Secret image sharing with smaller shadow images

被引:164
作者
Wang, RZ [1 ]
Su, CH [1 ]
机构
[1] Ming Chuan Univ, Dept Comp & Commun Engn, Kwei Shan 333, Tau Yuan, Taiwan
关键词
secret sharing; image sharing; shadow image; data hiding;
D O I
10.1016/j.patrec.2005.09.021
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Secret image sharing is a technique for protecting images that involves the dispersion of the secret image into many shadow images. This endows the method with a higher tolerance against data corruption or loss than other image-protection mechanisms, such as encryption or steganography. In the method proposed in this Study, the difference image of the secret image is encoded using Huffman coding scheme, and the arithmetic calculations of the sharing functions are evaluated in a power-of-two Galois Field GF(2'). Experiment results show that each generated shadow image in the proposed method is about 40%, smaller than that of the method in [Thien, C.C., Lin, J.C., 2002. Secret image sharing. Comput. Graphics 26 (1) 765-770], which improves its efficiency in storage, transmission, and data hiding. (c) 2005 Elsevier B.V. All rights reserved.
引用
收藏
页码:551 / 555
页数:5
相关论文
共 14 条
[1]  
[Anonymous], 1988, DATA COMPRESSION MET
[2]  
BENALOH J, 1989, ADV CRYPTOLOGY CRYPT, P27
[3]  
Blakley G.R., 1979, P 1979 AFIPS NAT COM, V48, P313, DOI [10.1109/MARK.1979.8817296, DOI 10.1109/MARK.1979.8817296]
[4]   Lower bounds for robust secret sharing schemes [J].
Blundo, C ;
DeSantis, A .
INFORMATION PROCESSING LETTERS, 1997, 63 (06) :317-321
[5]   SCAN-based compression-encryption-hiding for video on demand [J].
Bourbakis, N ;
Dollas, A .
IEEE MULTIMEDIA, 2003, 10 (03) :79-87
[6]   Partial encryption of compressed images and videos [J].
Cheng, H ;
Li, XB .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2000, 48 (08) :2439-2451
[7]   ON SECRET SHARING SYSTEMS [J].
KARNIN, ED ;
GREENE, JW ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (01) :35-41
[8]   Spread spectrum image steganography [J].
Marvel, LM ;
Boncelet, CG ;
Retter, CT .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 1999, 8 (08) :1075-1083
[9]  
Naor M., 1994, Lecture Notes in Comput. Sci., P1, DOI 10.1007/BFb0053419
[10]   Information hiding - A survey [J].
Petitcolas, FAP ;
Anderson, RJ ;
Kuhn, MG .
PROCEEDINGS OF THE IEEE, 1999, 87 (07) :1062-1078