Weighted modulated secret image sharing method

被引:15
作者
Chen, Chien-Chang [1 ]
Chen, Chaur-Chin [2 ]
Lin, Yun-Cheng [1 ]
机构
[1] Hsuan Chuang Univ, Dept Informat Management, Hsinchu 300, Taiwan
[2] Natl Tsing Hua Univ, Dept Comp Sci, Hsinchu 300, Taiwan
关键词
VISUAL CRYPTOGRAPHY;
D O I
10.1117/1.3268362
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
We present a novel hybrid method that includes a modulated scheme for reducing the distortion of the reconstructed image and a two-layered structure for grouping participants with different weights in a secret image sharing problem. Conventional secret image sharing methods suffer from truncation distortion, which is the difference between a pixel value and its truncated result. We first present a histogram modulation scheme to modulate the truncated pixels to prevent the truncation distortion. A two-layer secret image sharing scheme groups the participants in the first layer and weights them differently in the second layer. The proposed modulated secret image sharing method merges these two schemes. Experimental results reveal that the proposed method efficiently reduces the truncation distortion and groups the participants with different possessing weights. (C) 2009 SPIE and IS&T. [DOI: 10.1117/1.3268362]
引用
收藏
页数:6
相关论文
共 22 条
[11]   Multilevel reversible data hiding based on histogram modification of difference images [J].
Lin, Chia-Chen ;
Tai, Wei-Liang ;
Chang, Chim-Chen .
PATTERN RECOGNITION, 2008, 41 (12) :3582-3591
[12]   VCPSS: A two-in-one two-decoding-options image sharing method combining visual cryptography (VC) and polynomial-style sharing (PSS) approaches [J].
Lin, Sian-Jheng ;
Lin, Ja-Chen .
PATTERN RECOGNITION, 2007, 40 (12) :3652-3666
[13]  
Nakajima M, 2002, WSCG'2002, VOLS I AND II, CONFERENCE PROCEEDINGS, P303
[14]  
Naor M., 1995, LECT NOTES COMPUTER, V950, P1, DOI [10.1007/BFb0053419, DOI 10.1007/BFB0053419]
[15]   Reversible data hiding [J].
Ni, ZC ;
Shi, YQ ;
Ansari, N ;
Su, W .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2006, 16 (03) :354-362
[16]   HOW TO SHARE A SECRET [J].
SHAMIR, A .
COMMUNICATIONS OF THE ACM, 1979, 22 (11) :612-613
[17]   An image-sharing method with user-friendly shadow images [J].
Thien, CC ;
Lin, JC .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2003, 13 (12) :1161-1169
[18]   Reversible image hiding scheme using predictive coding and histogram shifting [J].
Tsai, Piyu ;
Hu, Yu-Chen ;
Yeh, Hsiu-Lien .
SIGNAL PROCESSING, 2009, 89 (06) :1129-1143
[19]   Sharing secret images using Blakley's concept [J].
Tso, Hao-Kuan .
OPTICAL ENGINEERING, 2008, 47 (07)
[20]   Secret image sharing with smaller shadow images [J].
Wang, RZ ;
Su, CH .
PATTERN RECOGNITION LETTERS, 2006, 27 (06) :551-555