Selective scalable secret image sharing with adaptive pixel-embedding technique

被引:0
|
作者
Ying-Chin Chen
Jung-San Lee
Hong-Chi Su
机构
[1] Feng-Chia University,Department of Information Engineering and Computer Science
来源
Multimedia Tools and Applications | 2018年 / 77卷
关键词
Selective; Scalable; Secret sharing; Adaptive pixel-embedding;
D O I
暂无
中图分类号
学科分类号
摘要
Different from secret image sharing technique, the secret of a scalable secret image sharing is displayed in the way that it could be progressively recovered by a set of shares. In other word, incomplete gathering of shadows cannot be used to reconstruct the whole image S immediately. To improve the security of SSIS, Lee and Chen have designed a selective scalable secret image sharing mechanism (SSSIS) to reduce the awareness of malicious attackers. Nevertheless, the quality of Lee and Chen’s scheme is not good due to the image distortion and storage overhead of static embedding. Thus, we introduce the concept of adaptive pixel-embedding into SSSIS, in which the embedded bits could be uniformly distributed in the stego image. Aside from the human vision perception, experimental results have demonstrated the superiority of new method over related works in terms of two objective indexes, including peak signal to noise ratio (PSNR) and structural similarity (SSIM).
引用
收藏
页码:27107 / 27121
页数:14
相关论文
共 50 条
  • [41] Secured secret sharing technique based on chaotic map and DNA encoding with application on secret image
    Naskar, P. K.
    Chaudhuri, A.
    IMAGING SCIENCE JOURNAL, 2016, 64 (08): : 460 - 470
  • [42] A Time Efficient Secret Image Sharing Scheme for Group Authentication System Without Pixel Expansions
    Biswas, Samarpita
    Dillen, Nicole Belinda
    Kole, Dipak Kumar
    Chakraborty, Aruna
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION TECHNOLOGIES, IC3T 2015, VOL 3, 2016, 381 : 55 - 63
  • [43] Visual secret sharing scheme: Improving the contrast of a recovered image via different pixel expansions
    Yang, Ching-Nung
    Chen, Tse-Shih
    IMAGE ANALYSIS AND RECOGNITION, PT 1, 2006, 4141 : 468 - 479
  • [44] Secured image transmission using a novel neural network approach and secret image sharing technique
    Kumar, Rakesh
    Dhiman, Meenu
    International Journal of Signal Processing, Image Processing and Pattern Recognition, 2015, 8 (01): : 161 - 192
  • [45] Visual Secret Sharing of Color Image Using Extended Asmuth Bloom Technique
    Anbarasi, L. Jani
    Mala, G. S. Anadha
    Prassana, D. R. L.
    COMPUTATIONAL INTELLIGENCE IN DATA MINING, VOL 3, 2015, 33
  • [46] Data Embedding Technique Using Secret Fragment Visible Mosaic Image for Covered Communication
    Chavan, Asawari S.
    Manjrekar, Amrita A.
    2015 IEEE INTERNATIONAL CONFERENCE ON INFORMATION PROCESSING (ICIP), 2015, : 260 - 265
  • [47] Pixel co-ordinate-based secret image sharing scheme with constant size shadow images
    Patil, Shravani Mahesh
    Purushothama, B. R.
    COMPUTERS & ELECTRICAL ENGINEERING, 2021, 89
  • [48] Adaptive Particle Swarm Optimization Data Hiding for High Security Secret Image Sharing
    Narayanan, S. Lakshmi
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2022, 43 (03): : 931 - 946
  • [49] Steganographic Technique Using Secure Adaptive Pixel Pair Matching for Embedding Multiple Data types in Images
    Alias, Edwina T.
    Mathew, Dominic
    Thomas, Abraham
    2015 FIFTH INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING AND COMMUNICATIONS (ICACC), 2015, : 426 - 429
  • [50] SELECTIVE SECRET SHARING SCHEME FOR PRIVACY OF IMAGE AND VIDEO COMPRESSED IN MPEG-LIKE FORMATS
    Bergeron, Cyril
    Lamy-Bergot, Catherine
    Hamidouche, Wassim
    Puech, William
    2023 IEEE 25TH INTERNATIONAL WORKSHOP ON MULTIMEDIA SIGNAL PROCESSING, MMSP, 2023,