Corpus ID: 13908137

A Secret Image Sharing with Deep-steganography and Two-stage Authentication Based on Matrix Encoding

@article{Liu2017ASI,
  title={A Secret Image Sharing with Deep-steganography and Two-stage Authentication Based on Matrix Encoding},
  author={Li Liu and Anhong Wang and Chin-Chen Chang and Zhihong Li},
  journal={Int. J. Netw. Secur.},
  year={2017},
  volume={19},
  pages={327-334}
}
A secret image sharing with deep-steganography and twostage authentication based on matrix encoding is proposed. This scheme firstly employed Wang and Su’s sharing scheme to share a secret image into n shadows. Then, n shadows were embedded into the pre-selected cover images by using matrix encoding so as to generate n stego images. Different from the common schemes which directly use LSBs replacement, our scheme performs deepsteganography, which hides 3-bit secret data but only modifies at… Expand
A Verifiable Steganography-Based Secret Image Sharing Scheme in 5G Networks
With the development and innovation of new techniques for 5G, 5G networks can provide extremely large capacity, robust integrity, high bandwidth, and low latency for multimedia image sharing andExpand
A SPATIAL DOMAIN BASED SECURE AND ROBUST VIDEO WATERMARKING TECHNIQUE USING MODIFIED LSB AND SECRET IMAGE SHARING
This paper proposes a spatial domain based video watermarking scheme to improve security of the video data using a combination of modified LSB watermarking technique of spatial domain and a (n, n)Expand
New Secret Sharing Scheme Based on Faster R-CNNs Image Retrieval
TLDR
A new secret sharing scheme based on Faster region convolutional neural networks (Faster R-CNNs) which can automatically retrieve the accurate shadow images by Faster R- CNNs and recover the secret image correctly. Expand
A survey paper on secret image sharing schemes
TLDR
A comprehensive survey from over 100 papers which explains the new approaches and challenges of secret image sharing schemes is presented and a comparative analysis of different methods based on different properties is provided. Expand
Digital image steganography and steganalysis: A journey of the past three decades
TLDR
This study aims to present an exhaustive scrutiny of various ISTs from the classical to recent developments in the spatial domain, with respect to various image steganographic metrics. Expand

References

SHOWING 1-10 OF 24 REFERENCES
Secret image sharing with steganography and authentication
TLDR
A novel approach to secret image sharing based on a (k, n)-threshold scheme with the additional capabilities of steganography and authentication with the capability of authenticating the fidelity of each processed camouflage image, called a stego-image is proposed. Expand
Sharing secrets in stego images with authentication
TLDR
A novel secret image sharing scheme combining steganography and authentication based on Chinese remainder theorem (CRT) is proposed that not only improves the authentication ability but also enhances the visual quality of the stego images. Expand
Steganography and authentication in image sharing without parity bits
TLDR
A novel approach without needing parity bits to share a secret image into n stego-images is presented, which provides better visual quality and has higher detection ratio with respect to all previous SAIS schemes. Expand
Improvements of image sharing with steganography and authentication
TLDR
A scheme to improve authentication ability that prevents dishonest participants from cheating is presented and the arrangement of embedded bits is defined to improve the quality of stego-image. Expand
Secret image sharing based on cellular automata and steganography
TLDR
This paper employs linear cellular automata, digital signatures, and hash functions to propose a novel (t,n)-threshold image sharing scheme with steganographic properties in which a double authentication mechanism is introduced which can detect tampering with probability 255/256. Expand
Efficient X-box Mapping in Stego-image Using Four-bit Concatenation
TLDR
The least-significant-bit (LSB)-based method is a popular type of steganographic algorithms in the spatial domain used extensively for hiding the secret data due to its simplicity and high embedding capability. Expand
A Lossless Secret Image Sharing Scheme Based on Steganography
In this paper, a new lossless secret sharing method based on steganography is proposed. The new scheme generates shares from the cover image and secret image, and then embeds the shares into theExpand
Secret image sharing with smaller shadow images
TLDR
In the method proposed in this study, the difference image of the secret image is encoded using Huffman coding scheme, and the arithmetic calculations of the sharing functions are evaluated in a power-of-two Galois Field GF(2^t). Expand
A Symmetric Steganography with Secret Sharing and PSNR Analysis for Image Steganography
TLDR
The paper presented here is concerned with the secret sharing of message by hiding it in an image using the most commonly used LSB (Least Significant Bit) technique and later the calculations has been done for the PSNR (Peak Signal to Noise Ratio) of image in MATLAB. Expand
An extended matrix encoding algorithm for steganography of high embedding efficiency
TLDR
An extended matrix encoding algorithm is proposed to improve the performance of F5 steganography by changing the hash function in matrix encoding and converting the coding mode, and the embedding efficiency and embedding rate get increased to a large extent. Expand
...
1
2
3
...