A secure image sharing scheme with high quality stego-images based on steganography
Image sharing can be utilized to protect important commercial, military or private images against a single point of failure. Many existing image sharing schemes may have one or more of the security weaknesses as follows: First, noise-like image shares may easily arouse the attackers’ attention; Second, cheating in the recovery of the secret image cannot be prevented effectively; Third, the requisite size of cover images may be very large; Finally, poor quality of the stego-images may lessen camouflage effects. In this paper, a novel secure image sharing scheme with high quality stego-images is proposed. With the use of LOCO-I compression as a preprocessing approach, the statistical correlations between neighboring pixels of a secret image drop significantly, which may greatly enhance the visual security of the proposed scheme. And the necessary size of cover images is reduced. Moreover, the PSNR values of stego-images are much higher than the related works. In order to detect three kinds of deception during secret image reconstruction, the hash-based message authentication codes of an image share, the value of argument x and the identity ID of a participant are embedded into a cover image together with the image share. In addition, the application of dynamic embedding with a random strategy further enhance the security of our scheme.
KeywordsImage sharing Steganography LOCO-I compression Message authentication code Dynamic embedding
The authors thank the anonymous reviewers for their insightful comments and suggestions. This work was partially supported by the 973 Program (No. 2014CB360501), the National Natural Science Foundation of China (No. U1135004 and No. 61170080), Guangdong Provincial Natural Science Foundation (No. 2014A030308006), and Guangdong Province Universities and Colleges Pearl River Scholar Funded Scheme (2011).
- 2.Blakley G (1979) Safeguarding cryptographic keys. In: Proceedings of national computer conference (AFIPS1979), vol 48, pp 313–317Google Scholar
- 4.Chan CS, Sung PE (2010) Secret image sharing with steganography and authentication using dynamic programming strategy. In: First International Conference on Pervasive Computing Signal Processing and Applications (PCSPA), pp 382–385. doi: 10.1109/PCSPA.2010.98
- 5.Chan CS, Lin CY, Lin YH (2012) Apply the modulus function to secret image sharing. International Journal of Innovative Computing Information and Control 8(1A):375–385Google Scholar
- 7.Chen CC, Wu WJ, Chen JL (2015) Highly efficient and secure multi-secret image sharing scheme. Multimedia Tools and Applications:1–16Google Scholar
- 9.Gloe T, Bhme R (2010) The ‘Dresden Image Database’ for benchmarking digital image forensics. In: Proceedings of the 25th symposium on applied computing (ACM SAC 2010), vol 2, pp 1585–1591Google Scholar
- 16.Li P, Kong Q, Ma Y (2014) Image secret sharing and hiding with authentication based on PSNR estimation. Journal of Information Hiding and Multimedia Signal Processing 5(3):353–366Google Scholar
- 19.Naor M, Shamir A (1995) Visual cryptography. In: Advances in cryptology - EUROCRYPT’94, Perugia, Italy, LNCS, vol 950, pp 1–12Google Scholar
- 25.Wu CC, Kao SJ, Kuo WC, Hwang MS (2008) Enhance the image sharing with steganography and authentication. In: Proceedings of international conference on intelligent information hiding and multimedia signal processing (IIHMSP’08). Harbin, China, pp 1177–1181Google Scholar