An Enhanced Approach of Image Steganographic Using Discrete Shearlet Transform and Secret Sharing

Recently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verificatio...

Full description

Saved in:
Bibliographic Details
Main Authors: Yasir Ahmed Hamza, Nada Elya Tewfiq, Mohammed Qasim Ahmed
Format: Article
Language:English
Published: University of Baghdad, College of Science for Women 2022-02-01
Series:مجلة بغداد للعلوم
Subjects:
Online Access:https://bsj.uobaghdad.edu.iq/index.php/BSJ/article/view/4530
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1849416780754190336
author Yasir Ahmed Hamza
Nada Elya Tewfiq
Mohammed Qasim Ahmed
author_facet Yasir Ahmed Hamza
Nada Elya Tewfiq
Mohammed Qasim Ahmed
author_sort Yasir Ahmed Hamza
collection DOAJ
description Recently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512x512) is divided into three layers (red, green and blue). The blue layer is transformed using Discrete Shearlet Transform (DST) to obtain its coefficients. The first secret share is embedded at the coefficients of transformed blue layer to obtain a stego image. At extraction process, the first secret share is extracted from the coefficients of blue layer of the stego image and XORed with the second secret share to generate the original secret logo. According to the experimental results, the proposed method is achieved better imperceptibility for the stego image with the payload capacity equal to (1 bpp). In addition, the secret logo becomes more secured using (2 out 2 share) visual cryptography and the second secret share as a private key.
format Article
id doaj-art-5efcb8f9990f484cab54a05e56ee34bc
institution Kabale University
issn 2078-8665
2411-7986
language English
publishDate 2022-02-01
publisher University of Baghdad, College of Science for Women
record_format Article
series مجلة بغداد للعلوم
spelling doaj-art-5efcb8f9990f484cab54a05e56ee34bc2025-08-20T03:33:03ZengUniversity of Baghdad, College of Science for Womenمجلة بغداد للعلوم2078-86652411-79862022-02-0119110.21123/bsj.2022.19.1.0197An Enhanced Approach of Image Steganographic Using Discrete Shearlet Transform and Secret SharingYasir Ahmed Hamza0Nada Elya Tewfiq 1Mohammed Qasim Ahmed 2Department of Computer Science, College of Computer and IT, Nawroz University, Duhok, IraqDepartment of Computer Science, College of Computer and IT, Nawroz University, Duhok, IraqDepartment of Computer Science, College of Education, University of Alhamdaniya, Mosul, IraqRecently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512x512) is divided into three layers (red, green and blue). The blue layer is transformed using Discrete Shearlet Transform (DST) to obtain its coefficients. The first secret share is embedded at the coefficients of transformed blue layer to obtain a stego image. At extraction process, the first secret share is extracted from the coefficients of blue layer of the stego image and XORed with the second secret share to generate the original secret logo. According to the experimental results, the proposed method is achieved better imperceptibility for the stego image with the payload capacity equal to (1 bpp). In addition, the secret logo becomes more secured using (2 out 2 share) visual cryptography and the second secret share as a private key.https://bsj.uobaghdad.edu.iq/index.php/BSJ/article/view/4530Discrete Shearlet Transform, Image Steganography, Stego Image, Secret Sharing.
spellingShingle Yasir Ahmed Hamza
Nada Elya Tewfiq
Mohammed Qasim Ahmed
An Enhanced Approach of Image Steganographic Using Discrete Shearlet Transform and Secret Sharing
مجلة بغداد للعلوم
Discrete Shearlet Transform, Image Steganography, Stego Image, Secret Sharing.
title An Enhanced Approach of Image Steganographic Using Discrete Shearlet Transform and Secret Sharing
title_full An Enhanced Approach of Image Steganographic Using Discrete Shearlet Transform and Secret Sharing
title_fullStr An Enhanced Approach of Image Steganographic Using Discrete Shearlet Transform and Secret Sharing
title_full_unstemmed An Enhanced Approach of Image Steganographic Using Discrete Shearlet Transform and Secret Sharing
title_short An Enhanced Approach of Image Steganographic Using Discrete Shearlet Transform and Secret Sharing
title_sort enhanced approach of image steganographic using discrete shearlet transform and secret sharing
topic Discrete Shearlet Transform, Image Steganography, Stego Image, Secret Sharing.
url https://bsj.uobaghdad.edu.iq/index.php/BSJ/article/view/4530
work_keys_str_mv AT yasirahmedhamza anenhancedapproachofimagesteganographicusingdiscreteshearlettransformandsecretsharing
AT nadaelyatewfiq anenhancedapproachofimagesteganographicusingdiscreteshearlettransformandsecretsharing
AT mohammedqasimahmed anenhancedapproachofimagesteganographicusingdiscreteshearlettransformandsecretsharing
AT yasirahmedhamza enhancedapproachofimagesteganographicusingdiscreteshearlettransformandsecretsharing
AT nadaelyatewfiq enhancedapproachofimagesteganographicusingdiscreteshearlettransformandsecretsharing
AT mohammedqasimahmed enhancedapproachofimagesteganographicusingdiscreteshearlettransformandsecretsharing