Advertisement

Multimedia Tools and Applications

, Volume 77, Issue 20, pp 27107–27121 | Cite as

Selective scalable secret image sharing with adaptive pixel-embedding technique

  • Ying-Chin Chen
  • Jung-San LeeEmail author
  • Hong-Chi Su
Article
  • 287 Downloads

Abstract

Different from secret image sharing technique, the secret of a scalable secret image sharing is displayed in the way that it could be progressively recovered by a set of shares. In other word, incomplete gathering of shadows cannot be used to reconstruct the whole image S immediately. To improve the security of SSIS, Lee and Chen have designed a selective scalable secret image sharing mechanism (SSSIS) to reduce the awareness of malicious attackers. Nevertheless, the quality of Lee and Chen’s scheme is not good due to the image distortion and storage overhead of static embedding. Thus, we introduce the concept of adaptive pixel-embedding into SSSIS, in which the embedded bits could be uniformly distributed in the stego image. Aside from the human vision perception, experimental results have demonstrated the superiority of new method over related works in terms of two objective indexes, including peak signal to noise ratio (PSNR) and structural similarity (SSIM).

Keywords

Selective Scalable Secret sharing Adaptive pixel-embedding 

References

  1. 1.
    Chang CC, Hsiao JY, Chan CS (2003) Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy. Pattern Recogn 36(7):1583–1595Google Scholar
  2. 2.
    Chang CC, Chan CS, Fan YH (2006) Image hiding scheme with modulus function and dynamic programming strategy on partitioned pixels. Pattern Recogn 39(6):1155–1167zbMATHGoogle Scholar
  3. 3.
    Chang CC, Hsieh YP, Lin CH (2008) Sharing secrets in stego images with authentication. Pattern Recogn 41(10):3130–3137zbMATHGoogle Scholar
  4. 4.
    Eslami Z, Ahmadabadi JZ (2011) Secret image sharing with authentication- chaining and dynamic embedding. J Syst Softw 84(5):803–809Google Scholar
  5. 5.
    Eslami Z, Razzaghi SH, Ahmadabadi JZ (2010) Secret image sharing based on cellular automata and steganography. Pattern Recogn 43(1):397–404zbMATHGoogle Scholar
  6. 6.
    Jiang H, Wang J, Yuan Z, Wu Y, Zheng N, Li S (2013) Salient object detection: a discriminative regional feature integration approach. Proceedings of 2013 I.E. Conference on Computer Vision and Pattern Recognition, pp 2083–2090Google Scholar
  7. 7.
    Lee JS, Chen YR (2017) Selective scalable secret image sharing with verification. Multimed Tools Appl 76(1):1–11Google Scholar
  8. 8.
    Lee JS, Wei KJ, Chen SJ, Wang YH (2016) Tele-micropayment scam prevention based on visual secret sharing technique. Multimed Tools Appl 75(4):2233–2248Google Scholar
  9. 9.
    Lin CC, Tsai WH (2004) Secret image sharing with steganography and authentication. J Syst Softw 73(3):405–414Google Scholar
  10. 10.
    Rao TRN, Yang CH (2006) Aryabhata remainder theorem: relevance to public-key crypto-algorithms. J Syst Softw 25(1):1–15MathSciNetzbMATHGoogle Scholar
  11. 11.
    Shamir A (1979) How to share a secret. Commun ACM 22(11):612–613MathSciNetzbMATHGoogle Scholar
  12. 12.
    Thien CC, Lin JC (2002) Secret image sharing. Comput Graph 26:765–770Google Scholar
  13. 13.
    Wang RZ, Shyu SJ (2007) Scalable secret image sharing. Signal Process Image Commun 22(4):363–373Google Scholar
  14. 14.
    Wang J, Jiang H, Yuan Z, Cheng MM, Hu X, Zheng N (2017) Salient object detection: a discriminative regional feature integration approach. Int J Comput Vis 123(2):251–268Google Scholar
  15. 15.
    Yang CN, Chu YY (2011) A general (k, n) scalable secret image sharing scheme with the smooth scalability. J Syst Softw 84(10):1726–1733Google Scholar
  16. 16.
    Yang CN, Huang SM (2010) Constructions and properties of k out of n scalable secret image sharing. Opt Commun 283(9):1750–1762Google Scholar
  17. 17.
    Yang CN, Chen TS, Yu KH, Wang CC (2007) Improvements of image sharing with steganography and authentication. J Syst Softw 80(7):1070–1076Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Department of Information Engineering and Computer ScienceFeng-Chia UniversityTaichungTaiwan

Personalised recommendations