Hiding and Encryption of Secret Image Using Secret Sharing Scheme

Authors

  • Mohammed A. Kareem
  • Yossra Hussain Ali Department of Computer Science, University of Technology, Baghdad, Iraq
  • Hussein Jaeiz Mankhi Department of Computer Science, University of Technology, Baghdad, Iraq

Keywords:

Information Hiding, Message Digest Algorithm 5 (MD5), Secret Sharing

Abstract

With the development of information technology and means for information transfer it has become necessary to protect sensitive information. The current research presents a method to protect secret colored images which includes three phases: The first phase calculates hash value using one of hash functions to ensure that no tampering with or updating the contents of the secret image. The second phase is encrypting image and embedding it randomly into appropriate cover image using Random Least Significant Bit (RLSB) technique. Random hiding provides protection of information embedded inside cover image for inability to predict the hiding positions, as well as the difficult of determining the concealment positions through the analysis of image or statistical analysis. Finally, secret sharing of carrier information image is applied. In the proposed hide method, the secret image is restored completely without external influence, where when image embedding is exposure to noise (95% - 90%) is retrieved of secret data and correlation coefficient is strong between the secret and retrieved image ranging from (0.97 to 0.93). Test results of the proposed method to measure the quality of image after reconstructing stego image from share images good. Where it has been hidden secret image (84x84) pixels into cover image (160x160) pixel, PSNR the result is 45.735db.

Downloads

Download data is not yet available.

Downloads

Published

2022-02-04

Issue

Section

Computer Science

How to Cite

Hiding and Encryption of Secret Image Using Secret Sharing Scheme. (2022). Iraqi Journal of Science, 57(4A), 2502-2512. https://ijs.uobaghdad.edu.iq/index.php/eijs/article/view/6377

Similar Articles

1-10 of 1432

You may also start an advanced similarity search for this article.

Most read articles by the same author(s)

<< < 1 2 3 4 5 6 7 8 9 > >>