Abstract
A secret sharing scheme in halftone images is proposed in this research. Given a secret halftone image, several gray-level images with the same resolution will be chosen from the database to collaboratively carry the secret information. The selected images will be transferred to halftone ones using Multi-scale Error Diffusion (MED), with the constraint imposed by the pixels of halftone secret image. The modified MED ensures that the resultant pixels of host halftone images should satisfy the required conditions such that collecting all the processed halftone images can successfully reveal the secret one. In addition to facilitating the perfect extraction of hidden information, maintaining the quality of all the halftone images in this secret sharing scenario is the other major objective, which is achieved by the usage of MED and selection of suitable host images. The experimental results demonstrate the satisfactory performance of the proposed method.
Similar content being viewed by others
References
Adi S (1979) How to share a secret. Commun ACM 22(11):612–613
Analoui M, Rogowitz BE, Allebach JP (1992) Model based halftoning using direct binary search. In: Human vision, visual processing, and digital display III, vol 1666, pp 96–108
Ateniese G, Blundo C, De Santis A, Stinson DR (2001) Extended capabilities for visual cryptography. Theor Comput Sci 250(1-2):134–161
Beimel A (2011) Secret-sharing schemes: A survey. In: Proceedings of the third international conference on coding and cryptology, pp 11–46
Blakley GR (1979) Safeguarding cryptographic keys. In: Proceedings of the national computer conference, vol 48, pp 313–317
Cimato S, Yang JCN, Wu C-C (2014) Visual cryptography based watermarking. Transactions on Data Hiding and Multimedia Security IX. Lect Notes Comput Sci 8363:91–109
(1994). Corel Stock Photo Library. Corel Corporation
Fung YH, Chan YH (2006) Embedding halftones of different resolutions in a full-scale halftone. IEEE Signal Process Lett 13(3):153–156
Furht B (2008) Encyclopedia of multimedia springer
Guo JM, Tsai JJ (2009) Data hiding in halftone images using adaptive noise-balanced error diffusion and quality-noise look up table. In: IEEE International symposium on circuits and systems, vol 1, pp 201–204
Guo J-M, Liu Y-F (2012) High capacity data hiding for error-diffused block truncation coding. IEEE Trans on Image Processing 21(12):4808–4818
Guo JM, Huang JH (2010) Data hiding in halftone images with secret-shared dot diffusion. In: IEEE International symposium on circuits and systems, pp 1133–1136
Guo J-M, Liu Y-F (2010) Hiding multitone watermarks in halftone images. IEEE Multimed 17(1):34–43
Guo J-M, Su C-C, Liu Y-F, Lee H, Lee J-D (2012) Oriented modulation for watermarking in direct binary search halftone images. IEEE Trans Image Process 21(9):4117–4127
Jarvis JF, Judice CN, Ninke WH (1976) A survey of techniques for the display of continuous-tone pictures on bilevel displays. Comput Graphics Image Process 5(1):13–40
Katsavounidis I, Jay Kuo C-C (1997) A multiscale error diffusion technique for digital halftoning. IEEE Trans Image Process 6(3):483–490
Knuth DE (1987) Digital halftones by dot diffusion. ACM Trans Graph 6(4):245–273
Myodo E, Sakazawa S, Takishima Y (2006) Visual cryptography based on void-and-cluster halftoning technique. In: IEEE International conference on image processing, pp 97–100
Myodo E, Takagi K, Miyaji S, Takishima Y (2007) Halftone visual cryptography embedding a natural grayscale image based on error diffusion technique. In: IEEE International conference on image processing, pp 2114–2117
Naor M, Shamir A (1995) Visual cryptography. In: Advances in cryptograhy: EUROCRYPT, LNCS, vol 950, pp 1–12
Pan J-S, Luo H, Lu Z-M (2006) A lossless watermarking scheme for halftone image authentication. Int J Comput Sci Netw Secur 6(2):147–151
Pang W-M, Yingge Q, Wong T-T, Cohen-Or D, Heng P-A (2008) Structure-aware halftoning. ACM Trans Graph 27(3):89:1–89:8
Son C-H, Choo H (2014) Watermark detection from clustered halftone dots via learned dictionary. Signal Process 102(12):77–84
Son C-H, Choo H (2014) Color recovery of black-and-white halftoned images via categorized color-embedding look-up tables. Digital Signal Process 28:93–105
Son C-H, Lee K, Choo H (2015) Inverse color to black-and-white halftone conversion via dictionary learning and color mapping. Inf Sci 299:1–19
Ulichney R (1987) Digital halftoning. MIT Press, Cambridge
Ulichney RA (1993) The void-and-cluster method for dither array generation. In: Proc. SPIE, Human Vis. Visual Process., Digit. Displays IV, vol 1913, pp 332–343
Wang Z, Arce GR (2006) Halftone visual cryptography through error diffusion. In: IEEE International conference on image processing, pp 109–112
Wang Z, Arce GR (2010) Halftone visual cryptography by iterative halftoning. In: IEEE Int. Conf. acoustics, Speech and Signal Processing, pp 1822–1825
Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: From error visibility to structural similarity. IEEE Trans on Image Process 13(4):600–612
Weir J, Yan W (2010) A comprehensive study of visual cryptography. Transactions on Data Hiding and Multimedia Security V. Lect Notes Comput Sci 6010:70–105
Wong PW (1996) Adaptive error diffusion and its application in multiresolution rendering. IEEE Trans on Image Process 5(7):1184–1196
Wong PW (2003) Multi-resolution binary image embedding. In: Proc. SPIE security and watermarking of multimedia contents v, vol 5020, pp 423–429
Zhou Z, Arce GR, Di Crescenzo G (2006) Halftone visual cryptography. IEEE Trans on Image Process 15(8):2441–2453
Author information
Authors and Affiliations
Corresponding author
Additional information
This research is supported by the Ministry of Science and Technology in Taiwan, under Grants MOST104-2221-E-008-072 and MOST105-2221-E-008-086
Rights and permissions
About this article
Cite this article
Su, PC., Tsai, TF. & Chien, YC. Visual secret sharing in halftone images by multi-scale error diffusion. Multimed Tools Appl 77, 12111–12138 (2018). https://doi.org/10.1007/s11042-017-4861-0
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-017-4861-0