Reversible secret-image sharing with high visual quality

被引:0
|
作者
Lin, Ching-Chiuan [1 ]
Liao, Lun Hao [2 ]
Hwang, Kuo Feng [1 ]
Chen, Shih-Chieh [1 ]
机构
[1] Overseas Chinese Univ, Dept Informat Management, Taichung 40721, Taiwan
[2] Chaoyang Univ Technol, Deptpartment Informat Management, Taichung 41349, Taiwan
关键词
Secret sharing; Friendly secret sharing; Secret image sharing; Shadow images; SCHEME; CRYPTOGRAPHY;
D O I
10.1007/s11042-012-1190-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes a reversible secret-image sharing scheme for sharing a secret image among 2n shadow images with high visual quality (i.e., they are visually indistinguishable from their original images, respectively). In the proposed scheme, not only can the secret image be completely revealed, but the original cover images can also be losslessly recovered. A difference value between neighboring pixels in a secret image is shared by 2n pixels in 2n shadow images, respectively, where n a parts per thousand yenaEuro parts per thousand 1. A pair of shadow images which are constructed from the same cover image are called brother stego-images. To decrease pixel values changed in shadow images, each pair of brother stego-images is assigned a weighted factor when calculating difference values to be shared. A pixel in a cover image is recovered by calculating the average of corresponding pixels in its brother stego-images. A single stego-image reveals nothing and a pair of pixels in brother stego-images reveals partial difference value between neighboring secret pixels. The more brother stego-images are collected, the more information in the secret image will be revealed. Finally, a secret image will be completely revealed if all of its brother stego-images are collected.
引用
收藏
页码:1729 / 1747
页数:19
相关论文
共 50 条
  • [31] A user-friendly secret image sharing scheme with reversible steganography based on cellular automata
    Wu, Xiaotian
    Ou, Duanhao
    Liang, Qiming
    Sun, Wei
    JOURNAL OF SYSTEMS AND SOFTWARE, 2012, 85 (08) : 1852 - 1863
  • [32] Quality improved (k, n) priority based progressive visual secret sharing
    Sridhar, Srividhya
    Sudha, Gnanou Florence
    MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (17-18) : 11459 - 11486
  • [33] Secret image sharing in the encrypted domain
    Wang, Rui
    Yang, Guozheng
    Yan, Xuehu
    Luo, Shengyang
    Han, Qiang
    JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2024, 98
  • [34] Invertible secret image sharing with steganography
    Lin, Pei-Yu
    Chan, Chi-Shiang
    PATTERN RECOGNITION LETTERS, 2010, 31 (13) : 1887 - 1893
  • [35] A hierarchical threshold secret image sharing
    Guo, Cheng
    Chang, Chin-Chen
    Qin, Chuan
    PATTERN RECOGNITION LETTERS, 2012, 33 (01) : 83 - 91
  • [36] Visual multiple secret sharing based upon turning and flipping
    Shyu, Shyong Jian
    Chen, Kun
    INFORMATION SCIENCES, 2011, 181 (15) : 3246 - 3266
  • [37] Affine Boolean classification in secret image sharing for progressive quality access control
    Bhattacharjee, Tapasi
    Rout, Ranjeet Kumar
    Maity, Santi P.
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2017, 33 : 16 - 29
  • [38] On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme
    Wang, Daoshun
    Yi, Feng
    EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING, 2010,
  • [39] Quality-adaptive visual secret sharing by random grids
    Chen, Tzung-Her
    Lee, Yao-Sheng
    Huang, Wei-Lun
    Juan, Justie Su-Tzu
    Chen, Ying-Yu
    Li, Ming-Jheng
    JOURNAL OF SYSTEMS AND SOFTWARE, 2013, 86 (05) : 1267 - 1274
  • [40] A Hierarchical Authorization Reversible Data Hiding in Encrypted Image Based on Secret Sharing
    Jiang, Chao
    Zhang, Minqing
    Kong, Yongjun
    Jiang, Zongbao
    Di, Fuqiang
    MATHEMATICS, 2024, 12 (14)