Secret image sharing with distinct covers based on improved Cycling-XOR

被引:1
作者
Lin, Jiang-Yi [1 ,3 ]
Horng, Ji-Hwei [2 ]
Chang, Chin-Chen [3 ]
机构
[1] Xiamen Univ Technol, Sch Comp & Informat Engn, Xiamen 361024, Peoples R China
[2] Natl Quemoy Univ, Dept Elect Engn, Kinmen 89250, Taiwan
[3] Feng Chia Univ, Dept Informat Engn & Comp Sci, Taichung 40724, Taiwan
关键词
Secret image sharing; Image encryption; Reversible data hiding; Key-free; Cycling-XOR; DATA HIDING SCHEME; EXPANSION;
D O I
10.1016/j.jvcir.2024.104282
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Secret image sharing (SIS) is a technique used to distribute confidential data by dividing it into multiple image shadows. Most of the existing approaches or algorithms protect confidential data by encryption with secret keys. This paper proposes a novel SIS scheme without using any secret key. The secret images are first quantized and encrypted by self-encryption into noisy ones. Then, the encrypted images are mixed into secret shares by crossencryption. The image shadows are generated by replacing the lower bit-planes of the cover images with the secret shares. In the extraction phase, the receiver can restore the quantized secret images by combinatorial operations of the extracted secret shares. Experimental results show that our method is able to deliver a large amount of data payload with a satisfactory cover image quality. Besides, the computational load is very low since the whole scheme is mostly based on cycling-XOR operations.
引用
收藏
页数:11
相关论文
共 27 条
[1]  
Abdulla A.A., 2015, Diss
[2]   Reversible watermark using the difference expansion of a generalized integer transform [J].
Alattar, AM .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2004, 13 (08) :1147-1156
[3]   Hiding data in images by simple LSB substitution [J].
Chan, CK ;
Cheng, LM .
PATTERN RECOGNITION, 2004, 37 (03) :469-474
[4]  
Chang C.C., 2007, P IEEE REG 10 INT C, P1
[5]  
Chang Chin-Chen, 2013, 2013 9 INT C INFORM
[6]   A PVD-based data hiding method with histogram preserving using pixel pair matching [J].
Chen, Jeanne .
SIGNAL PROCESSING-IMAGE COMMUNICATION, 2014, 29 (03) :375-384
[7]   Verifiable (2, n) Image Secret Sharing Scheme Using Sudoku Matrix [J].
Chen, Yi-Hui ;
Lee, Jia-Ye ;
Chiang, Min-Hsien ;
Chen, Shih-Hsin .
SYMMETRY-BASEL, 2022, 14 (07)
[8]   Meaningful Secret Image Sharing with Saliency Detection [J].
Cheng, Jingwen ;
Yan, Xuehu ;
Liu, Lintao ;
Jiang, Yue ;
Wang, Xuan .
ENTROPY, 2022, 24 (03)
[9]   A Novel (2,3) Reversible Secret Image Sharing Based on Fractal Matrix [J].
Gao, Kai ;
Horng, Ji-Hwei ;
Chang, Chin-Chen .
IEEE ACCESS, 2020, 8 :174325-174341
[10]   A Reversible Secret Image Sharing Scheme Based on Stick Insect Matrix [J].
Gao, Kai ;
Horng, Ji-Hwei ;
Liu, Yanjun ;
Chang, Chin-Chen .
IEEE ACCESS, 2020, 8 :130405-130416