Selective scalable secret image sharing with adaptive pixel-embedding technique

被引:0
|
作者
Ying-Chin Chen
Jung-San Lee
Hong-Chi Su
机构
[1] Feng-Chia University,Department of Information Engineering and Computer Science
来源
关键词
Selective; Scalable; Secret sharing; Adaptive pixel-embedding;
D O I
暂无
中图分类号
学科分类号
摘要
Different from secret image sharing technique, the secret of a scalable secret image sharing is displayed in the way that it could be progressively recovered by a set of shares. In other word, incomplete gathering of shadows cannot be used to reconstruct the whole image S immediately. To improve the security of SSIS, Lee and Chen have designed a selective scalable secret image sharing mechanism (SSSIS) to reduce the awareness of malicious attackers. Nevertheless, the quality of Lee and Chen’s scheme is not good due to the image distortion and storage overhead of static embedding. Thus, we introduce the concept of adaptive pixel-embedding into SSSIS, in which the embedded bits could be uniformly distributed in the stego image. Aside from the human vision perception, experimental results have demonstrated the superiority of new method over related works in terms of two objective indexes, including peak signal to noise ratio (PSNR) and structural similarity (SSIM).
引用
收藏
页码:27107 / 27121
页数:14
相关论文
共 50 条
  • [31] Double Verification Secret Sharing Mechanism Based on Adaptive Pixel Pair Matching
    Lin, Pei-Yu
    ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS, 2015, 11 (03)
  • [32] Visual secret sharing scheme: prioritizing the secret pixels with different pixel expansions to enhance the image contrast
    Yang, Ching-Nung
    Chen, Tse-Shih
    OPTICAL ENGINEERING, 2007, 46 (09)
  • [33] An adaptive secret image sharing with a new bitwise steganographic property
    Zarepour-Ahmadabadi, Jamal
    Ahmadabadi, MohammadEbrahim Shiri
    Latif, AliMohammad
    INFORMATION SCIENCES, 2016, 369 : 467 - 480
  • [34] The Image Watermarking Technique Using Visual Secret Sharing Strategy
    Huang, Shu-Chien
    Wang, Chu-Fu
    ISDA 2008: EIGHTH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS, VOL 2, PROCEEDINGS, 2008, : 190 - 195
  • [35] A general (k, n) scalable secret image sharing scheme with the smooth scalability
    Yang, Ching-Nung
    Chu, Yu-Ying
    JOURNAL OF SYSTEMS AND SOFTWARE, 2011, 84 (10) : 1726 - 1733
  • [36] A Secure and Efficient Scalable Secret Image Sharing Scheme with Flexible Shadow Sizes
    Xie, Dong
    Li, Lixiang
    Peng, Haipeng
    Yang, Yixian
    PLOS ONE, 2017, 12 (01):
  • [37] Public key based bidirectional shadow image authentication without pixel expansion in image secret sharing
    Yan, Xuehu
    Li, Longlong
    Chen, Jia
    Sun, Lei
    FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2023, 24 (01) : 88 - 103
  • [38] Enhancement of Data Embedding Technique using Adaptive Pixel Pair Matching for Security
    Nafsiya, C. A.
    Hari, Vidya
    Madheswari, A. Neela
    2013 THIRD INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING AND COMMUNICATIONS (ICACC 2013), 2013, : 173 - 176
  • [39] Scalable shares generation to increase participants of counting-based secret sharing technique
    Alkhodaidi, Taghreed M.
    Gutub, Adnan A.
    INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2022, 17 (1-2) : 119 - 146
  • [40] Steganography Based Secret Image Sharing Using Block Division Technique
    Tulasidasu, M.
    Sirisha, B. Lakshmi
    Reddy, K. Rasool
    2015 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS (CICN), 2015, : 1173 - 1176