle Scholar
  24. 24.
    Weinberger M, Seroussi G, Sapiro G (2000) The LOCO-i lossless image compression algorithm: Principles and standardization into JPEG-LS. IEEE Trans Image Process 9(8):1309–1324CrossRefGoogle Scholar
  25. 25.
    Wu CC, Kao SJ, Kuo WC, Hwang MS (2008) Enhance the image sharing with steganography and authentication. In: Proceedings of international conference on intelligent information hiding and multimedia signal processing (IIHMSP’08). Harbin, China, pp 1177–1181Google Scholar
  26. 26.
    Yang CN, Chu YY (2011) A general (k, n) scalable secret image sharing scheme with the smooth scalability. J Syst Softw 84(10):1726–1733CrossRefGoogle Scholar
  27. 27.
    Yang CN, Chen TS, Yua KH, Wang CC (2007) Improvements of image sharing with steganography and authentication. J Syst Softw 80(7):1070–1076CrossRefGoogle Scholar
  28. 28.
    Yuan HD (2014) Secret sharing with multi-cover adaptive steganography. Inf Sci 254:197–212MathSciNetCrossRefzbMATHGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2016

Authors and Affiliations

  1. 1.School of Computer Science and EngineeringSouth China University of Technology, Guangzhou Higher Education Mega CentreGuangzhouPeople’s Republic of China

Personalised recommendations