Meaningful Secret Image Sharing Scheme with High Visual Quality Based on Natural Steganography

被引:6
|
作者
Sun, Yuyuan [1 ,2 ]
Lu, Yuliang [1 ,2 ]
Chen, Jinrui [1 ,2 ]
Zhang, Weiming [3 ]
Yan, Xuehu [1 ,2 ]
机构
[1] Natl Univ Def Technol, Hefei 230037, Peoples R China
[2] Anhui Key Lab Cyberspace Secur Situat Awareness &, Hefei 230037, Peoples R China
[3] Univ Sci & Technol China, Sch Informat Sci & Technol, Hefei 230026, Peoples R China
基金
中国国家自然科学基金;
关键词
meaningful secret image sharing; Chinese Reminder Theorem; Natural Steganography; small-sized shadow images; steganalysis;
D O I
10.3390/math8091452
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
The(k,n)-threshold Secret Image Sharing scheme (SISS) is a solution to image protection. However, the shadow images generated by traditional SISS are noise-like, easily arousing deep suspicions, so that it is significant to generate meaningful shadow images. One solution is to embed the shadow images into meaningful natural images and visual quality should be considered first. Limited by embedding rate, the existing schemes have made concessions in size and visual quality of shadow images, and few of them take the ability of anti-steganalysis into consideration. In this paper, a meaningful SISS that is based on Natural Steganography (MSISS-NS) is proposed. The secret image is firstly divided intonsmall-sized shadow images with Chinese Reminder Theorem, which are then embedded into RAW images to simulate the images with higherISOparameters with NS. In MSISS-NS, the visual quality of shadow images is improved significantly. Additionally, as the payload of cover images with NS is larger than the size of small-sized shadow images, the scheme performs well not only in visual camouflage, but also in other aspects, like lossless recovery, no pixel expansion, and resisting steganalysis.
引用
收藏
页数:17
相关论文
共 50 条
  • [21] Invertible secret image sharing with steganography
    Lin, Pei-Yu
    Chan, Chi-Shiang
    PATTERN RECOGNITION LETTERS, 2010, 31 (13) : 1887 - 1893
  • [22] On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme
    Wang, Daoshun
    Yi, Feng
    EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING, 2010,
  • [23] On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme
    Daoshun Wang
    Feng Yi
    EURASIP Journal on Advances in Signal Processing, 2010
  • [24] A Verifiable Steganography-Based Secret Image Sharing Scheme in 5G Networks
    Qin, Shiyue
    Tan, Zhenhua
    Zhou, Fucai
    Xu, Jian
    Zhang, Zongye
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [25] A user-friendly secret image sharing scheme with reversible steganography based on cellular automata
    Wu, Xiaotian
    Ou, Duanhao
    Liang, Qiming
    Sun, Wei
    JOURNAL OF SYSTEMS AND SOFTWARE, 2012, 85 (08) : 1852 - 1863
  • [26] Two-in-One Secret Image Sharing Scheme with Higher Visual Quality of the Previewed Image
    Wang, Xin
    Li, Peng
    Ren, Zihan
    MATHEMATICS, 2022, 10 (05)
  • [27] Visual Secret Sharing with Meaningful Shares
    Shyu, Shyong Jian
    2014 SCIENCE AND INFORMATION CONFERENCE (SAI), 2014, : 576 - 580
  • [28] A Compact Secret Image Sharing Scheme Based on Flexible Secret Matrix Sharing Scheme
    Wang, Lingfu
    Wang, Jing
    Zhang, Mingwu
    Huang, Weijia
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2021, PT III, 2022, 13157 : 411 - 431
  • [29] A secret sharing scheme for EBTC using steganography
    Cheonshik Kim
    Dongkyoo Shin
    Dongil Shin
    Raylin Tso
    Chin-Nung Yang
    Journal of Intelligent Manufacturing, 2014, 25 : 241 - 249
  • [30] A secret sharing scheme for EBTC using steganography
    Kim, Cheonshik
    Shin, Dongkyoo
    Shin, Dongil
    Tso, Raylin
    Yang, Chin-Nung
    JOURNAL OF INTELLIGENT MANUFACTURING, 2014, 25 (02) : 241 - 249