A novel meaningful secret image sharing method based on Arabic letters
Keywords:
Meaningful secret image sharing, data hiding, visual cryptography, information security.Abstract
In recent years, the providing of information security for multimedia has become an important subject of study. Visual cryptography and secret sharing is protected image contents without using complex mathematically operators. Thus, visual cryptography and secret sharing are widely used. In this paper, Letter based Secret Image Sharing (LSIS) for protecting of image contents. For this purpose, secret sharing and data hiding algorithms are used together in this LSIS method. The LSIS method consists of two parts. These are generating of meaningful secret sharing and data hiding. Secret sharing and visual cryptography methods commonly generate noise-like images. The noise-like images have attracted the attention of the attackers and several attacks have been developed to break these encrypted images. To prevent these attacks, meaningful secret shares are generated and these secret shares are embedded into cover image. In this paper, we proposed a novel secret image sharing method based on Arabic letters. The proposed method is used Arabic letters for generating meaningful secret shares and data hiding functions are used for camouflage. RGB images are used for cover images. In proposed method, secret shares are embedded into R, G and B channels respectively. Thus, cheatingsĀ occurred in visual cryptography are prevented.References
Ateniese, G., Blundo, C., De Santis, A. & Stinson, D.R. (1996).
Visual cryptography for general access structures. Information and
Computation, 129:86106.
Bharanivendhan, N. & Amitha, T. (2014). Visual cryptography
schemes for secret image sharing using GAS Algorithm. International
Journal of Computer Applications, 92(8):11-16
Blundo, C., Cimato, S. & De Santis, A. (2006). Visual cryptography
schemes with optimal pixel expansion. Theoretical Computer Science,
:169182.
Chiu, P.L. & Lee, K.H. (2015). User-friendly threshold visual
cryptography with complementary cover images. Signal Processing,
:476-488.
Choi, Y. & Aizawa, K. (2002). Digital watermarking technique using
block correlation of DCT coefficients. Electronics and Communications
in Japan (Part II: Electronics), 85(9):2331.
Choi, K.S. (2013). Bit plane modification for improving MSEnear
optimal DPCM-based block truncation coding. Digital Signal
Processing, 23(4):1171-1180.
DArco, P., De Prisco, R. & De Santis, A. (2014). Measureindependent
characterization of contrast optimal visual cryptography
schemes. Journal of Systems and Software, 95:89-99.
Gutub, A., Ghouti, L., Elarian, Y., Awaideh, S. & Alvi, A. (2010).
Utilizing diacritic marks for arabic text steganography. Kuwait Journal
of Science & Engineering, 37(1):89-109.
Govind, P.V.S. & Wilscy, M. (2015). A new reversible data hiding scheme with improved capacity based on directional interpolation and
difference expansion. Procedia Computer Science, 46:491-498.
Hussain, I. (2013). A novel approach of audio watermarking based on
image-box transformation. Mathematical and Computer Modelling,
(34):963-969.
Khamrui, A. & Mandal, J.K. (2013). A genetic algorithm based
steganography using discrete cosine transformation (GASDCT).
Procedia Technology, 10:105-111.
Lee, S.H. (2014). DWT based coding DNA watermarking for DNA
copyright protection. Information Sciences, 273:263-286.
Lin, C.C., Liu, X.L. & Yuan, S.M. (2015). Reversible data hiding
for VQ-compressed images based on search-order coding and statecodebook
mapping. Information Sciences, 293:314-326.
Lin, Y.K. (2014). A data hiding scheme based upon DCT coefficient
modification. Computer Standards & Interfaces, 36(5):855-862.
Lin, H.C., Yang, C.N., Laih, C.S. & Lin, H.T. (2013). Natural
language letter based visual cryptography scheme. Journal of Visual
Communication and Image Representation, 24(3):318-331.
Lin, P.Y., Wang, R.Z., Chang, Y.J. & Fang, W.P. (2015). Prevention
of cheating in visual cryptography by using coherent patterns.
Information Sciences, 301:61-74.
Liu, Y. & Zhao, J. (2010). A new video watermarking algorithm based
on 1D DFT and Radon transform. Signal Processing, 90(2):626-639.
Liu, J.F., Tian, Y.G., Han, T., Yang, C.F. & Liu, W.B. (2015). LSB
steganographic payload location for JPEG-decompressed images.
Digital Signal Processing, 38:66-76.
Lou, D.C. & Hu, C.H. (2012). LSB steganographic method based on
reversible histogram transformation function for resisting statistical
steganalysis. Information Sciences, 188:346-358.
Mandal, J.K. (2012). Watermarking in transform domains (WTD).
Procedia Technology, 4:19-26.
Nair, N.S., Mathew, T.A., Neethu, S., Viswanath, V.P., Nair, M. S. et
al. (2015). A proactive approach to reversible data hiding in encrypted
images. Procedia Computer Science, 46:1510-1517.
Nazari, S., Moghadam, A.M.E. & Moin, M.S. (2015). A novel image
steganography scheme based on morphological associative memory
and permutation schema. Security and Communication Networks,
(2):110121.
Naor, M. & Shamir, A. (1994). Visual cryptography, in: A. DeSantis
(Ed.), Advances in Cryptology EUROCRYPT94. Lecture Notes in
Computer Science, Perugia, Italy, 950:112.
Ou, D., Sun, W. & Wu, X. (2015). Non-expansible XOR-based visual
cryptography scheme with meaningful shares. Signal Processing, 108:
-621.
Parvez, M.T. & Gutub, A.A. (2011). Vibrant color image steganography
using channel differences and secret data distribution. Kuwait Journal
of Science and Engineering, 38(1B):127-142.
SIPI Image Dataset, University of Southern California, signal and
image processing institute. Available online: http://sipi.usc.edu/
database (05.01.2016).
Tanchenko, A. (2014). Visual-PSNR measure of image quality. Journal
of Visual Communication and Image Representation, 25(5):874-878.
Veerappan, J. & Pitchammal, G. (2012). Interpolation based image
watermarking using segmentation resisting to geometrical attacks.
Procedia Engineering, 38:3528-3540.
Yang, C.N. & Lin, C.Y. (2015). Almost-aspect-ratio-invariant visual
cryptography without adding extra subpixels. Information Sciences,
:131-151.
Yan, X., Wang, S., Niu, X. & Yang, C.N. (2015). Generalized random
grids-based threshold visual cryptography with meaningful shares.
Signal Processing, 109:317-333.
Yan, X., Wang, S., Niu, X. & Yang, C.N. (2015). Halftone visual
cryptography with minimum auxiliary black pixels and uniform image
quality. Digital Signal Processing, 38:53-65.
Yan, X., Wang, S. & Niu, X. (2014). Threshold construction from
specific cases in visual cryptography without the pixel expansion.
Signal Processing, 105:389-398.
Wang, D., Li, X. & Yi, F. (2007). Probabilistic (n, n) visual secret
sharing scheme for grayscale images. In Information Security and
Cryptology. Lecture Notes in Computer Science, 4990:192200.
Wang, D., Zhang, L., Ma, N. & Li, X. (2006). Two secret sharing
schemes based on Boolean operations. Pattern Recognition,
(10):2776-2785.
Wu, X. & Sun, W. (2012). Random grid-based visual secret sharing
for general access structures with cheat-preventing ability. Journal of
Systems and Software, 85(5):11191134.