Article

A Secret Sharing Authentication Scheme for Digital Images

Authors:
To read the full-text of this research, you can request a copy directly from the authors.

Abstract

Recently, Lin and Tsai proposed a secret image-sharing scheme using steganography and a parity-checking detection mechanism to provide effective security for secret image sharing. In this paper, we present a robust authentication method to detect stego-images, while retaining the same high capacity of embedding information, with a cyclic redundancy check and hash function both being applied for authentication detection. As observed from our experiments, the quality of shares embedded in the stego-image in our scheme was higher than that of previous studies. Therefore, in terms of precise detection and higher PSNR measures, the requirements for both authentication and fidelity were satisfied.

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the authors.

... The image authentication methods can be divided into two classes: irreversible methods [5][6][7][8][9][10] and reversible methods [11][12][13][14][15]. In the irreversible image authentication methods, the lossy data hiding techniques [16][17][18][19] often are used for embedding watermarks. ...
Article
Full-text available
In reversible image authentication (RIA) methods, it is common to use a reversible hiding method to embed the authentication code (AC) bits into each block of an original image to form a watermarking image. Since the reversible hiding methods have low embedding capacity, the authentication methods based on them have limited attack detection ability. In this paper, we use a dual-image reversible embedding method based on the central folding strategy with some slight improvements to construct an RIA method. Due to the large embedding capacity, low image distortion, no location map to be used, and AC bits generated by using hash function MD5 on block’s features, the proposed image authentication method can detect any type of attack with higher accuracy compared to existing methods. Its attack detection ability reaches \(100\%\) for block sizes of \(4\times 4\), \(3\times 3\), and \(99.91\%\) for a block size of \(2\times 2\) while maintaining high image quality.
... The objective of Visual Cryptography is to encrypt an information image that is unreadable by anyone except the intended receivers who can visually be able to decrypt. The objective of Steganography is to hide the information along with images without a visible change in the image (Yang et al., 2007;Wang et al., 2009). The receiver would know how to extract the information through a special code or a key. ...
Article
Full-text available
In this paper, a novel approach is presented for multimedia information hiding using visual cryptography. The approach combines both the steganographic and cryptographic effect to improve the quality of security and to increase the payload. Both are important parameters in information hiding. The proposed techniques provide three levels of security without reducing the payload and the image quality. The experiments done on various images and the results obtained showed the robustness of the technique. The proposed techniques are vulnerable to various transformation and geometric attacks and can be considered fragile except for the salt and pepper. The results shown in terms of quality and performance are promising for future work.
Article
The reversible image authentication (RIA) method is capable of detecting the tampered regions, and is able to reconstruct the original image if the marked image is un-tampered. The existing RIA methods successfully detect the integrity of digital images and have the ability to recover the original image from its marked version. However, they fail to detect the tampered regions with equal modification in brightness. Moreover, the existing methods also provide no mechanism to protect those un-embeddable blocks and thus a larger detection error rate can be introduced. In this paper, instead of embedding block-independent authentication code (AC) used in other methods, we embed hash value of block features to avoid the tampered regions that are undetectable in prior works. Besides, we also embed one bit AC into the least significant bit (LSB) of those un-embeddable blocks for the authentication purpose while achieving reversibility. The experimental results show that the proposed method offers a more accurate detection result while providing a comparable image quality.
ResearchGate has not been able to resolve any references for this publication.