A sudoku-based secret image sharing scheme with reversibility

被引:45
作者
Chang C.-C. [1 ]
Lin P.-Y. [2 ]
Wang Z.H. [3 ]
Li M.C. [3 ]
机构
[1] Department of Information Engineering and Computer Science, Feng Chia University, Seatwen, Taichung 40724
[2] Department of Information Communication, Yuan Ze University, Chung-Li, 32003
[3] School of Software, Dalian University of Technology, Dalian, Liaoning
来源
Journal of Communications | 2010年 / 5卷 / 01期
关键词
Puzzle; Reversible; Secret sharing; Steganography; Sudoku;
D O I
10.4304/jcm.5.1.5-12
中图分类号
学科分类号
摘要
A common drawback of the image sharing with steganography approaches is that the revealed secret image is distorted due to the truncation of the grayscale secret image. To lossless reveal the secret image in the (t, n)-threshold, we provide a novel sharing scheme in this article. Moreover, the original host image can be recovered by the embedded shadow images. To accomplish the above purposes, the proposed scheme derives the secret shadows and generates the meaningful shadow images by adopting the sudoku. In the new scheme, the sudoku grid is setting to 16×16 and divided into sixteen 4×4 blocks. Thus, we can embed 4×(t-1) secret bits into each pixel pair of the host image. Besides, the embeddable secret capacity can be improved according to the threshold t in the (t, n)-threshold sharing system. The experiments show that the shadows can be successfully camouflaged in the host image with satisfactory quality. The distortion of the embedded host pixels is limited within range [0, 3]. Moreover, the proposed scheme provides a large capacity for embedded secret data. © 2010 Academy Publisher.
引用
收藏
页码:5 / 12
页数:7
相关论文
共 50 条
[31]   An efficient (t,n)–threshold secret image sharing scheme [J].
Ali Kanso ;
Mohammad Ghebleh .
Multimedia Tools and Applications, 2017, 76 :16369-16388
[32]   New Secret Sharing Scheme Based on Faster R-CNNs Image Retrieval [J].
Li, Jianjun ;
Wang, Ning ;
Wang, Zhi-Hui ;
Li, Haojie ;
Chang, Chin-Chen ;
Wang, Hong .
IEEE ACCESS, 2018, 6 :49348-49357
[33]   Essential secret image sharing scheme with different importance of shadows [J].
Li, Peng ;
Yang, Ching-Nung ;
Wu, Chih-Cheng ;
Kong, Qian ;
Ma, Yanpeng .
JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2013, 24 (07) :1106-1114
[34]   A novel multiple-level secret image sharing scheme [J].
Liu, Yi-Ning ;
Zhong, Qi ;
Xie, Ming ;
Chen, Zu-Bin .
MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (05) :6017-6031
[35]   A novel secret image sharing scheme using large primes [J].
Ghebleh, Mohammad ;
Kanso, Ali .
MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (10) :11903-11923
[36]   A multi-threshold secret image sharing scheme based on MSP [J].
Guo, Cheng ;
Chang, Chin-Chen ;
Qin, Chuan .
PATTERN RECOGNITION LETTERS, 2012, 33 (12) :1594-1600
[37]   A new multi-secret image sharing scheme based on DCT [J].
Chanu, Oinam Bidyapati ;
Neelima, Arambam .
VISUAL COMPUTER, 2020, 36 (05) :939-950
[38]   An efficient Boolean based multi-secret image sharing scheme [J].
Amitava Nag ;
Jyoti Prakash Singh ;
Amit Kumar Singh .
Multimedia Tools and Applications, 2020, 79 :16219-16243
[39]   An efficient Boolean based multi-secret image sharing scheme [J].
Nag, Amitava ;
Singh, Jyoti Prakash ;
Singh, Amit Kumar .
MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (23-24) :16219-16243
[40]   Polynomial-Based Secret Sharing Scheme for Text, Image and Audio [J].
Guttikonda P. ;
Mundukur N.B. .
Journal of The Institution of Engineers (India): Series B, 2020, 101 (05) :609-621