Font Size: a A A

Research On A Secure And Verifiable Secret Image Sharing Method Based On Steganography

Posted on:2022-07-31Degree:MasterType:Thesis
Country:ChinaCandidate:X W ZhongFull Text:PDF
GTID:2518306539453114Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
With the commercialization of 5G network and the portability of intelligent devices,more and more data in daily life will be digitized.As a large number of digital data appear in the Internet,the problem of privacy data leakage is followed.Once personal or business privacy data is leaked,the harm cannot be underestimated.Therefore,the protection of privacy data security has become a hot topic.In traditional privacy security schemes,the privacy is usually kept by only one person in a single storage device.If the storage device is damaged or the private is maliciously tampered with,the privacy cannot be recovered.However,it will increase the possibility of security threats to copy multiple copies of privacy and distribute them to multiple devices.Therefore,researchers propose secret sharing(SS)to solve the above problems.In SS scheme,the secret is divided into a series of pieces,which are often called shares or shadows.In order to prevent these disordered shares from causing security threats in transmission or storage,these shares are usually embedded into meaningful covers with steganography and distributed to participants.Finally,the secret can be recovered by the qualified shares.In the field of SS,it is necessary to ensure the visual quality and embedding capacity.On the other hand,it is necessary to ensure the authentication capability and robustness of the covers.Based on the above two aspects,this paper proposes a secure secret image sharing with steganography and authentication:Firstly,this thesis proposes a secret image sharing scheme with steganography and authentication based on IWT(Integer Wavelet Transform).In this scheme,the secret is divided into a series of noise-like shares with polynomial,then the shares are embedded into IWT subband coefficients of the covers,instead of the shares directly embedded into the spatial domain in the early existing schemes.The wavelet domain has a certain ability of resisting some steganalysis attacks according to the properties of IWT itself,which improves the robustness of the covers.In order to improve the visual quality of the covers,OPAP(Optimal Pixel Adjustment Process)is used to optimize the visual quality of the embedded covers.In addition,in order to improve the authentication capability to prevent forged shares from participating in the secret reconstruction process,more authentication information is embedded in one authentication unit of the covers.Experimental results and theoretical analysis show that the proposed scheme has better visual quality,authentication capability and anti-steganalysis ability.Secondly,QR Code(Quick Response Code)has become one of most popular covers due to its high capacity,convenience in reading and writing and high error correction capability.The application of secret sharing in QR Code has a broad prospect,thus this paper proposes a secret image sharing with steganography and authentication based on the error correction property of QR Code.The authentication bits are embedded into the cover QR Codes according to the homomorphism of RS(Reed-Solomon)code without damaging any function of QR Codes.At the same time,the noise-like shares are embedded into the cover QR Codes according to the error correction redundancy.This scheme makes full use of the characteristics of QR Codes,each stego-QR Codes is a valid QR Code,which not only does not reveal any secret,but also reduces the likelihood of attracting the attention of potential attackers.In addition,high payload of QR Codes is realized by polynomial,and more authentication information can improve the security of the authentication process.To sum up,the gray images and QR Codes are taken as the research covers.After in-depth understanding of the research background and secret sharing method,the existing scheme is improved so that the secret sharing method can be applied to a wider range of fields.
Keywords/Search Tags:Secret Sharing, Visual Quality, Authentication Capability, Integer Wavelet Transform, QR Code
PDF Full Text Request
Related items