Professional Documents
Culture Documents
com/IgorKirillov,
D
ata hiding is the process of con-
cealing recognizable digital data
by converting it into indiscernible
forms, i.e., those that are impercep-
tible to the human eye, and it uses
numerous techniques to accomplish this task.
In this article, we propose a new data-hiding
technique that uses the concept of steganogra-
phy and secret image-sharing schemes. The
encryption and decryption is carried out at
two levels: at the first level, the encryption
process is done using steganography; it is then
followed by a secret-sharing scheme at the
second level. The decryption process is the
opposite of the encryption process; according-
ly, we use secret sharing at the first level and
steganography in the second level. In the
encryption process, n + 1 shared images are
generated using n cover images and a secret
image. By performing the decryption algo-
rithm on these n + 1 shared images, we get n
recovered images and one stego image. The
proposed scheme is similar to a secret-sharing
scheme because it deceives the attacker by
producing pseudo images. In addition to
dec eiving the a t t a c ke r, it also provides an
M3 .... +
Mn
* * * ...... *
n n–1 n–2 1
n+1
T/(n + 1) + + + + +
....
S1 S2 S3 S4 Sn Sn+1
(p)
FIGURE 3. The results of the proposed scheme for grayscale images with n = 4: (a) the secret image, (b)–(e) the cover images
^C 1, C 2, C 3, C 4 h, (f)–(j) the shared images ^S 1, S 2, S 3, S 4, S 5 h, (k)–(n) the recovered cover images ^RC 1, RC 2, RC 3, RC 4 h, (o) the stego image
(ST ), and (p) the recovered secret image (G) . (Images courtesy of Image Processing Place and the USC-SIPI Image Database.)
while an acceptable range in wireless transmission settles at image SI and shared images S i, i = 1, f, n, n + 1. Hence, no
roughly 25 dB for 8-bit data. data of the secret image was partially revealed.
The correlation, MSE, and PSNR values between secret Quality measure techniques were used on secret image SI
image SI and shared images S i, i = 1, f, n, n + 1 are illustrated and stego image ST in a combination of recovered cover
in Table 1. Both came out to be not related as the correlation images R i, i = 1, 2, f, n. When all n recovered cover images
coefficient for each pair was . 0, which means both compared were combined with the stego image, the secret was recov-
images were not related to each other. The MSE and PSNR ered. The recovered secret image was identical to the secret
came out to be greater than 9,500 and less than 8.5 dB, respec- image as the correlation value for this pair came out to be
tively, which represents a high dissimilarity between secret 0.9998, which was approximately . 1, i.e., fully correlated to
REFERENCES
the secret image. The MSE and PSNR for the pair came out [1] S. P. Mohanty, A. Sengupta, P. Guturu, and E. Kougianos, “Every-
to be . 1.99 and 45.17 dB, respectively, which indicates both thing you want to know about watermarking,” IEEE Consum. Electron.
Mag., vol. 6, no. 3, pp. 83–91, July 2017.
images were nearly identical. But all of the other combina- [2] K. Nimmy and M. Sethumadhavan, “Novel mutual authentication
tions of the stego image and the recovered cover images with protocol for cloud computing using secret sharing and steganography,” in
secret images showed the exact opposite result, as the corre- Proc. IEEE Fifth Int. Conf. Applications Digital Information Web Tech-
lation value came out to . 0, with the root MSE (RMSE) and nologies, 2014, pp. 101–106.
PSNR being greater than 9,500 and fewer than 8.35 dB, [3] M. Naor and A. Shamir, “Visual cryptography,” in Proc. Workshop
Theory Application Cryptographic Techniques (EUROCRYPT), Perugia,
respectively. This indicates that the other combinations were Italy, 1994, pp. 1–12.
completely different from the secret image. The < n shared [4] M.-J. Li and J. S.-T. Juan, “A flexible multiple-secret image sharing
images in combination with the stego image did not reveal scheme by shifting random grids,” in Proc. IEEE 17th Int. Symp. Con-
any information about the secret image. The results obtained sumer Electronics (ISCE), 2013, pp. 289–290.
from applying quality measures on the secret image, the [5] M. Rajput and M. Deshmukh, “Secure (n, n+ 1)-multi-secret image
sharing scheme using additive modulo,” Procedia Comput. Sci., vol. 89,
stego image, and the recovered cover images are illustrat- pp. 677–683, Jan. 2016.
ed in Table 2. [6] Y. Tian, J. Ma, C. Peng, and Q. Jiang, “Fair (t, n) threshold secret
The time complexity increased with the increase of the sharing scheme,” IET Information Security, vol. 7.2, pp. 106–112, June
cover images. The time complexity T was dependent on 2013.
image dimension (D), image type (I ), and the number of [7] T.-H. Chen and C.-S. Wu, “Efficient multi-secret image sharing
based on Boolean operations,” Signal Processing, vol. 91.1, pp. 90–97,
cover images (N ), T ? (D # I # N). The space complexity Jan. 2011.
was dependent on the cover images, i.e., as the cover images [8] L. J. Anbarasi and S. Kannan, “Secured secret color image sharing
increased, the space complexity increased. Due to the two with steganography,” in Proc. IEEE Int. Conf. Recent Trends Information
levels of encryption, the space complexity was high. To Technology (ICRTIT), 2012, pp. 44–48.
reduce the space complexity and increase the security of [9] C.-C. Chang, Y.-H. Chen, and L.-Y. Chuang, “Meaningful shadows
for image secret sharing with steganography and authentication tech-
shared and recovered cover images, we will disseminate the niques,” J. Inform. Hiding Multimedia Signal Processing, vol. 5, no. 3,
shared and recovered cover images into different servers. pp. 342–352, 2014.
[10] M. R. Ogiela and K. Koptyra, “False and multi-secret steganogra-
CONCLUSION phy in digital images,” Soft Computing, vol. 19.11, pp. 3331–3339,
Nov. 2015.
In this article, we proposed a novel encryption technique
using secret sharing and steganography. This scheme was not