About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Quality, Reliability, Security and Robustness in Heterogeneous Networks. 9th International Conference, QShine 2013, Greader Noida, India, January 11-12, 2013, Revised Selected Papers

Research Article

Image Secret Sharing in Stego-Images with Authentication

Download(Requires a free EAI acccount)
614 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-642-37949-9_66,
        author={Amitava Nag and Sushanta Biswas and Debasree Sarkar and Partha Sarkar},
        title={Image Secret Sharing in Stego-Images with Authentication},
        proceedings={Quality, Reliability, Security and Robustness in Heterogeneous Networks. 9th International Conference, QShine 2013, Greader Noida, India, January 11-12, 2013, Revised Selected Papers},
        proceedings_a={QSHINE},
        year={2013},
        month={7},
        keywords={Secret sharing stego-image authentication hash function},
        doi={10.1007/978-3-642-37949-9_66}
    }
    
  • Amitava Nag
    Sushanta Biswas
    Debasree Sarkar
    Partha Sarkar
    Year: 2013
    Image Secret Sharing in Stego-Images with Authentication
    QSHINE
    Springer
    DOI: 10.1007/978-3-642-37949-9_66
Amitava Nag1,*, Sushanta Biswas2, Debasree Sarkar2, Partha Sarkar2,*
  • 1: West Bengal University of Technology
  • 2: University of Kalyani
*Contact email: amitavanag.09@gmail.com, ppsarkar@klyuniv.ac.in

Abstract

Recently, a polynomial-based (t,n) image sharing and hiding schemes with authentication was proposed to hid n shares of a secret image into n ordinary cover images and form n stego-images that can be transmitted securely. But each stego-image of all existing method should be expanded to 4 times of the secret image. In this paper we propose an enhanced scheme, where the size of the stego-image is reduced to times of the secret image. In addition our proposed scheme provides better authentication using hash function.

Keywords
Secret sharing stego-image authentication hash function
Published
2013-07-09
http://dx.doi.org/10.1007/978-3-642-37949-9_66
Copyright © 2013–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL