A hybrid approach combining data hiding with visual cryptography for secure extraction of data hiding

被引:1
|
作者
Wu, Xiaotian [1 ]
Yang, Ching-Nung [2 ]
Cai, Hong-Wu [2 ]
Liu, Yanxiao [3 ]
机构
[1] Jinan Univ, Dept Comp Sci, Guangdong Key Lab Data Secur & Privacy Preserving, Guangzhou, Peoples R China
[2] Natl Dong Hwa Univ, Dept Comp Sci & Informat Engn, Hualien, Taiwan
[3] Sichuan Digital Econ Ind Dev Res Inst, Chengdu, Peoples R China
基金
中国国家自然科学基金;
关键词
Secret sharing; Visual cryptography; Data hiding; Secret image sharing; Hybrid method; Pixel expansion; SECRET SHARING SCHEMES; CONTRAST;
D O I
10.1016/j.jisa.2023.103520
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Visual cryptography scheme (VCS) naturally provides a solution for protecting a secret image in a group environment. However, most of the existing VCSs proposed so far only protect one secret image. In this work, we design a hybrid scheme combining VCS and data hiding to simultaneously safeguard the secret image and some related information (e.g., the description of the secret image). First of all, a framework for the hybrid scheme is introduced. Algorithms for building the proposed framework are given. Generally, a secret image is partitioned into k shadows in which the additional messages are embedded. By stacking k shadows, the secret image is visually revealed, and meanwhile, the embedded messages can be securely extracted from the stacked result. Moreover, the performance of the proposed technique would suffer as a result when the threshold k becomes larger. At this time, we have larger pixel expansion, smaller contrast, and reduced data hiding efficiency. To make the scheme more practical, an improved approach is presented for reducing the pixel expansion, increasing the visual quality of recovered image, and enhancing the data hiding efficiency. Comprehensive theoretical analysis and experiments are demonstrated to clarify the effectiveness and advantages of the proposed methods.
引用
收藏
页数:14
相关论文
共 50 条
  • [41] Flexible Data Hiding and Extraction in EtC Images
    Hirasawa, Ryoichi
    Imaizumi, Shoko
    Kiya, Hitoshi
    2020 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC), 2020, : 1347 - 1351
  • [42] A secure protocol for data hiding in compressed fingerprint images
    Ratha, NK
    Figueroa-Villanueva, MA
    Connell, JH
    Bolle, RM
    BIOMETRIC AUTHENTICATION, PROCEEDINGS, 2004, 3087 : 205 - 216
  • [43] Secure Data Hiding Using Eight Queens Solutions
    Muttoo, Sunil Kumar
    Kumar, Vinay
    Bansal, Abhishek
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2012, 6 (04) : 55 - 70
  • [44] Robust and Secure Data Hiding Techniques for Telemedicine Applications
    Singh, Amit Kumar
    Kumar, Basant
    Singh, Sanjay Kumar
    Dave, Mayank
    Singh, Vivek Kumar
    Kumar, Pardeep
    Ghrera, S. P.
    Gupta, Pradeep Kumar
    Mohan, Anand
    MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (05) : 7563 - 7573
  • [45] An improved Visual Cryptography scheme for secret hiding
    Youmaran, R.
    Adler, A.
    Miri, A.
    2006 23RD BIENNIAL SYMPOSIUM ON COMMUNICATIONS, 2006, : 340 - +
  • [46] Secure Medical Information Exchange with Reversible Data Hiding
    Huang, Hsiang-Cheh
    Fang, Wai-Chi
    Lai, Wei-Hao
    2012 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS 2012), 2012, : 1424 - 1427
  • [47] Secure Bank Transaction Using Data Hiding Mechanisms
    Rathod, Prachi D.
    Kapse, Smita R.
    2017 INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION, EMBEDDED AND COMMUNICATION SYSTEMS (ICIIECS), 2017,
  • [48] Secure data-hiding in multimedia using NMF
    Malik, Hafiz
    Baqai, Farhan
    Khokhar, Ashfaq
    Ansari, Rashid
    MULTIMEDIA CONTENT REPRESENTATION, CLASSIFICATION AND SECURITY, 2006, 4105 : 265 - 272
  • [49] Secure data hiding in binary document images for authentication
    Lu, HP
    Kot, AC
    Cheng, J
    PROCEEDINGS OF THE 2003 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOL III: GENERAL & NONLINEAR CIRCUITS AND SYSTEMS, 2003, : 806 - 809
  • [50] Secure itemset hiding in smart city sensor data
    Gautam Srivastava
    Jerry Chun-Wei Lin
    Guo Lin
    Cluster Computing, 2024, 27 : 1361 - 1374