PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Powiadomienia systemowe
  • Sesja wygasła!
Tytuł artykułu

Secret Image Hiding and Sharing Based on the (t,n)-Threshold

Wybrane pełne teksty z tego czasopisma
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
This study proposes a new secret image sharing method based on the ( t, n)-threshold. The sharing method is completed through three main steps: (1) quantizing the secret image, (2) generating n shadows from the quantized image, and (3) sharing the n shadows among n cover images. Our goal is both to attain good stego-image and secret image quality preservation effects and to limit the size of each shadow image down to 1/ t of that of the secret image for convenient transmission and storage. In the first step, the secret image is divided into non-overlapping 4 × 4 blocks that are quantized according to the results of block testing. Each block, after the block testing procedure, is judged to be either a smooth block or a non-smooth one. Smooth blocks can be neatly restored after being hidden into the cover image, while non-smooth blocks can be somewhat lossy, but such modification is perceptually invisible. The second step is to apply Shamir's ( t,n)-threshold, which uses a ( t-1)-degree polynomial to generate n shadows so that the secret image can be restored from any t out of n shadows. The last step involves a modulo operation to hide the n shadows in n cover images. According to our experimental results, the PSNR values of the reconstructed secret images by our method center around 39 dB, outperforming other recent methods.
Wydawca
Rocznik
Strony
399--411
Opis fizyczny
bibliogr. 16 poz., fot., tab.
Twórcy
autor
autor
autor
  • Department of Information Engineering and Computer Science Feng Chia University 100 Wenhwa Rd., Seatwen, Taichung 40724, Taiwan, R.O.C., ccc@cs.ccu.edu.tw
Bibliografia
  • [1] C. C. Chang, T. S. Chen and L. Z. Chung: A Steganographic Method Based upon JPEG and Quantization Table Modification, Information Sciences, 141 (2002) 123-138.
  • [2] K. L. Chung, C. H. Shen and L. C. Chang: A Novel SVD- and VQ-based Image Hiding Scheme, Pattern Recognition Letters, 22 (9) (2001) 1051-1058.
  • [3] B. V. Dasarathy: Image Data Compression: Block Truncation Coding, IEEE Computer Society Press, Los Alamitos, CA, 1995.
  • [4] J. D. Foley, A. V. Dam, S. K. Feiner and J. F. Hughes: Computer Graphics, Principle, and Practice, 2nd Edition, Addison-Wesley, Reading, MA, 1990.
  • [5] J. Fridrich: A New Steganographic Method for Palette-Based Images, Proceedings of the IS&T PICS Conference, Savannah, Georgia, 1998, pp. 285-289.
  • [6] M. Iwata, K. Miyake and A. Shiozaki: Digital Steganography Utilizing Features of JPEG Images, IEICE Transactions on Fundamentals, E87-A (4) (2004) 929-936.
  • [7] H. Kobayashi, Y. Noguchi and H. Kiya: A Method of Embedding Binary Data into JPEG Bitstreams, IEICE Transactions on Fundamentals, J83-D2 (6) (2000) 1469-1476.
  • [8] C. C. Lin and W. H. Tsai: Visual Cryptography for Gray-Level Images by Dithering Techniques, Pattern Recognition Letters, 24 (2003) 349-358.
  • [9] C. C. Lin and W. H. Tsai: Secret Image Sharing with Steganography and Authentication, The Journal of Systems and Software, 73 (2004) 405-414.
  • [10] M. Naor and A. Shamir: Visual Cryptography, Proceedings of Advances in Cryptography-EUROCRYPT'94, Berlin, Springer-Verlag LNCS, 1995, pp. 1-12.
  • [11] A. Sharmir: How to Share a Secret, Communications of the ACM, 22 (1979) 612-613.
  • [12] C. C. Thien and J. C. Lin: Secret Image Sharing, Computers & Graphics, 26 (5) (2002) 765 - 770.
  • [13] P. Tsai, Y. C. Hu and C. C. Chang: An Image Hiding Technique Using Block Truncation Coding, Proceedings of Pacific Rim Workshop on Digital Steganography, Kitakyushu, Japan, 2002, pp. 54-64.
  • [14] Y. C. Tseng, Y. Y. Chen and H. K. Pan: A Secure Data Hiding Scheme for Binary Images, IEEE Transactions on Communications, 50 (8) (2002) 1227-1231.
  • [15] R. Z. Wang, C. F. Lin and J. C. Lin: Image Hiding by Optimal LSB Substitution and Genetic Algorithm, Pattern Recognition, 34 (3) (2001) 671-683.
  • [16] Y.-S.Wu, C.-C. Thien and J.-C. Lin: Sharing and Hiding Secret Images with Size Constraint, Pattern Recognition, 37 (7) (2004) 1377-1385.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-article-BUS5-0009-0053
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.