Cropping and noise resilient steganography algorithm using secret image sharing

Oswaldo Juarez-Sandoval, Atoany Fierro-Radilla, Angelina Espejel-Trujillo, Mariko Nakano-Miyatake, Hector Perez-Meana

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Scopus citations

Abstract

This paper proposes an image steganography scheme, in which a secret image is hidden into a cover image using a secret image sharing (SIS) scheme. Taking advantage of the fault tolerant property of the (k,n)-threshold SIS, where using any k of n shares (k?n), the secret data can be recovered without any ambiguity, the proposed steganography algorithm becomes resilient to cropping and impulsive noise contamination. Among many SIS schemes proposed until now, Lin and Chan's scheme is selected as SIS, due to its lossless recovery capability of a large amount of secret data. The proposed scheme is evaluated from several points of view, such as imperceptibility of the stegoimage respect to its original cover image, robustness of hidden data to cropping operation and impulsive noise contamination. The evaluation results show a high quality of the extracted secret image from the stegoimage when it suffered more than 20% cropping or high density noise contamination.

Original languageEnglish
Title of host publicationSixth International Conference on Graphic and Image Processing, ICGIP 2014
EditorsDavid Zhang, Yulin Wang, Xudong Jiang
PublisherSPIE
ISBN (Electronic)9781628415582
DOIs
StatePublished - 2015
Event6th International Conference on Graphic and Image Processing, ICGIP 2014 - Beijing, China
Duration: 24 Oct 201426 Oct 2014

Publication series

NameProceedings of SPIE - The International Society for Optical Engineering
Volume9443
ISSN (Print)0277-786X
ISSN (Electronic)1996-756X

Conference

Conference6th International Conference on Graphic and Image Processing, ICGIP 2014
Country/TerritoryChina
CityBeijing
Period24/10/1426/10/14

Keywords

  • Lagrange interpolation
  • Secret image sharing
  • Steganography
  • cropping resilient
  • data hiding
  • modulo operation

Fingerprint

Dive into the research topics of 'Cropping and noise resilient steganography algorithm using secret image sharing'. Together they form a unique fingerprint.

Cite this