Nothing Special   »   [go: up one dir, main page]

Skip to main content
Log in

Visual secret sharing in halftone images by multi-scale error diffusion

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

A secret sharing scheme in halftone images is proposed in this research. Given a secret halftone image, several gray-level images with the same resolution will be chosen from the database to collaboratively carry the secret information. The selected images will be transferred to halftone ones using Multi-scale Error Diffusion (MED), with the constraint imposed by the pixels of halftone secret image. The modified MED ensures that the resultant pixels of host halftone images should satisfy the required conditions such that collecting all the processed halftone images can successfully reveal the secret one. In addition to facilitating the perfect extraction of hidden information, maintaining the quality of all the halftone images in this secret sharing scenario is the other major objective, which is achieved by the usage of MED and selection of suitable host images. The experimental results demonstrate the satisfactory performance of the proposed method.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20

Similar content being viewed by others

References

  1. Adi S (1979) How to share a secret. Commun ACM 22(11):612–613

    Article  MathSciNet  MATH  Google Scholar 

  2. Analoui M, Rogowitz BE, Allebach JP (1992) Model based halftoning using direct binary search. In: Human vision, visual processing, and digital display III, vol 1666, pp 96–108

  3. Ateniese G, Blundo C, De Santis A, Stinson DR (2001) Extended capabilities for visual cryptography. Theor Comput Sci 250(1-2):134–161

    Article  MathSciNet  MATH  Google Scholar 

  4. Beimel A (2011) Secret-sharing schemes: A survey. In: Proceedings of the third international conference on coding and cryptology, pp 11–46

    Google Scholar 

  5. Blakley GR (1979) Safeguarding cryptographic keys. In: Proceedings of the national computer conference, vol 48, pp 313–317

  6. Cimato S, Yang JCN, Wu C-C (2014) Visual cryptography based watermarking. Transactions on Data Hiding and Multimedia Security IX. Lect Notes Comput Sci 8363:91–109

    Article  Google Scholar 

  7. (1994). Corel Stock Photo Library. Corel Corporation

  8. Fung YH, Chan YH (2006) Embedding halftones of different resolutions in a full-scale halftone. IEEE Signal Process Lett 13(3):153–156

    Article  Google Scholar 

  9. Furht B (2008) Encyclopedia of multimedia springer

  10. Guo JM, Tsai JJ (2009) Data hiding in halftone images using adaptive noise-balanced error diffusion and quality-noise look up table. In: IEEE International symposium on circuits and systems, vol 1, pp 201–204

  11. Guo J-M, Liu Y-F (2012) High capacity data hiding for error-diffused block truncation coding. IEEE Trans on Image Processing 21(12):4808–4818

    Article  MathSciNet  MATH  Google Scholar 

  12. Guo JM, Huang JH (2010) Data hiding in halftone images with secret-shared dot diffusion. In: IEEE International symposium on circuits and systems, pp 1133–1136

    Google Scholar 

  13. Guo J-M, Liu Y-F (2010) Hiding multitone watermarks in halftone images. IEEE Multimed 17(1):34–43

    Article  Google Scholar 

  14. Guo J-M, Su C-C, Liu Y-F, Lee H, Lee J-D (2012) Oriented modulation for watermarking in direct binary search halftone images. IEEE Trans Image Process 21(9):4117–4127

    Article  MathSciNet  MATH  Google Scholar 

  15. Jarvis JF, Judice CN, Ninke WH (1976) A survey of techniques for the display of continuous-tone pictures on bilevel displays. Comput Graphics Image Process 5(1):13–40

    Article  Google Scholar 

  16. Katsavounidis I, Jay Kuo C-C (1997) A multiscale error diffusion technique for digital halftoning. IEEE Trans Image Process 6(3):483–490

    Article  Google Scholar 

  17. Knuth DE (1987) Digital halftones by dot diffusion. ACM Trans Graph 6(4):245–273

    Article  MathSciNet  MATH  Google Scholar 

  18. Myodo E, Sakazawa S, Takishima Y (2006) Visual cryptography based on void-and-cluster halftoning technique. In: IEEE International conference on image processing, pp 97–100

    Google Scholar 

  19. Myodo E, Takagi K, Miyaji S, Takishima Y (2007) Halftone visual cryptography embedding a natural grayscale image based on error diffusion technique. In: IEEE International conference on image processing, pp 2114–2117

    Google Scholar 

  20. Naor M, Shamir A (1995) Visual cryptography. In: Advances in cryptograhy: EUROCRYPT, LNCS, vol 950, pp 1–12

  21. Pan J-S, Luo H, Lu Z-M (2006) A lossless watermarking scheme for halftone image authentication. Int J Comput Sci Netw Secur 6(2):147–151

    Google Scholar 

  22. Pang W-M, Yingge Q, Wong T-T, Cohen-Or D, Heng P-A (2008) Structure-aware halftoning. ACM Trans Graph 27(3):89:1–89:8

    Article  MathSciNet  Google Scholar 

  23. Son C-H, Choo H (2014) Watermark detection from clustered halftone dots via learned dictionary. Signal Process 102(12):77–84

    Article  Google Scholar 

  24. Son C-H, Choo H (2014) Color recovery of black-and-white halftoned images via categorized color-embedding look-up tables. Digital Signal Process 28:93–105

    Article  Google Scholar 

  25. Son C-H, Lee K, Choo H (2015) Inverse color to black-and-white halftone conversion via dictionary learning and color mapping. Inf Sci 299:1–19

    Article  MathSciNet  Google Scholar 

  26. Ulichney R (1987) Digital halftoning. MIT Press, Cambridge

    Google Scholar 

  27. Ulichney RA (1993) The void-and-cluster method for dither array generation. In: Proc. SPIE, Human Vis. Visual Process., Digit. Displays IV, vol 1913, pp 332–343

  28. Wang Z, Arce GR (2006) Halftone visual cryptography through error diffusion. In: IEEE International conference on image processing, pp 109–112

    Google Scholar 

  29. Wang Z, Arce GR (2010) Halftone visual cryptography by iterative halftoning. In: IEEE Int. Conf. acoustics, Speech and Signal Processing, pp 1822–1825

    Google Scholar 

  30. Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: From error visibility to structural similarity. IEEE Trans on Image Process 13(4):600–612

    Article  Google Scholar 

  31. Weir J, Yan W (2010) A comprehensive study of visual cryptography. Transactions on Data Hiding and Multimedia Security V. Lect Notes Comput Sci 6010:70–105

    Article  Google Scholar 

  32. Wong PW (1996) Adaptive error diffusion and its application in multiresolution rendering. IEEE Trans on Image Process 5(7):1184–1196

    Article  Google Scholar 

  33. Wong PW (2003) Multi-resolution binary image embedding. In: Proc. SPIE security and watermarking of multimedia contents v, vol 5020, pp 423–429

  34. Zhou Z, Arce GR, Di Crescenzo G (2006) Halftone visual cryptography. IEEE Trans on Image Process 15(8):2441–2453

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Po-Chyi Su.

Additional information

This research is supported by the Ministry of Science and Technology in Taiwan, under Grants MOST104-2221-E-008-072 and MOST105-2221-E-008-086

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Su, PC., Tsai, TF. & Chien, YC. Visual secret sharing in halftone images by multi-scale error diffusion. Multimed Tools Appl 77, 12111–12138 (2018). https://doi.org/10.1007/s11042-017-4861-0

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-017-4861-0

Keywords

Navigation