A sudoku-based secret image sharing scheme with reversibility

被引:45
作者
Chang C.-C. [1 ]
Lin P.-Y. [2 ]
Wang Z.H. [3 ]
Li M.C. [3 ]
机构
[1] Department of Information Engineering and Computer Science, Feng Chia University, Seatwen, Taichung 40724
[2] Department of Information Communication, Yuan Ze University, Chung-Li, 32003
[3] School of Software, Dalian University of Technology, Dalian, Liaoning
来源
Journal of Communications | 2010年 / 5卷 / 01期
关键词
Puzzle; Reversible; Secret sharing; Steganography; Sudoku;
D O I
10.4304/jcm.5.1.5-12
中图分类号
学科分类号
摘要
A common drawback of the image sharing with steganography approaches is that the revealed secret image is distorted due to the truncation of the grayscale secret image. To lossless reveal the secret image in the (t, n)-threshold, we provide a novel sharing scheme in this article. Moreover, the original host image can be recovered by the embedded shadow images. To accomplish the above purposes, the proposed scheme derives the secret shadows and generates the meaningful shadow images by adopting the sudoku. In the new scheme, the sudoku grid is setting to 16×16 and divided into sixteen 4×4 blocks. Thus, we can embed 4×(t-1) secret bits into each pixel pair of the host image. Besides, the embeddable secret capacity can be improved according to the threshold t in the (t, n)-threshold sharing system. The experiments show that the shadows can be successfully camouflaged in the host image with satisfactory quality. The distortion of the embedded host pixels is limited within range [0, 3]. Moreover, the proposed scheme provides a large capacity for embedded secret data. © 2010 Academy Publisher.
引用
收藏
页码:5 / 12
页数:7
相关论文
共 27 条
[1]  
Blakley G.R., Safeguarding cryptographic keys, Proceedings of Afips National Computer Conference, 48, pp. 313-317, (1979)
[2]  
Shamir A., How to share a secret, Communications of The ACM, 22, 11, pp. 612-613, (1979)
[3]  
Chang C.C., Hwang R.J., Efficient cheater identification method for threshold schemes, Iee Proceedings - Computers and Digital Techniques, 144, 1, pp. 23-27, (1997)
[4]  
Beimel A., Chor B., Secret sharing with public reconstruction, Ieee Transactions On Information Theory, 44, 5, pp. 1887-1896, (1998)
[5]  
Chang C.C., Hwang R.J., Sharing secret images using shadow codebooks, Information Sciences, 111, 1, pp. 335-345, (1998)
[6]  
Chen T.S., Chang C.C., New method of secret image sharing based on vector quantization, Journal of Electronic Imaging, 10, 4, pp. 988-997, (2001)
[7]  
Feng J.B., Wu H.C., Tsai C.S., Chu Y.P., A new multi-secret images sharing scheme using Lagrange's Interpolation, The Journal of Systems and Software, 76, 3, pp. 327-339, (2005)
[8]  
Chang C.C., Lin C.Y., Tseng C.S., Secret image hiding and sharing based on the (t, n)-threshold, Fundamenta Informaticae, 76, 4, pp. 399-411, (2007)
[9]  
Thien C.C., Lin J.C., Secret image sharing, Computer & Graphics, 26, 1, pp. 765-770, (2002)
[10]  
Wang R.Z., Shyu S.J., Scalable secret image sharing, Signal Processing: Image Communication, 22, 4, pp. 363-373, (2007)