Skip to main content
Log in

Secret sharing: using meaningful image shadows based on Gray code

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Steganography, such as secret sharing, is an important technique to use for protecting transmitted confidential data from the attention of any adversaries. Gray code is a commonly encountered binary labeling that was proposed by Frank Gray of Bell Laboratories in 1940 to prevent errors when using pulse-code modulation to transmit signals. The main features of Gray code are its recursive construction method and the fact that any two adjacent codes change only one bit. According to our observations, the image pixel correction based on these features is suitable for application secret sharing without making significant changes to the pixel value. We designed a reversible secret sharing method using meaningful image shadows based on Gray code. Our design applies absolute moment block truncation coding (AMBTC) compression to reduce the transmission bit rate. The experimental results show that our scheme can achieve the adequate visual quality of shadow images with lower communication overhead, thus proving it practical for numerous applications.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

References

  1. Aho AV, Hopcroft JE, Ullman JD (1974) The design and analysis of computer algorithms. Addison-Wesley, MA

    MATH  Google Scholar 

  2. Blakley GR (1979) Safeguarding cryptographic keys. Proceedings of the National Computer Conference, New York, NY, Vol. 48, pp. 313–317

  3. Cai KY, Wang SS, Shiu PF, Lin CC (2011) A verifiable secret sharing scheme based on AMBTC. Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, Seoul, Korea, Article No. 129

  4. Chang CC, Lin CC, Le THN (2008) A new probabilistic visual secret sharing scheme for color images. Proceedings of International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Harbin, China, pp. 1305–1308

  5. Chang CC, Sun CY (2014) Polynomial-based secret sharing scheme based on the absolute moment block truncation coding technique. Proceedings of 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Kitakyushu, Japan, pp. 485–488

  6. Delp EJ, Mitchell OR (1979) Image compression using block truncation coding. IEEE Trans Commun 27:1335–1342

    Article  Google Scholar 

  7. Gray F (1953) Pulse code communications. US Patent, 2632058

  8. Huynh NT, Bharanitharan K, Chang CC (2015) Quadri-directional searching algorithm for secret image sharing using meaningful shadows. J Vis Commun Image Represent 28:105–112

    Article  Google Scholar 

  9. Le THN, Lin CC, Chang CC, Le HB (2011) A high quality and small shadow size visual secret sharing scheme based on hybrid strategy for grayscale images. Digit Signal Process 21:734–745

    Article  Google Scholar 

  10. Lema MD, Mitchell OR (1984) Absolute moment block truncation coding and its application to color images. IEEE Trans Commun 32:1148–1157

    Article  Google Scholar 

  11. Lin PY, Chan CS (2010) Invertible secret image sharing with steganography. Pattern Recogn Lett 31:1887–1893

    Article  Google Scholar 

  12. Lin CC, Tsai WH (2004) Secret image sharing with steganography and authentication. J Syst Softw 73:405–414

    Article  Google Scholar 

  13. Lin CC, Zhang WX (2008) Secret sharing scheme with non-expansible shadow size for color images. Proceedings of the 8th International Conference on Intelligent Systems Design and Applications, Kaohsiung, Taiwan, Vol. 3, pp. 302–307

  14. Naor M, Shamir A (1994) Visual cryptography. Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques (Advances in Cryptology - Eurocrypt’94), Perugia, Italy, LNCS 950, pp. 1–12

  15. Ou D, Sun W (2014) Reversible AMBTC-based secret sharing scheme with abilities of two decryptions. J Vis Commun Image Represent 25:1222–1239

    Article  Google Scholar 

  16. Ou D, Ye L, Sun W (2015) User-friendly secret image sharing scheme with verification ability based on block truncation coding and error diffusion. J Vis Commun Image Represent 29:46–60

    Article  Google Scholar 

  17. Shamir A (1979) How to share a secret. Commun ACM 22:612–613

    Article  MathSciNet  MATH  Google Scholar 

  18. Thien CC, Lin JC (2003) An image-sharing method with user-friendly shadow images. IEEE Trans Circuits Syst Video Technol 13:1161–1169

    Article  Google Scholar 

  19. Ulutas G, Ulutas M, Nabiyev VV (2013) Secret image sharing scheme with adaptive authentication strength. Pattern Recogn Lett 34:283–291

    Article  MATH  Google Scholar 

  20. Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13:600–612

    Article  Google Scholar 

  21. Wang CY, Shiao NS, Chen HH, Tsai CS (2010) Enhance the visual quality of shares and recovered secret on meaningful shares visual secret sharing. Proceedings of the 4th International Conference on Uniquitous Information Management and Communication, Suwon, Korea, Article No. 15

  22. Wu X, Ou D, Liang Q, Sun W (2012) A user-friendly secret image sharing scheme with reversible steganography based on cellular automata. J Syst Softw 85:1852–1863

    Article  Google Scholar 

  23. Yang CN, Chen TS, Yu KH, Wang CC (2007) Improvements of image sharing with steganography and authentication. J Syst Softw 80:1070–1076

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ting-Fang Cheng.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Cheng, TF., Chang, CC. & Liu, L. Secret sharing: using meaningful image shadows based on Gray code. Multimed Tools Appl 76, 9337–9362 (2017). https://doi.org/10.1007/s11042-016-3535-7

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-016-3535-7

Keywords

Navigation