Sharing and hiding secret images with size constraint

被引:100
作者
Wu, YS [1 ]
Thien, CC [1 ]
Lin, JC [1 ]
机构
[1] Natl Chiao Tung Univ, Dept Comp & Informat Sci, Hsinchu 300, Taiwan
关键词
sharing secret images; quantization; image hiding; shadow; size limitation;
D O I
10.1016/j.patcog.2004.01.002
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper presents a method for sharing and hiding secret images. The method is modified from the (t, n) threshold scheme. (Comput.Graph. 26(5)(2002)765) The given secret image is shared and n shadow images are thus generated. Each shadow image is hidden in an ordinary image so as not to attract an attacker's attention. Any t of the n hidden shadows can be used to recover the secret image. The size of each stego image (in which a shadow image is hidden) is about 1/t of that of the secret image, avoiding the need for much storage space and transmission time (in the sense that the total size of t stego images is about the size of the secret image). Experimental results indicate that the qualities of both the recovered secret image and the stego images that contain the hidden shadows are acceptable. The photographers who work in enemy areas can use this system to transmit photographs. (C) 2004 Pattern Recognition Society. Published by Elsevier Ltd. All rights reserved.
引用
收藏
页码:1377 / 1385
页数:9
相关论文
共 16 条
[1]  
Adelson E., 1990, U.S. Patent, Patent No. [4,939,515, 4939515]
[2]   Applications for data hiding [J].
Bender, W ;
Butera, W ;
Gruhl, D ;
Hwang, R ;
Paiz, FJ ;
Pogreb, S .
IBM SYSTEMS JOURNAL, 2000, 39 (3-4) :547-568
[3]   Techniques for data hiding [J].
Bender, W ;
Gruhl, D ;
Morimoto, N ;
Lu, A .
IBM SYSTEMS JOURNAL, 1996, 35 (3-4) :313-336
[4]   SCAN-based compression-encryption-hiding for video on demand [J].
Bourbakis, N ;
Dollas, A .
IEEE MULTIMEDIA, 2003, 10 (03) :79-87
[5]   Sharing secret images using shadow codebooks [J].
Chang, CC ;
Hwang, RJ .
INFORMATION SCIENCES, 1998, 111 (1-4) :335-345
[6]   New method of secret image sharing based upon vector quantization [J].
Chen, TS ;
Chang, CC .
JOURNAL OF ELECTRONIC IMAGING, 2001, 10 (04) :988-997
[7]  
Hou Y. C., 1998, P CVPRIP 98, V4, P211
[8]  
LIE WN, 1999, INT C IM PROC KOB JA, V4, P286
[9]   Visual cryptography for gray-level images by dithering techniques [J].
Lin, CC ;
Tsai, WH .
PATTERN RECOGNITION LETTERS, 2003, 24 (1-3) :349-358
[10]  
Naor M., 1994, Lecture Notes in Comput. Sci., P1, DOI 10.1007/BFb0053419