High performance image steganography integrating IWT and Hamming code within secret sharing

Abstract Steganography and secret sharing are schemes to increase the security of private information against attackers. Steganography emphasizes secrecy while secret sharing distributes the secret key in shares that are conditionally classified to reconstruct the original secret. This paper introdu...

Full description

Bibliographic Details
Main Authors: Zahra Saeidi, Ameneh Yazdi, Samaneh Mashhadi, Masoud Hadian, Adnan Gutub
Format: Article
Language:English
Published: Wiley 2024-01-01
Series:IET Image Processing
Subjects:
Online Access:https://doi.org/10.1049/ipr2.12938
_version_ 1797367539848708096
author Zahra Saeidi
Ameneh Yazdi
Samaneh Mashhadi
Masoud Hadian
Adnan Gutub
author_facet Zahra Saeidi
Ameneh Yazdi
Samaneh Mashhadi
Masoud Hadian
Adnan Gutub
author_sort Zahra Saeidi
collection DOAJ
description Abstract Steganography and secret sharing are schemes to increase the security of private information against attackers. Steganography emphasizes secrecy while secret sharing distributes the secret key in shares that are conditionally classified to reconstruct the original secret. This paper introduces a counting‐based secret sharing scheme that aims to reduce the computational complexity for longer keys, thereby providing a practical steganographic approach for efficient sharing. The scheme integrates counting‐based secret sharing with integer wavelet transform (IWT) and steganography. The subscriptions created using the Hamming code are embedded in the cover image. Using this method, IWT significantly reduces the occurrence of common rounding errors. As a result, secret key extraction becomes very accurate and eliminates the need to access the original images. This design, using secret sharing based on counting, not only has simplicity and efficiency, but also features such as flexibility, scalability, and lack of central authority. In addition, high‐quality steganography was obtained for keys with lengths of 64, 256, 512, 1024, and 3072, showing an average PSNR=80.11 in different color images. This outstanding performance makes it a highly efficient alternative to previous designs, representing a groundbreaking contribution with significant public interest in the field.
first_indexed 2024-03-08T17:19:48Z
format Article
id doaj.art-5a3ea26b8c8b4c45b12e29c9a89f5a18
institution Directory Open Access Journal
issn 1751-9659
1751-9667
language English
last_indexed 2024-03-08T17:19:48Z
publishDate 2024-01-01
publisher Wiley
record_format Article
series IET Image Processing
spelling doaj.art-5a3ea26b8c8b4c45b12e29c9a89f5a182024-01-03T07:39:13ZengWileyIET Image Processing1751-96591751-96672024-01-0118112913910.1049/ipr2.12938High performance image steganography integrating IWT and Hamming code within secret sharingZahra Saeidi0Ameneh Yazdi1Samaneh Mashhadi2Masoud Hadian3Adnan Gutub4Cryptography and Data Security Laboratory School of Mathematics Iran University of Science & Technology Narmak Tehran IranCryptography and Data Security Laboratory School of Mathematics Iran University of Science & Technology Narmak Tehran IranCryptography and Data Security Laboratory School of Mathematics Iran University of Science & Technology Narmak Tehran IranCryptography and Data Security Laboratory School of Mathematics Iran University of Science & Technology Narmak Tehran IranCollege of Computer & Information Systems Umm Al‐Qura University Makkah Saudi ArabiaAbstract Steganography and secret sharing are schemes to increase the security of private information against attackers. Steganography emphasizes secrecy while secret sharing distributes the secret key in shares that are conditionally classified to reconstruct the original secret. This paper introduces a counting‐based secret sharing scheme that aims to reduce the computational complexity for longer keys, thereby providing a practical steganographic approach for efficient sharing. The scheme integrates counting‐based secret sharing with integer wavelet transform (IWT) and steganography. The subscriptions created using the Hamming code are embedded in the cover image. Using this method, IWT significantly reduces the occurrence of common rounding errors. As a result, secret key extraction becomes very accurate and eliminates the need to access the original images. This design, using secret sharing based on counting, not only has simplicity and efficiency, but also features such as flexibility, scalability, and lack of central authority. In addition, high‐quality steganography was obtained for keys with lengths of 64, 256, 512, 1024, and 3072, showing an average PSNR=80.11 in different color images. This outstanding performance makes it a highly efficient alternative to previous designs, representing a groundbreaking contribution with significant public interest in the field.https://doi.org/10.1049/ipr2.12938image watermarkingsteganography
spellingShingle Zahra Saeidi
Ameneh Yazdi
Samaneh Mashhadi
Masoud Hadian
Adnan Gutub
High performance image steganography integrating IWT and Hamming code within secret sharing
IET Image Processing
image watermarking
steganography
title High performance image steganography integrating IWT and Hamming code within secret sharing
title_full High performance image steganography integrating IWT and Hamming code within secret sharing
title_fullStr High performance image steganography integrating IWT and Hamming code within secret sharing
title_full_unstemmed High performance image steganography integrating IWT and Hamming code within secret sharing
title_short High performance image steganography integrating IWT and Hamming code within secret sharing
title_sort high performance image steganography integrating iwt and hamming code within secret sharing
topic image watermarking
steganography
url https://doi.org/10.1049/ipr2.12938
work_keys_str_mv AT zahrasaeidi highperformanceimagesteganographyintegratingiwtandhammingcodewithinsecretsharing
AT amenehyazdi highperformanceimagesteganographyintegratingiwtandhammingcodewithinsecretsharing
AT samanehmashhadi highperformanceimagesteganographyintegratingiwtandhammingcodewithinsecretsharing
AT masoudhadian highperformanceimagesteganographyintegratingiwtandhammingcodewithinsecretsharing
AT adnangutub highperformanceimagesteganographyintegratingiwtandhammingcodewithinsecretsharing