Integer wavelet transform‐based secret image sharing using rook polynomial and hamming code with authentication

Abstract As an effective way to securely transfer secret images, secret image sharing (SIS) has been a noteworthy area of research. Basically in a SIS scheme, a secret image is shared via shadows and could be reconstructed by having the required number of them. A major downside of this method is its...

Full description

Saved in:
Bibliographic Details
Main Authors: Sara Charoghchi, Zahra Saeidi, Samaneh Mashhadi
Format: Article
Language:English
Published: Wiley 2024-12-01
Series:CAAI Transactions on Intelligence Technology
Subjects:
Online Access:https://doi.org/10.1049/cit2.12357
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841543303474970624
author Sara Charoghchi
Zahra Saeidi
Samaneh Mashhadi
author_facet Sara Charoghchi
Zahra Saeidi
Samaneh Mashhadi
author_sort Sara Charoghchi
collection DOAJ
description Abstract As an effective way to securely transfer secret images, secret image sharing (SIS) has been a noteworthy area of research. Basically in a SIS scheme, a secret image is shared via shadows and could be reconstructed by having the required number of them. A major downside of this method is its noise‐like shadows, which draw the malicious users' attention. In order to overcome this problem, SIS schemes with meaningful shadows are introduced in which the shadows are first hidden in innocent‐looking cover images and then shared. In most of these schemes, the cover image cannot be recovered without distortion, which makes them useless in case of utilising critical cover images such as military or medical images. Also, embedding the secret data in Least significant bits of the cover image, in many of these schemes, makes them very fragile to steganlysis. A reversible IWT‐based SIS scheme using Rook polynomial and Hamming code with authentication is proposed. In order to make the scheme robust to steganalysis, the shadow image is embedded in coefficients of Integer wavelet transform of the cover image. Using Rook polynomial makes the scheme more secure and moreover makes authentication very easy and with no need to share private key to participants. Also, utilising Hamming code lets us embed data with much less required modifications on the cover image which results in high‐quality stego images.
format Article
id doaj-art-4b0c1c71f94547498c3af49fa83fc8d9
institution Kabale University
issn 2468-2322
language English
publishDate 2024-12-01
publisher Wiley
record_format Article
series CAAI Transactions on Intelligence Technology
spelling doaj-art-4b0c1c71f94547498c3af49fa83fc8d92025-01-13T14:05:51ZengWileyCAAI Transactions on Intelligence Technology2468-23222024-12-01961435145010.1049/cit2.12357Integer wavelet transform‐based secret image sharing using rook polynomial and hamming code with authenticationSara Charoghchi0Zahra Saeidi1Samaneh Mashhadi2Cryptography and Data Security Laboratory School of Mathematics and Computer Science Iran University of Science & Technology Tehran IranCryptography and Data Security Laboratory School of Mathematics and Computer Science Iran University of Science & Technology Tehran IranCryptography and Data Security Laboratory School of Mathematics and Computer Science Iran University of Science & Technology Tehran IranAbstract As an effective way to securely transfer secret images, secret image sharing (SIS) has been a noteworthy area of research. Basically in a SIS scheme, a secret image is shared via shadows and could be reconstructed by having the required number of them. A major downside of this method is its noise‐like shadows, which draw the malicious users' attention. In order to overcome this problem, SIS schemes with meaningful shadows are introduced in which the shadows are first hidden in innocent‐looking cover images and then shared. In most of these schemes, the cover image cannot be recovered without distortion, which makes them useless in case of utilising critical cover images such as military or medical images. Also, embedding the secret data in Least significant bits of the cover image, in many of these schemes, makes them very fragile to steganlysis. A reversible IWT‐based SIS scheme using Rook polynomial and Hamming code with authentication is proposed. In order to make the scheme robust to steganalysis, the shadow image is embedded in coefficients of Integer wavelet transform of the cover image. Using Rook polynomial makes the scheme more secure and moreover makes authentication very easy and with no need to share private key to participants. Also, utilising Hamming code lets us embed data with much less required modifications on the cover image which results in high‐quality stego images.https://doi.org/10.1049/cit2.12357hamming codehomogeneous linear recursionIWTrook polynomial(t, n)‐secret image sharing
spellingShingle Sara Charoghchi
Zahra Saeidi
Samaneh Mashhadi
Integer wavelet transform‐based secret image sharing using rook polynomial and hamming code with authentication
CAAI Transactions on Intelligence Technology
hamming code
homogeneous linear recursion
IWT
rook polynomial
(t, n)‐secret image sharing
title Integer wavelet transform‐based secret image sharing using rook polynomial and hamming code with authentication
title_full Integer wavelet transform‐based secret image sharing using rook polynomial and hamming code with authentication
title_fullStr Integer wavelet transform‐based secret image sharing using rook polynomial and hamming code with authentication
title_full_unstemmed Integer wavelet transform‐based secret image sharing using rook polynomial and hamming code with authentication
title_short Integer wavelet transform‐based secret image sharing using rook polynomial and hamming code with authentication
title_sort integer wavelet transform based secret image sharing using rook polynomial and hamming code with authentication
topic hamming code
homogeneous linear recursion
IWT
rook polynomial
(t, n)‐secret image sharing
url https://doi.org/10.1049/cit2.12357
work_keys_str_mv AT saracharoghchi integerwavelettransformbasedsecretimagesharingusingrookpolynomialandhammingcodewithauthentication
AT zahrasaeidi integerwavelettransformbasedsecretimagesharingusingrookpolynomialandhammingcodewithauthentication
AT samanehmashhadi integerwavelettransformbasedsecretimagesharingusingrookpolynomialandhammingcodewithauthentication