A sudoku-based secret image sharing scheme with reversibility

被引:45
作者
Chang C.-C. [1 ]
Lin P.-Y. [2 ]
Wang Z.H. [3 ]
Li M.C. [3 ]
机构
[1] Department of Information Engineering and Computer Science, Feng Chia University, Seatwen, Taichung 40724
[2] Department of Information Communication, Yuan Ze University, Chung-Li, 32003
[3] School of Software, Dalian University of Technology, Dalian, Liaoning
来源
Journal of Communications | 2010年 / 5卷 / 01期
关键词
Puzzle; Reversible; Secret sharing; Steganography; Sudoku;
D O I
10.4304/jcm.5.1.5-12
中图分类号
学科分类号
摘要
A common drawback of the image sharing with steganography approaches is that the revealed secret image is distorted due to the truncation of the grayscale secret image. To lossless reveal the secret image in the (t, n)-threshold, we provide a novel sharing scheme in this article. Moreover, the original host image can be recovered by the embedded shadow images. To accomplish the above purposes, the proposed scheme derives the secret shadows and generates the meaningful shadow images by adopting the sudoku. In the new scheme, the sudoku grid is setting to 16×16 and divided into sixteen 4×4 blocks. Thus, we can embed 4×(t-1) secret bits into each pixel pair of the host image. Besides, the embeddable secret capacity can be improved according to the threshold t in the (t, n)-threshold sharing system. The experiments show that the shadows can be successfully camouflaged in the host image with satisfactory quality. The distortion of the embedded host pixels is limited within range [0, 3]. Moreover, the proposed scheme provides a large capacity for embedded secret data. © 2010 Academy Publisher.
引用
收藏
页码:5 / 12
页数:7
相关论文
共 50 条
[41]   Cheating identifiable polynomial based secret sharing scheme for audio and image [J].
Guttikonda Prashanti ;
Mundukur Nirupama Bhat .
Multimedia Tools and Applications, 2024, 83 :403-423
[42]   A (n, n) Secret Image Sharing Scheme Based On Array Scrambling [J].
Bhattacharjee, Tapasi ;
Singh, Jyoti Prakash ;
Bhattacharya, Samar .
2012 THIRD INTERNATIONAL CONFERENCE ON EMERGING APPLICATIONS OF INFORMATION TECHNOLOGY (EAIT), 2012, :287-290
[43]   Enhanced Boolean-based multi secret image sharing scheme [J].
Yang, Ching-Nung ;
Chen, Cheng-Hua ;
Cai, Song-Ruei .
JOURNAL OF SYSTEMS AND SOFTWARE, 2016, 116 :22-34
[44]   Steganography based image sharing with reversibility [J].
Sirisha, B. Lakshmi ;
Kumar, S. Srinivas ;
Mohan, B. Chandra .
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2016, 19 (01) :67-80
[45]   Secret Image Sharing Based on Encrypted Pixels [J].
Zhou, Zhili ;
Yang, Ching-Nung ;
Cao, Yi ;
Sun, Xingming .
IEEE ACCESS, 2018, 6 :15021-15025
[46]   Invertible secret image sharing with steganography [J].
Lin, Pei-Yu ;
Chan, Chi-Shiang .
PATTERN RECOGNITION LETTERS, 2010, 31 (13) :1887-1893
[47]   Secret Image Sharing with Reversible Steganography [J].
Chang, Chin-Chen ;
Lin, Pei-Yu ;
Chan, Chi-Shiang .
PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND NATURAL COMPUTING, VOL II, 2009, :253-+
[48]   A Secret Sharing Scheme Based on AES [J].
Cui, Jie ;
Chen, Lei ;
Zhang, Yiming ;
Xie, Zhiqiang ;
Zhong, Hong .
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (06) :295-302
[49]   (k, n) secret image sharing scheme capable of cheating detection [J].
Liu, Yan-Xiao ;
Sun, Qin-Dong ;
Yang, Ching-Nung .
EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2018,
[50]   A novel approach for multilevel multi-secret image sharing scheme [J].
Bisht, Kanchan ;
Deshmukh, Maroti .
JOURNAL OF SUPERCOMPUTING, 2021, 77 (10) :12157-12191