Research Article
Image Secret Sharing in Stego-Images with Authentication
558 downloads
@INPROCEEDINGS{10.1007/978-3-642-37949-9_66, author={Amitava Nag and Sushanta Biswas and Debasree Sarkar and Partha Sarkar}, title={Image Secret Sharing in Stego-Images with Authentication}, proceedings={Quality, Reliability, Security and Robustness in Heterogeneous Networks. 9th International Conference, QShine 2013, Greader Noida, India, January 11-12, 2013, Revised Selected Papers}, proceedings_a={QSHINE}, year={2013}, month={7}, keywords={Secret sharing stego-image authentication hash function}, doi={10.1007/978-3-642-37949-9_66} }
- Amitava Nag
Sushanta Biswas
Debasree Sarkar
Partha Sarkar
Year: 2013
Image Secret Sharing in Stego-Images with Authentication
QSHINE
Springer
DOI: 10.1007/978-3-642-37949-9_66
Abstract
Recently, a polynomial-based (t,n) image sharing and hiding schemes with authentication was proposed to hid n shares of a secret image into n ordinary cover images and form n stego-images that can be transmitted securely. But each stego-image of all existing method should be expanded to 4 times of the secret image. In this paper we propose an enhanced scheme, where the size of the stego-image is reduced to times of the secret image. In addition our proposed scheme provides better authentication using hash function.
Copyright © 2013–2024 ICST