JOURNAL ARTICLE

Secure transmission over stego images with authentication and error correction

Chin-Pan Huang

Year: 2011 Journal:   Optical Engineering Vol: 50 (10)Pages: 107004-107004   Publisher: SPIE

Abstract

Based on image sharing with utilization of the set partitioning in hierarchical trees (SPIHT)-generated bit stream of integer wavelet transform coefficients and the Shamir threshold scheme over a Galois field, we present a new scheme for secure image transmission. Our algorithm integrates the Chinese remainder theorem with a control code idea to design check bits for authentication and error correction and embeds the produced shadows and check bits into cover images to form stego images for transmission. Moreover, our algorithm adopts the advantages of SPIHT features to generate compact shadows with progressive reconstruction. As a result, the algorithm simultaneously possesses high performance of both authentication and error correction and is highly suitable for image transmission over networks in noisy channels, reaches excellent visual quality of stego images, and achieves real time progressive and perfect reconstruction of the secret image. Experimental results have demonstrated these promising features of the proposed method.

Keywords:
Set partitioning in hierarchical trees Computer science Steganography Chinese remainder theorem Error detection and correction Image sharing Transmission (telecommunications) Authentication (law) Image (mathematics) Artificial intelligence Algorithm Image compression Image processing Telecommunications

Metrics

1
Cited By
0.00
FWCI (Field Weighted Citation Impact)
20
Refs
0.07
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Advanced Steganography and Watermarking Techniques
Physical Sciences →  Computer Science →  Computer Vision and Pattern Recognition
Chaos-based Image/Signal Encryption
Physical Sciences →  Computer Science →  Computer Vision and Pattern Recognition
Advanced Data Compression Techniques
Physical Sciences →  Computer Science →  Computer Vision and Pattern Recognition

Related Documents

JOURNAL ARTICLE

Stego-Encoding with Error Correction Capability

Xiaofeng Zhang

Journal:   IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences Year: 2005 Vol: E88-A (12)Pages: 3663-3667
JOURNAL ARTICLE

Sharing secrets in stego images with authentication

Chin‐Chen ChangYi-Pei HsiehChia-Hsuan Lin

Journal:   Pattern Recognition Year: 2008 Vol: 41 (10)Pages: 3130-3137
BOOK-CHAPTER

Image Secret Sharing in Stego-Images with Authentication

Amitava NagSushanta BiswasDebasree SarkarPartha Sarkar

Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering Year: 2013 Pages: 764-770
JOURNAL ARTICLE

Secure transmission of morphed stego keys over internet using IP steganography

Anant M. BagadeSanjay N. Talbar

Journal:   International Journal of Information and Computer Security Year: 2014 Vol: 6 (2)Pages: 133-133
© 2026 ScienceGate Book Chapters — All rights reserved.