Czasopismo
2007
|
Vol. 76, nr 4
|
399-411
Tytuł artykułu
Autorzy
Wybrane pełne teksty z tego czasopisma
Warianty tytułu
Języki publikacji
Abstrakty
This study proposes a new secret image sharing method based on the ( t, n)-threshold. The sharing method is completed through three main steps: (1) quantizing the secret image, (2) generating n shadows from the quantized image, and (3) sharing the n shadows among n cover images. Our goal is both to attain good stego-image and secret image quality preservation effects and to limit the size of each shadow image down to 1/ t of that of the secret image for convenient transmission and storage. In the first step, the secret image is divided into non-overlapping 4 × 4 blocks that are quantized according to the results of block testing. Each block, after the block testing procedure, is judged to be either a smooth block or a non-smooth one. Smooth blocks can be neatly restored after being hidden into the cover image, while non-smooth blocks can be somewhat lossy, but such modification is perceptually invisible. The second step is to apply Shamir's ( t,n)-threshold, which uses a ( t-1)-degree polynomial to generate n shadows so that the secret image can be restored from any t out of n shadows. The last step involves a modulo operation to hide the n shadows in n cover images. According to our experimental results, the PSNR values of the reconstructed secret images by our method center around 39 dB, outperforming other recent methods.
Czasopismo
Rocznik
Tom
Strony
399-411
Opis fizyczny
bibliogr. 16 poz., fot., tab.
Twórcy
autor
autor
autor
- Department of Information Engineering and Computer Science Feng Chia University 100 Wenhwa Rd., Seatwen, Taichung 40724, Taiwan, R.O.C., ccc@cs.ccu.edu.tw
Bibliografia
- [1] C. C. Chang, T. S. Chen and L. Z. Chung: A Steganographic Method Based upon JPEG and Quantization Table Modification, Information Sciences, 141 (2002) 123-138.
- [2] K. L. Chung, C. H. Shen and L. C. Chang: A Novel SVD- and VQ-based Image Hiding Scheme, Pattern Recognition Letters, 22 (9) (2001) 1051-1058.
- [3] B. V. Dasarathy: Image Data Compression: Block Truncation Coding, IEEE Computer Society Press, Los Alamitos, CA, 1995.
- [4] J. D. Foley, A. V. Dam, S. K. Feiner and J. F. Hughes: Computer Graphics, Principle, and Practice, 2nd Edition, Addison-Wesley, Reading, MA, 1990.
- [5] J. Fridrich: A New Steganographic Method for Palette-Based Images, Proceedings of the IS&T PICS Conference, Savannah, Georgia, 1998, pp. 285-289.
- [6] M. Iwata, K. Miyake and A. Shiozaki: Digital Steganography Utilizing Features of JPEG Images, IEICE Transactions on Fundamentals, E87-A (4) (2004) 929-936.
- [7] H. Kobayashi, Y. Noguchi and H. Kiya: A Method of Embedding Binary Data into JPEG Bitstreams, IEICE Transactions on Fundamentals, J83-D2 (6) (2000) 1469-1476.
- [8] C. C. Lin and W. H. Tsai: Visual Cryptography for Gray-Level Images by Dithering Techniques, Pattern Recognition Letters, 24 (2003) 349-358.
- [9] C. C. Lin and W. H. Tsai: Secret Image Sharing with Steganography and Authentication, The Journal of Systems and Software, 73 (2004) 405-414.
- [10] M. Naor and A. Shamir: Visual Cryptography, Proceedings of Advances in Cryptography-EUROCRYPT'94, Berlin, Springer-Verlag LNCS, 1995, pp. 1-12.
- [11] A. Sharmir: How to Share a Secret, Communications of the ACM, 22 (1979) 612-613.
- [12] C. C. Thien and J. C. Lin: Secret Image Sharing, Computers & Graphics, 26 (5) (2002) 765 - 770.
- [13] P. Tsai, Y. C. Hu and C. C. Chang: An Image Hiding Technique Using Block Truncation Coding, Proceedings of Pacific Rim Workshop on Digital Steganography, Kitakyushu, Japan, 2002, pp. 54-64.
- [14] Y. C. Tseng, Y. Y. Chen and H. K. Pan: A Secure Data Hiding Scheme for Binary Images, IEEE Transactions on Communications, 50 (8) (2002) 1227-1231.
- [15] R. Z. Wang, C. F. Lin and J. C. Lin: Image Hiding by Optimal LSB Substitution and Genetic Algorithm, Pattern Recognition, 34 (3) (2001) 671-683.
- [16] Y.-S.Wu, C.-C. Thien and J.-C. Lin: Sharing and Hiding Secret Images with Size Constraint, Pattern Recognition, 37 (7) (2004) 1377-1385.
Typ dokumentu
Bibliografia
Identyfikatory
Identyfikator YADDA
bwmeta1.element.baztech-article-BUS5-0009-0053