Progressive secret image sharing scheme using meaningful shadows

被引:12
作者
Wang, Zhi-Hui [1 ]
Di, Ya-Feng [1 ]
Li, Jianjun [2 ]
Chang, Chin-Chen [3 ]
Liu, Hui [1 ]
机构
[1] Dalian Univ Technol, Sch Software, Dalian, Peoples R China
[2] Hangzhou Dianzi Univ, Sch Comp Sci & Technol, Hangzhou, Zhejiang, Peoples R China
[3] Feng Chia Univ, Dept Informat Engn & Comp Sci, Taichung, Taiwan
关键词
secret image sharing; progressive secret image sharing; Sudoku; magic matrix; STEGANOGRAPHY;
D O I
10.1002/sec.1589
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes a novel secret image sharing scheme, which progressively hides a secret image into multiple different meaningful cover (or host) images by utilizing a magic matrix. The produced shadows are high visual quality, meaningful images that differ from each other. As a result, they are not easy to cause the suspicion by the attackers. Moreover, the secret image in the proposed scheme can be recovered progressively via different numbers of shadows. The more shadows used, the better the quality of the secret image. The experimental results demonstrate the aforementioned advantages of the proposed scheme. Copyright (C) 2016 John Wiley & Sons, Ltd.
引用
收藏
页码:4075 / 4088
页数:14
相关论文
共 23 条
[1]   Sudoku science [J].
Aaronson, L .
IEEE SPECTRUM, 2006, 43 (02) :16-17
[2]  
Blakley G. R., 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK), P313, DOI 10.1109/MARK.1979.8817296
[3]   Efficient cheater identification method for threshold schemes [J].
Chang, CC ;
Hwang, RJ .
IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1997, 144 (01) :23-27
[4]   Sharing secrets in stego images with authentication [J].
Chang, Chin-Chen ;
Hsieh, Yi-Pei ;
Lin, Chia-Hsuan .
PATTERN RECOGNITION, 2008, 41 (10) :3130-3137
[5]   A Data Embedding Scheme Based on a Magic Matrix and Wet Paper Codes [J].
Chang, Chin-Chen ;
Chen, Yi-Hui ;
Wang, Zhi-Hui ;
Li, Ming-Chu .
PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND NATURAL COMPUTING, VOL II, 2009, :303-+
[6]  
Chang Chin-Chen., 2008, 2008 3rd international conference on innovative computing information and control, P17
[7]   Fault-tolerant and progressive transmission of images [J].
Chen, SK ;
Lin, JC .
PATTERN RECOGNITION, 2005, 38 (12) :2466-2471
[8]   Distributive weighted threshold secret sharing schemes [J].
Dragan, Constantin Catalin ;
Tiplea, Ferucio Laurentiu .
INFORMATION SCIENCES, 2016, 339 :85-97
[9]  
Felgenhauer F., 2006, Mathematical Spectrum, V39, P15
[10]   A privilege-based visual secret sharing model [J].
Hou, Young-Chang ;
Quan, Zen-Yu ;
Tsai, Chih-Fong .
JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2015, 33 :358-367