{"title":"A secure joint wavelet based steganography and secret sharing method","authors":"Mohammad Javad Khosravi, S. Ghandali","doi":"10.1109/ISIAS.2011.6122823","DOIUrl":null,"url":null,"abstract":"In this paper a novel steganography technique based on the combination of a secret sharing method and wavelet transform is presented. In this method, a secret image is shared into some shares. Then, the shares and Fletcher- 16 checksum of shares are hidden into cover images using an integer wavelet based steganography technique. In the decoding part, the stego images are used to recover the shares and, consequently, recover the secret image. The presented algorithm obtains high authentication capability against counterfeiting. Moreover; it is stable against serious attacks, including RS and supervisory training steganalysis methods, and it has the low detection rate under global feature extraction classifier examination.","PeriodicalId":139268,"journal":{"name":"2011 7th International Conference on Information Assurance and Security (IAS)","volume":"111 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 7th International Conference on Information Assurance and Security (IAS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISIAS.2011.6122823","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 8
Abstract
In this paper a novel steganography technique based on the combination of a secret sharing method and wavelet transform is presented. In this method, a secret image is shared into some shares. Then, the shares and Fletcher- 16 checksum of shares are hidden into cover images using an integer wavelet based steganography technique. In the decoding part, the stego images are used to recover the shares and, consequently, recover the secret image. The presented algorithm obtains high authentication capability against counterfeiting. Moreover; it is stable against serious attacks, including RS and supervisory training steganalysis methods, and it has the low detection rate under global feature extraction classifier examination.