Nothing Special   »   [go: up one dir, main page]

skip to main content
article

Secret sharing: using meaningful image shadows based on Gray code

Published: 01 April 2017 Publication History

Abstract

Steganography, such as secret sharing, is an important technique to use for protecting transmitted confidential data from the attention of any adversaries. Gray code is a commonly encountered binary labeling that was proposed by Frank Gray of Bell Laboratories in 1940 to prevent errors when using pulse-code modulation to transmit signals. The main features of Gray code are its recursive construction method and the fact that any two adjacent codes change only one bit. According to our observations, the image pixel correction based on these features is suitable for application secret sharing without making significant changes to the pixel value. We designed a reversible secret sharing method using meaningful image shadows based on Gray code. Our design applies absolute moment block truncation coding (AMBTC) compression to reduce the transmission bit rate. The experimental results show that our scheme can achieve the adequate visual quality of shadow images with lower communication overhead, thus proving it practical for numerous applications.

References

[1]
Aho AV, Hopcroft JE, Ullman JD (1974) The design and analysis of computer algorithms. Addison-Wesley, MA
[2]
Blakley GR (1979) Safeguarding cryptographic keys. Proceedings of the National Computer Conference, New York, NY, Vol. 48, pp. 313---317
[3]
Cai KY, Wang SS, Shiu PF, Lin CC (2011) A verifiable secret sharing scheme based on AMBTC. Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, Seoul, Korea, Article No. 129
[4]
Chang CC, Lin CC, Le THN (2008) A new probabilistic visual secret sharing scheme for color images. Proceedings of International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Harbin, China, pp. 1305---1308
[5]
Chang CC, Sun CY (2014) Polynomial-based secret sharing scheme based on the absolute moment block truncation coding technique. Proceedings of 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Kitakyushu, Japan, pp. 485---488
[6]
Delp EJ, Mitchell OR (1979) Image compression using block truncation coding. IEEE Trans Commun 27:1335---1342
[7]
Gray F (1953) Pulse code communications. US Patent, 2632058
[8]
Huynh NT, Bharanitharan K, Chang CC (2015) Quadri-directional searching algorithm for secret image sharing using meaningful shadows. J Vis Commun Image Represent 28:105---112
[9]
Le THN, Lin CC, Chang CC, Le HB (2011) A high quality and small shadow size visual secret sharing scheme based on hybrid strategy for grayscale images. Digit Signal Process 21:734---745
[10]
Lema MD, Mitchell OR (1984) Absolute moment block truncation coding and its application to color images. IEEE Trans Commun 32:1148---1157
[11]
Lin PY, Chan CS (2010) Invertible secret image sharing with steganography. Pattern Recogn Lett 31:1887---1893
[12]
Lin CC, Tsai WH (2004) Secret image sharing with steganography and authentication. J Syst Softw 73:405---414
[13]
Lin CC, Zhang WX (2008) Secret sharing scheme with non-expansible shadow size for color images. Proceedings of the 8th International Conference on Intelligent Systems Design and Applications, Kaohsiung, Taiwan, Vol. 3, pp. 302---307
[14]
Naor M, Shamir A (1994) Visual cryptography. Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques (Advances in Cryptology - Eurocrypt'94), Perugia, Italy, LNCS 950, pp. 1---12
[15]
Ou D, Sun W (2014) Reversible AMBTC-based secret sharing scheme with abilities of two decryptions. J Vis Commun Image Represent 25:1222---1239
[16]
Ou D, Ye L, Sun W (2015) User-friendly secret image sharing scheme with verification ability based on block truncation coding and error diffusion. J Vis Commun Image Represent 29:46---60
[17]
Shamir A (1979) How to share a secret. Commun ACM 22:612---613
[18]
Thien CC, Lin JC (2003) An image-sharing method with user-friendly shadow images. IEEE Trans Circuits Syst Video Technol 13:1161---1169
[19]
Ulutas G, Ulutas M, Nabiyev VV (2013) Secret image sharing scheme with adaptive authentication strength. Pattern Recogn Lett 34:283---291
[20]
Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13:600---612
[21]
Wang CY, Shiao NS, Chen HH, Tsai CS (2010) Enhance the visual quality of shares and recovered secret on meaningful shares visual secret sharing. Proceedings of the 4th International Conference on Uniquitous Information Management and Communication, Suwon, Korea, Article No. 15
[22]
Wu X, Ou D, Liang Q, Sun W (2012) A user-friendly secret image sharing scheme with reversible steganography based on cellular automata. J Syst Softw 85:1852---1863
[23]
Yang CN, Chen TS, Yu KH, Wang CC (2007) Improvements of image sharing with steganography and authentication. J Syst Softw 80:1070---1076

Cited By

View all
  • (2020)Efficient collusion resistant multi-secret image sharingMultimedia Tools and Applications10.1007/s11042-020-09619-679:43-44(33233-33252)Online publication date: 1-Nov-2020
  • (2019)Polynomial-based extended secret image sharing scheme with reversible and unexpanded coversMultimedia Tools and Applications10.1007/s11042-018-6202-378:2(1265-1287)Online publication date: 1-Jan-2019
  • (2018)Greyscale-images-oriented progressive secret sharing based on the linear congruence equationMultimedia Tools and Applications10.1007/s11042-017-5435-x77:16(20569-20596)Online publication date: 1-Aug-2018

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Multimedia Tools and Applications
Multimedia Tools and Applications  Volume 76, Issue 7
Apr 2017
1221 pages

Publisher

Kluwer Academic Publishers

United States

Publication History

Published: 01 April 2017

Author Tags

  1. Absolute moment block truncation coding
  2. Gray code
  3. Low bit rate
  4. Low complexity
  5. Meaningful shadows
  6. Secret sharing

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 17 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2020)Efficient collusion resistant multi-secret image sharingMultimedia Tools and Applications10.1007/s11042-020-09619-679:43-44(33233-33252)Online publication date: 1-Nov-2020
  • (2019)Polynomial-based extended secret image sharing scheme with reversible and unexpanded coversMultimedia Tools and Applications10.1007/s11042-018-6202-378:2(1265-1287)Online publication date: 1-Jan-2019
  • (2018)Greyscale-images-oriented progressive secret sharing based on the linear congruence equationMultimedia Tools and Applications10.1007/s11042-017-5435-x77:16(20569-20596)Online publication date: 1-Aug-2018

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media