An Enhanced Approach of Image Steganographic Using Discrete Shearlet Transform and Secret Sharing

Recently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verificatio...

Full description

Bibliographic Details
Main Authors: Yasir Ahmed Hamza, Nada Elya Tewfiq, Mohammed Qasim Ahmed
Format: Article
Language:Arabic
Published: College of Science for Women, University of Baghdad 2022-02-01
Series:Baghdad Science Journal
Subjects:
Online Access:https://bsj.uobaghdad.edu.iq/index.php/BSJ/article/view/4530
_version_ 1818980621997834240
author Yasir Ahmed Hamza
Nada Elya Tewfiq
Mohammed Qasim Ahmed
author_facet Yasir Ahmed Hamza
Nada Elya Tewfiq
Mohammed Qasim Ahmed
author_sort Yasir Ahmed Hamza
collection DOAJ
description Recently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512x512) is divided into three layers (red, green and blue). The blue layer is transformed using Discrete Shearlet Transform (DST) to obtain its coefficients. The first secret share is embedded at the coefficients of transformed blue layer to obtain a stego image. At extraction process, the first secret share is extracted from the coefficients of blue layer of the stego image and XORed with the second secret share to generate the original secret logo. According to the experimental results, the proposed method is achieved better imperceptibility for the stego image with the payload capacity equal to (1 bpp). In addition, the secret logo becomes more secured using (2 out 2 share) visual cryptography and the second secret share as a private key.
first_indexed 2024-12-20T17:18:21Z
format Article
id doaj.art-5efcb8f9990f484cab54a05e56ee34bc
institution Directory Open Access Journal
issn 2078-8665
2411-7986
language Arabic
last_indexed 2024-12-20T17:18:21Z
publishDate 2022-02-01
publisher College of Science for Women, University of Baghdad
record_format Article
series Baghdad Science Journal
spelling doaj.art-5efcb8f9990f484cab54a05e56ee34bc2022-12-21T19:31:55ZaraCollege of Science for Women, University of BaghdadBaghdad Science Journal2078-86652411-79862022-02-0119110.21123/bsj.2022.19.1.0197An Enhanced Approach of Image Steganographic Using Discrete Shearlet Transform and Secret SharingYasir Ahmed Hamza0Nada Elya Tewfiq 1Mohammed Qasim Ahmed 2Department of Computer Science, College of Computer and IT, Nawroz University, Duhok, IraqDepartment of Computer Science, College of Computer and IT, Nawroz University, Duhok, IraqDepartment of Computer Science, College of Education, University of Alhamdaniya, Mosul, IraqRecently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512x512) is divided into three layers (red, green and blue). The blue layer is transformed using Discrete Shearlet Transform (DST) to obtain its coefficients. The first secret share is embedded at the coefficients of transformed blue layer to obtain a stego image. At extraction process, the first secret share is extracted from the coefficients of blue layer of the stego image and XORed with the second secret share to generate the original secret logo. According to the experimental results, the proposed method is achieved better imperceptibility for the stego image with the payload capacity equal to (1 bpp). In addition, the secret logo becomes more secured using (2 out 2 share) visual cryptography and the second secret share as a private key.https://bsj.uobaghdad.edu.iq/index.php/BSJ/article/view/4530Discrete Shearlet Transform, Image Steganography, Stego Image, Secret Sharing.
spellingShingle Yasir Ahmed Hamza
Nada Elya Tewfiq
Mohammed Qasim Ahmed
An Enhanced Approach of Image Steganographic Using Discrete Shearlet Transform and Secret Sharing
Baghdad Science Journal
Discrete Shearlet Transform, Image Steganography, Stego Image, Secret Sharing.
title An Enhanced Approach of Image Steganographic Using Discrete Shearlet Transform and Secret Sharing
title_full An Enhanced Approach of Image Steganographic Using Discrete Shearlet Transform and Secret Sharing
title_fullStr An Enhanced Approach of Image Steganographic Using Discrete Shearlet Transform and Secret Sharing
title_full_unstemmed An Enhanced Approach of Image Steganographic Using Discrete Shearlet Transform and Secret Sharing
title_short An Enhanced Approach of Image Steganographic Using Discrete Shearlet Transform and Secret Sharing
title_sort enhanced approach of image steganographic using discrete shearlet transform and secret sharing
topic Discrete Shearlet Transform, Image Steganography, Stego Image, Secret Sharing.
url https://bsj.uobaghdad.edu.iq/index.php/BSJ/article/view/4530
work_keys_str_mv AT yasirahmedhamza anenhancedapproachofimagesteganographicusingdiscreteshearlettransformandsecretsharing
AT nadaelyatewfiq anenhancedapproachofimagesteganographicusingdiscreteshearlettransformandsecretsharing
AT mohammedqasimahmed anenhancedapproachofimagesteganographicusingdiscreteshearlettransformandsecretsharing
AT yasirahmedhamza enhancedapproachofimagesteganographicusingdiscreteshearlettransformandsecretsharing
AT nadaelyatewfiq enhancedapproachofimagesteganographicusingdiscreteshearlettransformandsecretsharing
AT mohammedqasimahmed enhancedapproachofimagesteganographicusingdiscreteshearlettransformandsecretsharing