An Enhanced Approach of Image Steganographic Using Discrete Shearlet Transform and Secret Sharing
Recently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verificatio...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | Arabic |
Published: |
College of Science for Women, University of Baghdad
2022-02-01
|
Series: | Baghdad Science Journal |
Subjects: | |
Online Access: | https://bsj.uobaghdad.edu.iq/index.php/BSJ/article/view/4530 |
_version_ | 1818980621997834240 |
---|---|
author | Yasir Ahmed Hamza Nada Elya Tewfiq Mohammed Qasim Ahmed |
author_facet | Yasir Ahmed Hamza Nada Elya Tewfiq Mohammed Qasim Ahmed |
author_sort | Yasir Ahmed Hamza |
collection | DOAJ |
description | Recently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512x512) is divided into three layers (red, green and blue). The blue layer is transformed using Discrete Shearlet Transform (DST) to obtain its coefficients. The first secret share is embedded at the coefficients of transformed blue layer to obtain a stego image. At extraction process, the first secret share is extracted from the coefficients of blue layer of the stego image and XORed with the second secret share to generate the original secret logo. According to the experimental results, the proposed method is achieved better imperceptibility for the stego image with the payload capacity equal to (1 bpp). In addition, the secret logo becomes more secured using (2 out 2 share) visual cryptography and the second secret share as a private key. |
first_indexed | 2024-12-20T17:18:21Z |
format | Article |
id | doaj.art-5efcb8f9990f484cab54a05e56ee34bc |
institution | Directory Open Access Journal |
issn | 2078-8665 2411-7986 |
language | Arabic |
last_indexed | 2024-12-20T17:18:21Z |
publishDate | 2022-02-01 |
publisher | College of Science for Women, University of Baghdad |
record_format | Article |
series | Baghdad Science Journal |
spelling | doaj.art-5efcb8f9990f484cab54a05e56ee34bc2022-12-21T19:31:55ZaraCollege of Science for Women, University of BaghdadBaghdad Science Journal2078-86652411-79862022-02-0119110.21123/bsj.2022.19.1.0197An Enhanced Approach of Image Steganographic Using Discrete Shearlet Transform and Secret SharingYasir Ahmed Hamza0Nada Elya Tewfiq 1Mohammed Qasim Ahmed 2Department of Computer Science, College of Computer and IT, Nawroz University, Duhok, IraqDepartment of Computer Science, College of Computer and IT, Nawroz University, Duhok, IraqDepartment of Computer Science, College of Education, University of Alhamdaniya, Mosul, IraqRecently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512x512) is divided into three layers (red, green and blue). The blue layer is transformed using Discrete Shearlet Transform (DST) to obtain its coefficients. The first secret share is embedded at the coefficients of transformed blue layer to obtain a stego image. At extraction process, the first secret share is extracted from the coefficients of blue layer of the stego image and XORed with the second secret share to generate the original secret logo. According to the experimental results, the proposed method is achieved better imperceptibility for the stego image with the payload capacity equal to (1 bpp). In addition, the secret logo becomes more secured using (2 out 2 share) visual cryptography and the second secret share as a private key.https://bsj.uobaghdad.edu.iq/index.php/BSJ/article/view/4530Discrete Shearlet Transform, Image Steganography, Stego Image, Secret Sharing. |
spellingShingle | Yasir Ahmed Hamza Nada Elya Tewfiq Mohammed Qasim Ahmed An Enhanced Approach of Image Steganographic Using Discrete Shearlet Transform and Secret Sharing Baghdad Science Journal Discrete Shearlet Transform, Image Steganography, Stego Image, Secret Sharing. |
title | An Enhanced Approach of Image Steganographic Using Discrete Shearlet Transform and Secret Sharing |
title_full | An Enhanced Approach of Image Steganographic Using Discrete Shearlet Transform and Secret Sharing |
title_fullStr | An Enhanced Approach of Image Steganographic Using Discrete Shearlet Transform and Secret Sharing |
title_full_unstemmed | An Enhanced Approach of Image Steganographic Using Discrete Shearlet Transform and Secret Sharing |
title_short | An Enhanced Approach of Image Steganographic Using Discrete Shearlet Transform and Secret Sharing |
title_sort | enhanced approach of image steganographic using discrete shearlet transform and secret sharing |
topic | Discrete Shearlet Transform, Image Steganography, Stego Image, Secret Sharing. |
url | https://bsj.uobaghdad.edu.iq/index.php/BSJ/article/view/4530 |
work_keys_str_mv | AT yasirahmedhamza anenhancedapproachofimagesteganographicusingdiscreteshearlettransformandsecretsharing AT nadaelyatewfiq anenhancedapproachofimagesteganographicusingdiscreteshearlettransformandsecretsharing AT mohammedqasimahmed anenhancedapproachofimagesteganographicusingdiscreteshearlettransformandsecretsharing AT yasirahmedhamza enhancedapproachofimagesteganographicusingdiscreteshearlettransformandsecretsharing AT nadaelyatewfiq enhancedapproachofimagesteganographicusingdiscreteshearlettransformandsecretsharing AT mohammedqasimahmed enhancedapproachofimagesteganographicusingdiscreteshearlettransformandsecretsharing |