A hybrid approach combining data hiding with visual cryptography for secure extraction of data hiding

被引:1
作者
Wu, Xiaotian [1 ]
Yang, Ching-Nung [2 ]
Cai, Hong-Wu [2 ]
Liu, Yanxiao [3 ]
机构
[1] Jinan Univ, Dept Comp Sci, Guangdong Key Lab Data Secur & Privacy Preserving, Guangzhou, Peoples R China
[2] Natl Dong Hwa Univ, Dept Comp Sci & Informat Engn, Hualien, Taiwan
[3] Sichuan Digital Econ Ind Dev Res Inst, Chengdu, Peoples R China
基金
中国国家自然科学基金;
关键词
Secret sharing; Visual cryptography; Data hiding; Secret image sharing; Hybrid method; Pixel expansion; SECRET SHARING SCHEMES; CONTRAST;
D O I
10.1016/j.jisa.2023.103520
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Visual cryptography scheme (VCS) naturally provides a solution for protecting a secret image in a group environment. However, most of the existing VCSs proposed so far only protect one secret image. In this work, we design a hybrid scheme combining VCS and data hiding to simultaneously safeguard the secret image and some related information (e.g., the description of the secret image). First of all, a framework for the hybrid scheme is introduced. Algorithms for building the proposed framework are given. Generally, a secret image is partitioned into k shadows in which the additional messages are embedded. By stacking k shadows, the secret image is visually revealed, and meanwhile, the embedded messages can be securely extracted from the stacked result. Moreover, the performance of the proposed technique would suffer as a result when the threshold k becomes larger. At this time, we have larger pixel expansion, smaller contrast, and reduced data hiding efficiency. To make the scheme more practical, an improved approach is presented for reducing the pixel expansion, increasing the visual quality of recovered image, and enhancing the data hiding efficiency. Comprehensive theoretical analysis and experiments are demonstrated to clarify the effectiveness and advantages of the proposed methods.
引用
收藏
页数:14
相关论文
共 48 条
  • [1] Visual cryptography for general access structures
    Ateniese, G
    Blundo, C
    DeSantis, A
    Stinson, DR
    [J]. INFORMATION AND COMPUTATION, 1996, 129 (02) : 86 - 106
  • [2] On the contrast in visual cryptography schemes
    Blundo, C
    De Santis, A
    Stinson, DR
    [J]. JOURNAL OF CRYPTOLOGY, 1999, 12 (04) : 261 - 289
  • [3] Visual cryptography schemes with perfect reconstruction of black pixels
    Blundo, C
    De Santis, A
    [J]. COMPUTERS & GRAPHICS, 1998, 22 (04) : 449 - 455
  • [4] Contrast optimal threshold visual cryptography schemes
    Blundo, C
    D'Arco, P
    De Santis, A
    Stinson, DR
    [J]. SIAM JOURNAL ON DISCRETE MATHEMATICS, 2003, 16 (02) : 224 - 261
  • [5] High capacity data hiding scheme based on (7,4) Hamming code
    Cao, Zekun
    Yin, Zhaoxia
    Hu, Honghe
    Gao, Xiangping
    Wang, Liangmin
    [J]. SPRINGERPLUS, 2016, 5 : 1 - 13
  • [6] Visual secret sharing by random grids revisited
    Chen, Tzung-Her
    Tsao, Kai-Hsiang
    [J]. PATTERN RECOGNITION, 2009, 42 (09) : 2203 - 2217
  • [7] Chih-Ching Thien, 2002, Computers & Graphics, V26, P765, DOI 10.1016/S0097-8493(02)00131-0
  • [8] Ideal contrast visual cryptography schemes with reversing
    Cimato, S
    De Santis, A
    Ferrara, AL
    Masucci, B
    [J]. INFORMATION PROCESSING LETTERS, 2005, 93 (04) : 199 - 206
  • [9] Threshold visual cryptography schemes with specified whiteness levels of reconstructed pixels
    Eisen, PA
    Stinson, DR
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2002, 25 (01) : 15 - 61
  • [10] Secret sharing with secure secret reconstruction
    Harn, Lein
    Xia, Zhe
    Hsu, Chingfang
    Liu, Yining
    [J]. INFORMATION SCIENCES, 2020, 519 : 1 - 8