Nothing Special   »   [go: up one dir, main page]

Skip to main content
Log in

A reversible and authenticable secret sharing scheme using dual images

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Reversible data hiding (RDH) is a steganographic method that can restore the cover medium after extracting the embedded secret data. This work proposes a novel RDH scheme based on turtle shell (TS) reference matrix with dual image shadows. By modifying a cover pixel pair, two stego pixel pairs are generated and separately recorded to two image shadows. The first stego pixel pair is embedded with three bits of secret data, while the second stego pixel pair is embedded with one secret bit and require no information for recovery of the cover pixels. Since secret data is embedded through slight modification of cover pixel values, experimental results show that the image shadows have good visual quality and are robust under steganalysis attack. In addition, an authentication mechanism is proposed to detect tampered shadows.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. Alattar AM (2004) Reversible watermark using the difference expansion of a generalized integer transform. IEEE Trans Image Process 13(8):1147–1156

    Article  MathSciNet  Google Scholar 

  2. Chang C-C, Kieu TD, Chou Y-C(2007) Reversible data hiding scheme using two steganographic images. In:: Proceedings of IEEE Region 10 International Conference (TENCON), p 1-4

  3. Chang C-C, Chou Y-C, Kieu TD (2008) An information hiding scheme using Sudoku. In: Proceedings of Third International Conference on Innovative Computing information and control, p 17-17

  4. Chang C-C, Chou Y-C, Kieu TD (2009) Information hiding in dual images with reversibility. In: Proceedings of the Third International Conference on Multimedia and Ubiquitous Engineering, 145-152

  5. Chang CC, Liu Y, Nguyen TS (2014) A novel turtle shell based scheme for data hiding. In: Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing. Kitakyushu, Japan

  6. Fridrich J, Goljan M (2002) Practical steganalysis of digital images: state of the art. Security and Watermarking of Multimedia Contents IV. Int Soc Opt Photonics 4675:1–13

    Google Scholar 

  7. Hassan FS, Gutub A (2020) Efficient reversible data hiding multimedia technique based on smart image interpolation. Multimed Tools Appl 79(39):30087–30109

    Article  Google Scholar 

  8. Hong W, Chen T-S, Shiu C-W(2009) Reversible data hiding for high quality images using modification of prediction errors. J Syst Softw 82(11):1833–1842

    Article  Google Scholar 

  9. Huynh N-T, Bharanitharan K, Chang C-C(2015)Quadri-directional searching algorithm for secret image sharing using meaningful shadows. J Vis Commun Image Represent 28:105–112

    Article  Google Scholar 

  10. Hwang M-S, Lu EJ-L, Lin I-C(2003) A practical (t, n) threshold proxy signature scheme based on the RSA cryptosystem. IEEE Trans Knowl Data Eng 15(6):1552–1560

    Article  Google Scholar 

  11. Jia Y et al (2019) Reversible data hiding based on reducing invalid shifting of pixels in histogram shifting. Sig Process 163:238–246

    Article  Google Scholar 

  12. Lee C-F, Huang Y-L(2013) Reversible data hiding scheme based on dual stegano-images using orientation combinations. Telecommun Syst 52(4):2237–2247

    Article  Google Scholar 

  13. Li X et al (2013) General framework to histogram-shifting-based reversible data hiding. IEEE Trans Image Process 22:2181–21913

    Article  MathSciNet  Google Scholar 

  14. Lin J-Y, Liu Y, Chang C-C(2019) A real-timedual-image-based reversible data hiding scheme using turtle shells. J Real-Time Image Proc 16(3):673–684

    Article  Google Scholar 

  15. Liu Y, Chang C-C(2018) A turtle shell-based visual secret sharing scheme with reversibility and authentication. Multimed Tools Appl 77(19):25295–25310

    Article  Google Scholar 

  16. Ni Z et al (2006) Reversible data hiding. IEEE Trans Circuits Syst Video Technol 16(3):354–362

    Article  Google Scholar 

  17. Schneier B (1996) Applied Cryptography. Wiley, Hoboken

  18. Tian J (2003) Reversible data embedding using a difference expansion. IEEE Trans Circuits Syst Video Technol 13(8):890–896

    Article  Google Scholar 

  19. Tsai P, Hu Y-C, Yeh H-L(2009) Reversible image hiding scheme using predictive coding and histogram shifting. Sig Process 89(6):1129–1143

    Article  Google Scholar 

  20. Weng S et al (2019) Dynamic improved pixel value ordering reversible data hiding. Inf Sci 489:136–154

    Article  Google Scholar 

  21. Yin Z, Xiang Y, Zhang X (2019) Reversible data hiding in encrypted images based on multi-MSB prediction and Huffman coding. IEEE Trans Multimed 22(4):874–884

    Article  Google Scholar 

  22. Zhang X, Wang S (2004) Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security. Pattern Recognit Lett 3(25):331–339

    Article  Google Scholar 

  23. Zhang X, Wang S (2006) Efficient steganographic embedding by exploiting modification direction. IEEE Commun Lett 10(11):781–783

    Article  MathSciNet  Google Scholar 

Download references

Acknowledgements

This work is partially supported by the Education and Research Project for Young and Middle-aged Teachers in Fujian Province (Grant number: JAT200458).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chin-Chen Chang.

Ethics declarations

We confirm that this manuscript has been neither submitted to any other journals nor previously a conference paper, and all text and graphics, except for those marked with sources, are original works of the authors.

Competing interests

The authors declare no competing interests. 

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Lin, JY., Horng, JH. & Chang, CC. A reversible and authenticable secret sharing scheme using dual images. Multimed Tools Appl 81, 17527–17545 (2022). https://doi.org/10.1007/s11042-022-12430-0

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-022-12430-0

Keywords

Navigation