High performance image steganography integrating IWT and Hamming code within secret sharing
Abstract Steganography and secret sharing are schemes to increase the security of private information against attackers. Steganography emphasizes secrecy while secret sharing distributes the secret key in shares that are conditionally classified to reconstruct the original secret. This paper introdu...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Wiley
2024-01-01
|
Series: | IET Image Processing |
Subjects: | |
Online Access: | https://doi.org/10.1049/ipr2.12938 |
_version_ | 1797367539848708096 |
---|---|
author | Zahra Saeidi Ameneh Yazdi Samaneh Mashhadi Masoud Hadian Adnan Gutub |
author_facet | Zahra Saeidi Ameneh Yazdi Samaneh Mashhadi Masoud Hadian Adnan Gutub |
author_sort | Zahra Saeidi |
collection | DOAJ |
description | Abstract Steganography and secret sharing are schemes to increase the security of private information against attackers. Steganography emphasizes secrecy while secret sharing distributes the secret key in shares that are conditionally classified to reconstruct the original secret. This paper introduces a counting‐based secret sharing scheme that aims to reduce the computational complexity for longer keys, thereby providing a practical steganographic approach for efficient sharing. The scheme integrates counting‐based secret sharing with integer wavelet transform (IWT) and steganography. The subscriptions created using the Hamming code are embedded in the cover image. Using this method, IWT significantly reduces the occurrence of common rounding errors. As a result, secret key extraction becomes very accurate and eliminates the need to access the original images. This design, using secret sharing based on counting, not only has simplicity and efficiency, but also features such as flexibility, scalability, and lack of central authority. In addition, high‐quality steganography was obtained for keys with lengths of 64, 256, 512, 1024, and 3072, showing an average PSNR=80.11 in different color images. This outstanding performance makes it a highly efficient alternative to previous designs, representing a groundbreaking contribution with significant public interest in the field. |
first_indexed | 2024-03-08T17:19:48Z |
format | Article |
id | doaj.art-5a3ea26b8c8b4c45b12e29c9a89f5a18 |
institution | Directory Open Access Journal |
issn | 1751-9659 1751-9667 |
language | English |
last_indexed | 2024-03-08T17:19:48Z |
publishDate | 2024-01-01 |
publisher | Wiley |
record_format | Article |
series | IET Image Processing |
spelling | doaj.art-5a3ea26b8c8b4c45b12e29c9a89f5a182024-01-03T07:39:13ZengWileyIET Image Processing1751-96591751-96672024-01-0118112913910.1049/ipr2.12938High performance image steganography integrating IWT and Hamming code within secret sharingZahra Saeidi0Ameneh Yazdi1Samaneh Mashhadi2Masoud Hadian3Adnan Gutub4Cryptography and Data Security Laboratory School of Mathematics Iran University of Science & Technology Narmak Tehran IranCryptography and Data Security Laboratory School of Mathematics Iran University of Science & Technology Narmak Tehran IranCryptography and Data Security Laboratory School of Mathematics Iran University of Science & Technology Narmak Tehran IranCryptography and Data Security Laboratory School of Mathematics Iran University of Science & Technology Narmak Tehran IranCollege of Computer & Information Systems Umm Al‐Qura University Makkah Saudi ArabiaAbstract Steganography and secret sharing are schemes to increase the security of private information against attackers. Steganography emphasizes secrecy while secret sharing distributes the secret key in shares that are conditionally classified to reconstruct the original secret. This paper introduces a counting‐based secret sharing scheme that aims to reduce the computational complexity for longer keys, thereby providing a practical steganographic approach for efficient sharing. The scheme integrates counting‐based secret sharing with integer wavelet transform (IWT) and steganography. The subscriptions created using the Hamming code are embedded in the cover image. Using this method, IWT significantly reduces the occurrence of common rounding errors. As a result, secret key extraction becomes very accurate and eliminates the need to access the original images. This design, using secret sharing based on counting, not only has simplicity and efficiency, but also features such as flexibility, scalability, and lack of central authority. In addition, high‐quality steganography was obtained for keys with lengths of 64, 256, 512, 1024, and 3072, showing an average PSNR=80.11 in different color images. This outstanding performance makes it a highly efficient alternative to previous designs, representing a groundbreaking contribution with significant public interest in the field.https://doi.org/10.1049/ipr2.12938image watermarkingsteganography |
spellingShingle | Zahra Saeidi Ameneh Yazdi Samaneh Mashhadi Masoud Hadian Adnan Gutub High performance image steganography integrating IWT and Hamming code within secret sharing IET Image Processing image watermarking steganography |
title | High performance image steganography integrating IWT and Hamming code within secret sharing |
title_full | High performance image steganography integrating IWT and Hamming code within secret sharing |
title_fullStr | High performance image steganography integrating IWT and Hamming code within secret sharing |
title_full_unstemmed | High performance image steganography integrating IWT and Hamming code within secret sharing |
title_short | High performance image steganography integrating IWT and Hamming code within secret sharing |
title_sort | high performance image steganography integrating iwt and hamming code within secret sharing |
topic | image watermarking steganography |
url | https://doi.org/10.1049/ipr2.12938 |
work_keys_str_mv | AT zahrasaeidi highperformanceimagesteganographyintegratingiwtandhammingcodewithinsecretsharing AT amenehyazdi highperformanceimagesteganographyintegratingiwtandhammingcodewithinsecretsharing AT samanehmashhadi highperformanceimagesteganographyintegratingiwtandhammingcodewithinsecretsharing AT masoudhadian highperformanceimagesteganographyintegratingiwtandhammingcodewithinsecretsharing AT adnangutub highperformanceimagesteganographyintegratingiwtandhammingcodewithinsecretsharing |