JOURNAL ARTICLE

A new sharing secret algorithm in stego images with authentication

Abstract

In the paper, a new sharing secret algorithm in stego images with authentication is presented. The proposed approach employs a novel secret image sharing scheme based on set partitioning in hierarchical trees (SPIHT) algorithm, uses two stego blocks instead of a single block for authentication, and designs the check bits by effectively combining existing authentication ideas with Hamming codes. As a result, it enhances the authentication ability, improves visual quality of the stego images and incorporates an error correction capability of the leading method in the field. Experimental results demonstrate these promising characteristics of this method.

Keywords:
Computer science Authentication (law) Steganography Secret sharing Block (permutation group theory) Hamming code Image sharing Hamming distance Algorithm Scheme (mathematics) Set partitioning in hierarchical trees Set (abstract data type) Theoretical computer science Image (mathematics) Cryptography Artificial intelligence Block code Image processing Computer security Mathematics Decoding methods Image compression

Metrics

2
Cited By
0.31
FWCI (Field Weighted Citation Impact)
29
Refs
0.67
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Advanced Steganography and Watermarking Techniques
Physical Sciences →  Computer Science →  Computer Vision and Pattern Recognition
Chaos-based Image/Signal Encryption
Physical Sciences →  Computer Science →  Computer Vision and Pattern Recognition
Advanced Data Compression Techniques
Physical Sciences →  Computer Science →  Computer Vision and Pattern Recognition

Related Documents

BOOK-CHAPTER

Image Secret Sharing in Stego-Images with Authentication

Amitava NagSushanta BiswasDebasree SarkarPartha Sarkar

Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering Year: 2013 Pages: 764-770
JOURNAL ARTICLE

Sharing secrets in stego images with authentication

Chin‐Chen ChangYi-Pei HsiehChia-Hsuan Lin

Journal:   Pattern Recognition Year: 2008 Vol: 41 (10)Pages: 3130-3137
JOURNAL ARTICLE

Authors reply ‘Sharing secrets in stego images with authentication’

Chin‐Chen ChangYi-Pei Hsieh

Journal:   Pattern Recognition Year: 2009 Vol: 42 (7)Pages: 1620-1621
© 2026 ScienceGate Book Chapters — All rights reserved.