JOURNAL ARTICLE

Image Secret Sharing and Hiding with Authentication

Abstract

Recently, Lin-Tsai, Yang et al., and Chang et al. proposed image secret sharing and hiding schemes with authentication. The secret image is shared and hided into ordinary cover images to form the stego images so as to be transmitted securely. Unfortunately, there is a common weakness that each stego image should be expanded to 4 times of the secret image. In this paper, we propose an enhanced (t, n) threshold scheme with smaller size expansion of the stego images. The size of each stego image is reduced to 3.5/t times of the secret image with the image quality better than the previous schemes. In addition, the authentication property is improved based on hash function. Finally, the experimental results show that our scheme is superior to the compared schemes.

Keywords:
Image sharing Image (mathematics) Secret sharing Hash function Authentication (law) Steganography Shamir's Secret Sharing Computer science Cover (algebra) Homomorphic secret sharing Information hiding Message authentication code Artificial intelligence Theoretical computer science Computer vision Cryptography Algorithm Computer security

Metrics

13
Cited By
0.96
FWCI (Field Weighted Citation Impact)
10
Refs
0.78
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Advanced Steganography and Watermarking Techniques
Physical Sciences →  Computer Science →  Computer Vision and Pattern Recognition
Chaos-based Image/Signal Encryption
Physical Sciences →  Computer Science →  Computer Vision and Pattern Recognition
Cryptography and Data Security
Physical Sciences →  Computer Science →  Artificial Intelligence

Related Documents

JOURNAL ARTICLE

Sharing and hiding a secret image in color palette images with authentication

Xiaotian WuChing‐Nung YangYi-Yun Yang

Journal:   Multimedia Tools and Applications Year: 2020 Vol: 79 (35-36)Pages: 25657-25677
JOURNAL ARTICLE

Secret image sharing with steganography and authentication

Chang-Chou LinWen‐Hsiang Tsai

Journal:   Journal of Systems and Software Year: 2003 Vol: 73 (3)Pages: 405-414
BOOK-CHAPTER

Image Secret Sharing in Stego-Images with Authentication

Amitava NagSushanta BiswasDebasree SarkarPartha Sarkar

Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering Year: 2013 Pages: 764-770
JOURNAL ARTICLE

Secret image sharing with separate shadow authentication ability

Xuehu YanQinghong GongLonglong LiGuozheng YangYuliang LuJingju Liu

Journal:   Signal Processing Image Communication Year: 2019 Vol: 82 Pages: 115721-115721
© 2026 ScienceGate Book Chapters — All rights reserved.