A hybrid approach combining data hiding with visual cryptography for secure extraction of data hiding

被引:1
|
作者
Wu, Xiaotian [1 ]
Yang, Ching-Nung [2 ]
Cai, Hong-Wu [2 ]
Liu, Yanxiao [3 ]
机构
[1] Jinan Univ, Dept Comp Sci, Guangdong Key Lab Data Secur & Privacy Preserving, Guangzhou, Peoples R China
[2] Natl Dong Hwa Univ, Dept Comp Sci & Informat Engn, Hualien, Taiwan
[3] Sichuan Digital Econ Ind Dev Res Inst, Chengdu, Peoples R China
基金
中国国家自然科学基金;
关键词
Secret sharing; Visual cryptography; Data hiding; Secret image sharing; Hybrid method; Pixel expansion; SECRET SHARING SCHEMES; CONTRAST;
D O I
10.1016/j.jisa.2023.103520
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Visual cryptography scheme (VCS) naturally provides a solution for protecting a secret image in a group environment. However, most of the existing VCSs proposed so far only protect one secret image. In this work, we design a hybrid scheme combining VCS and data hiding to simultaneously safeguard the secret image and some related information (e.g., the description of the secret image). First of all, a framework for the hybrid scheme is introduced. Algorithms for building the proposed framework are given. Generally, a secret image is partitioned into k shadows in which the additional messages are embedded. By stacking k shadows, the secret image is visually revealed, and meanwhile, the embedded messages can be securely extracted from the stacked result. Moreover, the performance of the proposed technique would suffer as a result when the threshold k becomes larger. At this time, we have larger pixel expansion, smaller contrast, and reduced data hiding efficiency. To make the scheme more practical, an improved approach is presented for reducing the pixel expansion, increasing the visual quality of recovered image, and enhancing the data hiding efficiency. Comprehensive theoretical analysis and experiments are demonstrated to clarify the effectiveness and advantages of the proposed methods.
引用
收藏
页数:14
相关论文
共 50 条
  • [31] HIDING MULTIPLE WATERMARKS IN TRANSPARENCIES OF VISUAL CRYPTOGRAPHY
    Luo, Hao
    Yu, Fa-Xin
    Chu, Shu-Chuan
    Lu, Zhe-Ming
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2009, 5 (07): : 1875 - 1881
  • [32] Reversible data hiding scheme using deep learning and visual cryptography for medical image communication
    Kumar, Namachivayam Rajesh
    Krishnan, Raghupathy Bala
    Manikandan, Ganesan
    Subramaniyaswamy, Vairavasundaram
    Kotecha, Ketan
    JOURNAL OF ELECTRONIC IMAGING, 2022, 31 (06)
  • [33] A Fuzzy Approach for Data Hiding in Images
    Sabokdast, Masume
    Mohammadi, Majid
    2013 13TH IRANIAN CONFERENCE ON FUZZY SYSTEMS (IFSC), 2013,
  • [34] An Improved Method for Reversible Data Hiding Steganography Combined with Cryptography
    Rashmi, N.
    Jyothi, K.
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON INVENTIVE SYSTEMS AND CONTROL (ICISC 2018), 2018, : 81 - 84
  • [35] Robust and Secure Data Hiding Based On Reversible Method
    Shalini, R.
    Sridevi, S.
    Kumari, G. Rosline Nesa
    RESEARCH JOURNAL OF PHARMACEUTICAL BIOLOGICAL AND CHEMICAL SCIENCES, 2016, 7 : 198 - 203
  • [36] SecECG: secure data hiding approach for ECG signals in smart healthcare applications
    Rani, Jyoti
    Anand, Ashima
    Shivani, Shivendra
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 83 (14) : 42885 - 42905
  • [37] Secure itemset hiding in smart city sensor data
    Srivastava, Gautam
    Lin, Jerry Chun-Wei
    Lin, Guo
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (02): : 1361 - 1374
  • [38] Robust and Secure Data Hiding for PDF Text Document
    Kuribayashi, Minoru
    Fukushima, Takuya
    Funabiki, Nobuo
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2019, E102D (01) : 41 - 47
  • [39] Efficient and secure data hiding in encrypted images: A new approach using chaos
    Kumar, R. Ranjith
    Jayasudha, S.
    Pradeep, S.
    INFORMATION SECURITY JOURNAL, 2016, 25 (4-6): : 235 - 246
  • [40] SecECG: secure data hiding approach for ECG signals in smart healthcare applications
    Jyoti Rani
    Ashima Anand
    Shivendra Shivani
    Multimedia Tools and Applications, 2024, 83 : 42885 - 42905