A hybrid approach combining data hiding with visual cryptography for secure extraction of data hiding

被引:1
|
作者
Wu, Xiaotian [1 ]
Yang, Ching-Nung [2 ]
Cai, Hong-Wu [2 ]
Liu, Yanxiao [3 ]
机构
[1] Jinan Univ, Dept Comp Sci, Guangdong Key Lab Data Secur & Privacy Preserving, Guangzhou, Peoples R China
[2] Natl Dong Hwa Univ, Dept Comp Sci & Informat Engn, Hualien, Taiwan
[3] Sichuan Digital Econ Ind Dev Res Inst, Chengdu, Peoples R China
基金
中国国家自然科学基金;
关键词
Secret sharing; Visual cryptography; Data hiding; Secret image sharing; Hybrid method; Pixel expansion; SECRET SHARING SCHEMES; CONTRAST;
D O I
10.1016/j.jisa.2023.103520
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Visual cryptography scheme (VCS) naturally provides a solution for protecting a secret image in a group environment. However, most of the existing VCSs proposed so far only protect one secret image. In this work, we design a hybrid scheme combining VCS and data hiding to simultaneously safeguard the secret image and some related information (e.g., the description of the secret image). First of all, a framework for the hybrid scheme is introduced. Algorithms for building the proposed framework are given. Generally, a secret image is partitioned into k shadows in which the additional messages are embedded. By stacking k shadows, the secret image is visually revealed, and meanwhile, the embedded messages can be securely extracted from the stacked result. Moreover, the performance of the proposed technique would suffer as a result when the threshold k becomes larger. At this time, we have larger pixel expansion, smaller contrast, and reduced data hiding efficiency. To make the scheme more practical, an improved approach is presented for reducing the pixel expansion, increasing the visual quality of recovered image, and enhancing the data hiding efficiency. Comprehensive theoretical analysis and experiments are demonstrated to clarify the effectiveness and advantages of the proposed methods.
引用
收藏
页数:14
相关论文
共 50 条
  • [1] New Approach for Reversible Data Hiding Using Visual Cryptography
    Rakhunde, Shruti M.
    Nikose, Archana A.
    2014 6TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS, 2014, : 846 - 855
  • [2] A Secure Data Hiding Scheme Based on Combined Steganography and Visual Cryptography Methods
    Nandakumar, Aishwarya
    Harmya, P.
    Jagadeesh, Noopa
    Anju, S. S.
    ADVANCES IN COMPUTING AND COMMUNICATIONS, PT 2, 2011, 191 : 498 - 505
  • [3] Secure data hiding using Steganographic technique with Visual Cryptography and Watermarking Scheme
    Gayathri, R.
    Nagarajan, V.
    2015 INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND SIGNAL PROCESSING (ICCSP), 2015, : 118 - 123
  • [4] Visual cryptography with extra ability of hiding confidential data
    Fang, Wen-Pinn
    Lin, Ja-Chen
    JOURNAL OF ELECTRONIC IMAGING, 2006, 15 (02)
  • [5] Secure Image Steganography Approach for Hiding Compressed Data
    Abdul-Zaher, Khadija M.
    Sewesy, Adel Abo El-Magd
    Mohamed, Marghany Hassan
    SOFT COMPUTING FOR SECURITY APPLICATIONS, ICSCS 2022, 2023, 1428 : 575 - 595
  • [6] HIGH CAPACITY MULTI-SCALE IMAGE SHARING SCHEME BY COMBINING VISUAL CRYPTOGRAPHY WITH DATA HIDING
    Zeng, Yi-Chong
    Tsai, Chi-Hung
    2013 20TH IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING (ICIP 2013), 2013, : 4536 - 4539
  • [7] Special Issue: Real-Time Data Hiding and Visual Cryptography
    Kim, C.
    Chang, C. C.
    Yang, C. N.
    Zhang, X.
    Baek, J.
    JOURNAL OF REAL-TIME IMAGE PROCESSING, 2018, 14 (01) : 1 - 4
  • [8] Special Issue: Real-Time Data Hiding and Visual Cryptography
    C. Kim
    C. C. Chang
    C. N. Yang
    X. Zhang
    J. Baek
    Journal of Real-Time Image Processing, 2018, 14 : 1 - 4
  • [9] Analysis of Multiple Data Hiding Combined Coloured Visual Cryptography and LSB
    Maulana, Halim
    Syahputra, Edy Rahman
    INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY (ICONICT), 2017, 930
  • [10] Data Hiding Application with Gokturk Alphabet Based Visual Cryptography Method
    Tuncer, Turker
    Avci, Engin
    JOURNAL OF THE FACULTY OF ENGINEERING AND ARCHITECTURE OF GAZI UNIVERSITY, 2016, 31 (03): : 782 - 791