Reversible secret-image sharing with high visual quality

被引:0
|
作者
Lin, Ching-Chiuan [1 ]
Liao, Lun Hao [2 ]
Hwang, Kuo Feng [1 ]
Chen, Shih-Chieh [1 ]
机构
[1] Overseas Chinese Univ, Dept Informat Management, Taichung 40721, Taiwan
[2] Chaoyang Univ Technol, Deptpartment Informat Management, Taichung 41349, Taiwan
关键词
Secret sharing; Friendly secret sharing; Secret image sharing; Shadow images; SCHEME; CRYPTOGRAPHY;
D O I
10.1007/s11042-012-1190-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes a reversible secret-image sharing scheme for sharing a secret image among 2n shadow images with high visual quality (i.e., they are visually indistinguishable from their original images, respectively). In the proposed scheme, not only can the secret image be completely revealed, but the original cover images can also be losslessly recovered. A difference value between neighboring pixels in a secret image is shared by 2n pixels in 2n shadow images, respectively, where n a parts per thousand yenaEuro parts per thousand 1. A pair of shadow images which are constructed from the same cover image are called brother stego-images. To decrease pixel values changed in shadow images, each pair of brother stego-images is assigned a weighted factor when calculating difference values to be shared. A pixel in a cover image is recovered by calculating the average of corresponding pixels in its brother stego-images. A single stego-image reveals nothing and a pair of pixels in brother stego-images reveals partial difference value between neighboring secret pixels. The more brother stego-images are collected, the more information in the secret image will be revealed. Finally, a secret image will be completely revealed if all of its brother stego-images are collected.
引用
收藏
页码:1729 / 1747
页数:19
相关论文
共 50 条
  • [31] AUTHENTICATION OF GRAYSCALE FORENSIC IMAGE USING VISUAL SECRET SHARING
    Joshi, Akshata M.
    Jadhav, Dhanashree M.
    Kazi, Nida A.
    Suryawanshi, Amol N.
    Katti, Jayashree
    2016 CONFERENCE ON EMERGING DEVICES AND SMART SYSTEMS (ICEDSS), 2016, : 56 - 60
  • [32] The Image Watermarking Technique Using Visual Secret Sharing Strategy
    Huang, Shu-Chien
    Wang, Chu-Fu
    ISDA 2008: EIGHTH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS, VOL 2, PROCEEDINGS, 2008, : 190 - 195
  • [33] Relations Between Secret Sharing and Secret Image Sharing
    Yan, Xuehu
    Li, Jinming
    Lu, Yuliang
    Liu, Lintao
    Yang, Guozheng
    Chen, Huixian
    SECURITY WITH INTELLIGENT COMPUTING AND BIG-DATA SERVICES, 2020, 895 : 79 - 93
  • [34] Secret image sharing
    Thien, CC
    Lin, JC
    COMPUTERS & GRAPHICS-UK, 2002, 26 (05): : 766 - 770
  • [35] On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme
    Wang, Daoshun
    Yi, Feng
    EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING, 2010,
  • [36] An Approach for Secret Sharing Using Randomised Visual Secret Sharing
    Dixit, Shubhra
    Jain, Deepak Kumar
    Saxena, Ankita
    2014 FOURTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT), 2014, : 847 - 850
  • [37] Quality-adaptive visual secret sharing by random grids
    Chen, Tzung-Her
    Lee, Yao-Sheng
    Huang, Wei-Lun
    Juan, Justie Su-Tzu
    Chen, Ying-Yu
    Li, Ming-Jheng
    JOURNAL OF SYSTEMS AND SOFTWARE, 2013, 86 (05) : 1267 - 1274
  • [38] On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme
    Daoshun Wang
    Feng Yi
    EURASIP Journal on Advances in Signal Processing, 2010
  • [39] Improving the visual quality of random grid-based visual secret sharing
    Wu, Xiaotian
    Sun, Wei
    SIGNAL PROCESSING, 2013, 93 (05) : 977 - 995
  • [40] A Hierarchical Authorization Reversible Data Hiding in Encrypted Image Based on Secret Sharing
    Jiang, Chao
    Zhang, Minqing
    Kong, Yongjun
    Jiang, Zongbao
    Di, Fuqiang
    MATHEMATICS, 2024, 12 (14)