Progressive sharing for a secret image

被引:20
|
作者
Huang, Chin-Pan [1 ]
Hsieh, Chaur-Heh [1 ]
Huang, Ping Sheng [2 ]
机构
[1] Ming Chuan Univ, Dept Comp & Commun Engn, Tao Yuan 333, Taiwan
[2] Ming Chuan Univ, Dept Elect Engn, Tao Yuan 333, Taiwan
关键词
Image sharing; Secret sharing; Shadow image; SPIHT; WAVELET TRANSFORMS; COMPRESSION;
D O I
10.1016/j.jss.2009.10.012
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Based on the wavelet transform, a new progressive sharing scheme is proposed to share a secret image into several shadow images using SPIHT encoding processes and Shamir's threshold scheme. Quality refinement of the recovered image is achieved by the data consumed from the threshold number (r) of shadow images and each single shadow image reveals no information about the secret image. The size of each shadow image is smaller than 1/r of the secret image and any number of shadow images that is less than r reveals no information about the secret image. The proposed approach is secure for image sharing and provides excellent peak signal-to-noise ratio (PSNR) versus rate performance. Experimental results have demonstrated the promising performance of this method in progressive sharing. (C) 2009 Elsevier Inc. All rights reserved.
引用
收藏
页码:517 / 527
页数:11
相关论文
共 50 条
  • [41] Progressive (k, n) secret image sharing schemes based on Boolean operations and covering codes
    Liu, Yan-xiao
    Yang, Ching-Nung
    Wu, Song-yu
    Chou, Yung-shun
    SIGNAL PROCESSING-IMAGE COMMUNICATION, 2018, 66 : 77 - 86
  • [42] AN IMPROVED SCHEME FOR SECRET IMAGE SHARING
    Alharthi, Saeed
    Atrey, Pradeep K.
    2010 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO (ICME 2010), 2010, : 1661 - 1666
  • [43] Weighted Threshold Secret Image Sharing
    Shyu, Shyong Jian
    Chuang, Chun-Chieh
    Chen, Ying-Ru
    Lai, Ah-Fur
    ADVANCES IN IMAGE AND VIDEO TECHNOLOGY, PROCEEDINGS, 2009, 5414 : 988 - +
  • [44] Secret Image Sharing with Reversible Steganography
    Chang, Chin-Chen
    Lin, Pei-Yu
    Chan, Chi-Shiang
    PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND NATURAL COMPUTING, VOL II, 2009, : 253 - +
  • [45] Applying Secret Image Sharing to Economics
    Zhao, Xuemei
    Zhang, Tongtong
    Liu, Jun
    Lu, Canju
    Lu, Huan
    Yan, Xuehu
    INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2021, 13 (04) : 16 - 25
  • [46] Computationally Secure Secret Image Sharing
    Ahmadian, Amir M.
    Amirmazlaghani, Maryam
    2017 25TH IRANIAN CONFERENCE ON ELECTRICAL ENGINEERING (ICEE), 2017, : 2217 - 2222
  • [47] Secret Image Sharing with Threshold Set
    Tang, Dan
    Liu, Kui
    DIGITAL MANUFACTURING & AUTOMATION III, PTS 1 AND 2, 2012, 190-191 : 364 - +
  • [48] Security Analysis of Secret Image Sharing
    Yan, Xuehu
    Lu, Yuliang
    Liu, Lintao
    Wan, Song
    Ding, Wanmeng
    Liu, Hanlin
    DATA SCIENCE, PT 1, 2017, 727 : 305 - 316
  • [49] Secret image sharing with steganography and authentication
    Lin, CC
    Tsai, WH
    JOURNAL OF SYSTEMS AND SOFTWARE, 2004, 73 (03) : 405 - 414
  • [50] A Lossless Secret Image Sharing Method
    Tso, Hao-Kuan
    Lou, Der-Chyuan
    Wang, Kai-Ping
    Liu, Chiang-Lung
    ISDA 2008: EIGHTH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS, VOL 3, PROCEEDINGS, 2008, : 616 - +