Progressive sharing for a secret image

被引:20
作者
Huang, Chin-Pan [1 ]
Hsieh, Chaur-Heh [1 ]
Huang, Ping Sheng [2 ]
机构
[1] Ming Chuan Univ, Dept Comp & Commun Engn, Tao Yuan 333, Taiwan
[2] Ming Chuan Univ, Dept Elect Engn, Tao Yuan 333, Taiwan
关键词
Image sharing; Secret sharing; Shadow image; SPIHT; WAVELET TRANSFORMS; COMPRESSION;
D O I
10.1016/j.jss.2009.10.012
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Based on the wavelet transform, a new progressive sharing scheme is proposed to share a secret image into several shadow images using SPIHT encoding processes and Shamir's threshold scheme. Quality refinement of the recovered image is achieved by the data consumed from the threshold number (r) of shadow images and each single shadow image reveals no information about the secret image. The size of each shadow image is smaller than 1/r of the secret image and any number of shadow images that is less than r reveals no information about the secret image. The proposed approach is secure for image sharing and provides excellent peak signal-to-noise ratio (PSNR) versus rate performance. Experimental results have demonstrated the promising performance of this method in progressive sharing. (C) 2009 Elsevier Inc. All rights reserved.
引用
收藏
页码:517 / 527
页数:11
相关论文
共 20 条
[1]   Symmetric-extension-compatible reversible integer-to-integer wavelet transforms [J].
Adams, MD ;
Ward, RK .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2003, 51 (10) :2624-2636
[2]   Reversible integer-to-integer wavelet transforms for image compression: Performance evaluation and analysis [J].
Adams, MD ;
Kossentini, F .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2000, 9 (06) :1010-1024
[3]  
[Anonymous], 1983, Error control coding
[4]   Image coding using wavelet transform [J].
Antonini, Marc ;
Barlaud, Michel ;
Mathieu, Pierre ;
Daubechies, Ingrid .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 1992, 1 (02) :205-220
[5]  
Blakley G.R., 1979, INT WORKSH MAN REQ K, DOI [10.1109/MARK.1979.8817296, DOI 10.1109/MARK.1979.8817296]
[6]   SCAN-based compression-encryption-hiding for video on demand [J].
Bourbakis, N ;
Dollas, A .
IEEE MULTIMEDIA, 2003, 10 (03) :79-87
[7]   Wavelet transforms that map integers to integers [J].
Calderbank, AR ;
Daubechies, I ;
Sweldens, W ;
Yeo, BL .
APPLIED AND COMPUTATIONAL HARMONIC ANALYSIS, 1998, 5 (03) :332-369
[8]   Fault-tolerant and progressive transmission of images [J].
Chen, SK ;
Lin, JC .
PATTERN RECOGNITION, 2005, 38 (12) :2466-2471
[9]   Secure spread spectrum watermarking for multimedia [J].
Cox, IJ ;
Kilian, J ;
Leighton, FT ;
Shamoon, T .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 1997, 6 (12) :1673-1687
[10]   SPIHT image compression on FPGAs [J].
Fry, TW ;
Hauck, SA .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2005, 15 (09) :1138-1147