By Topic

(N, 1) secret sharing approach based on steganography with gray digital images

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Jinsuk Baek ; Dept. of Comput. Sci., Winston-Salem State Univ., Winston-Salem, NC, USA ; Cheonshik Kim ; Fisher, P.S. ; Hongyang Chao

We present a description of a technique to embed secret data to an image, called information hiding or stegnography. We utilize some simple observed relationships between the binary representation of a pixel, the gray code representation, and the utilization of a simple Exclusive-OR operation based upon N images available to the sender and the receiver, called the cover images. We present the algorithms for embedding the secret data in the altered, last image, N+1, called the stego image; as well as extracting this data on the receiving side. We present some experimental images utilizing two cover images, and one stego image and show that the procedure we propose has a high PSNR value, and an almost identical histogram when compared to the before stego image. We also discuss the robustness of this algorithm under attack methods such as steganalysis.

Published in:

Wireless Communications, Networking and Information Security (WCNIS), 2010 IEEE International Conference on

Date of Conference:

25-27 June 2010