Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

access icon free Distortion-free secret image sharing method with two meaningful shadows

In this study, the authors propose a novel (2, 2) secret image sharing scheme in which a control parameter ω is used to change the payload easily. Since the modification of the original cover pixel values can be limited within a small range according to the value of ω, the shadow images can achieve excellent visual quality. In the extracting process, the secret image and the cover image can be reconstructed correctly. Experimental results showed that the authors’ proposed scheme can enhance the embedding rate significantly, up to 3 bpp if ω is set to 6. In addition, the peak signal-to-noise ratio values of the shadow images are still satisfactory when the embedding rate approaches a very high value. Comparisons demonstrated that their proposed scheme outperforms other schemes that have been developed recently in terms of the embedding rate and the visual quality.

References

    1. 1)
      • 13. Chang, C.C., Kieu, T.D., Chou, Y.C.: ‘Reversible data hiding scheme using two steganographic images’. Proc. of IEEE TENCON 2007, Taipei, Taiwan, October 2007, pp. 14.
    2. 2)
    3. 3)
    4. 4)
      • 12. Chang, C.C., Lin, C.C., Huynh, N.T.: ‘A visual secret sharing scheme with verification mechanism’, Int. J. Comput. Sci. Eng. Sys., article in press.
    5. 5)
    6. 6)
    7. 7)
    8. 8)
    9. 9)
      • 14. Lee, C.F., Wang, K.H., Chang, C.C., et al: ‘A reversible data hiding scheme based on dual steganographic images’. Proc. Third Int. Conf. on Ubiquitous Information Management and Communication, Suwon, Korea, June 2009, pp. 228237.
    10. 10)
    11. 11)
    12. 12)
    13. 13)
    14. 14)
    15. 15)
      • 6. Naor, M., Shamir, A.: ‘Visual cryptography’. Proc. of Advances in Cryptology-Eurocrypt'94, Perugia, Italy, May 1994, pp. 112.
    16. 16)
    17. 17)
      • 16. Chang, C.C., Lin, C.C., Huynh, N.T.: ‘Safeguarding visual information using (t, n) verifiable secret shares’, J. Comput., 2011, 22, (2), pp. 7288.
    18. 18)
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-ipr.2015.0568
Loading

Related content

content/journals/10.1049/iet-ipr.2015.0568
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address