A color image hiding scheme based on the predetermined ordering of color images

被引:0
作者
Chang, Chin-Chen [1 ]
Chanb, Chi-Shiang [1 ]
Hsiao, Ju-Yuan [1 ]
机构
[1] Natl Chung Cheng Univ, Dept Comp Sci & Informat Engn, Chiayi 621, Taiwan
来源
PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON INFORMATION AND MANAGEMENT SCIENCES | 2002年 / 1卷
关键词
color image; human visual system; image hiding;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, we shall propose a method to share a secret color image among a certain number of persons. Our method uses Chang, Tsai and Chen's method to achieve the color image sharing. Chang et al. introduced how to break a secret color image in two and put the two shares into two other color images by using the Color Index Table. Our method uses two parts, the back-end-part and the front-end-part, for secret image sharing and secret image recovering. The purpose of back-end-part is to form a meaningless intermediate image from camouflaged color images which were owned by persons numbered from I through n-1. When sharing a secret image, we first use the procedure of back-end-part to form a meaningless intermediate image and use front-end-part, which is Chang et al.'s secret color image sharing method, to hide the secret color image into the intermediate image and the nth camouflaged color image. When recovering the secret image, we again to run the procedure of back-end-part to form a meaningless intermediate image and use front-end-part, which is Chang et al.'s secret color image recovering method, to recover the secret image. Wrong sequence or loss of any one image will make it impossible to recover the secret image.
引用
收藏
页码:169 / 174
页数:6
相关论文
共 7 条
[1]   A new scheme for sharing secret color images in computer network [J].
Chang, CC ;
Tsai, CS ;
Chen, TS .
SEVENTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS, PROCEEDINGS, 2000, :21-27
[2]  
CHANG CC, 1998, COMPUTER PROCESSING, V12, P237
[3]   Dynamical cryptography based on synchronised chaotic systems [J].
Chu, YH ;
Chang, S .
ELECTRONICS LETTERS, 1999, 35 (12) :974-975
[4]  
Chun W. D., 1998, IEEE T CONSUM ELECTR, V44, P1406
[5]   Data encryption: A Nonmathematical approach [J].
Highland, HJ .
COMPUTERS & SECURITY, 1997, 16 (05) :369-386
[6]  
Naor M., 1994, Lecture Notes in Comput. Sci., P1, DOI 10.1007/BFb0053419
[7]   Multimedia data-embedding and watermarking technologies [J].
Swanson, MD ;
Kobayashi, M ;
Tewfik, AH .
PROCEEDINGS OF THE IEEE, 1998, 86 (06) :1064-1087