A sudoku-based secret image sharing scheme with reversibility

被引:45
|
作者
Chang C.-C. [1 ]
Lin P.-Y. [2 ]
Wang Z.H. [3 ]
Li M.C. [3 ]
机构
[1] Department of Information Engineering and Computer Science, Feng Chia University, Seatwen, Taichung 40724
[2] Department of Information Communication, Yuan Ze University, Chung-Li, 32003
[3] School of Software, Dalian University of Technology, Dalian, Liaoning
来源
Journal of Communications | 2010年 / 5卷 / 01期
关键词
Puzzle; Reversible; Secret sharing; Steganography; Sudoku;
D O I
10.4304/jcm.5.1.5-12
中图分类号
学科分类号
摘要
A common drawback of the image sharing with steganography approaches is that the revealed secret image is distorted due to the truncation of the grayscale secret image. To lossless reveal the secret image in the (t, n)-threshold, we provide a novel sharing scheme in this article. Moreover, the original host image can be recovered by the embedded shadow images. To accomplish the above purposes, the proposed scheme derives the secret shadows and generates the meaningful shadow images by adopting the sudoku. In the new scheme, the sudoku grid is setting to 16×16 and divided into sixteen 4×4 blocks. Thus, we can embed 4×(t-1) secret bits into each pixel pair of the host image. Besides, the embeddable secret capacity can be improved according to the threshold t in the (t, n)-threshold sharing system. The experiments show that the shadows can be successfully camouflaged in the host image with satisfactory quality. The distortion of the embedded host pixels is limited within range [0, 3]. Moreover, the proposed scheme provides a large capacity for embedded secret data. © 2010 Academy Publisher.
引用
收藏
页码:5 / 12
页数:7
相关论文
共 50 条
  • [1] A Novel(n,n)Secret Image Sharing Scheme Based on Sudoku
    Zhi-Hui Wang
    Cheng Guo
    Chin-Chen Chang
    Journal of Electronic Science and Technology, 2013, 11 (01) : 44 - 50
  • [2] Sudoku-based secret sharing approach with cheater prevention using QR code
    Huang, Peng-Cheng
    Chang, Chin-Chen
    Li, Yung-Hui
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (19) : 25275 - 25294
  • [3] Sudoku-based secret sharing approach with cheater prevention using QR code
    Peng-Cheng Huang
    Chin-Chen Chang
    Yung-Hui Li
    Multimedia Tools and Applications, 2018, 77 : 25275 - 25294
  • [4] Verifiable (2, n) Image Secret Sharing Scheme Using Sudoku Matrix
    Chen, Yi-Hui
    Lee, Jia-Ye
    Chiang, Min-Hsien
    Chen, Shih-Hsin
    SYMMETRY-BASEL, 2022, 14 (07):
  • [5] A Compact Secret Image Sharing Scheme Based on Flexible Secret Matrix Sharing Scheme
    Wang, Lingfu
    Wang, Jing
    Zhang, Mingwu
    Huang, Weijia
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2021, PT III, 2022, 13157 : 411 - 431
  • [6] Approach to secret content tagging on color images with a Sudoku-based scrambling principle
    Krishnan, Raghupathy Bala
    Kumar, Namachivayam Rajesh
    Manikandan, Ganesan
    Manikandan, Ramachandran
    JOURNAL OF ELECTRONIC IMAGING, 2023, 32 (04)
  • [7] An improved Sudoku-based data hiding scheme using greedy method
    Chang, Chin-Chen
    Su, Guo-Dong
    Lin, Chia-Chen
    INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2020, 23 (01) : 10 - 21
  • [8] Construction of Sudoku designs and Sudoku-based uniform designs
    Li, Hongyi
    Li, Qisheng
    Ou, Zujun
    STATISTICS & PROBABILITY LETTERS, 2014, 89 : 51 - 57
  • [9] Searchable Encryption of Image based on Secret Sharing Scheme
    Kamal, Ahmad Akmal Aminuddin Mohd
    Iwamura, Keiichi
    Kang, Hyunho
    2017 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC 2017), 2017, : 1495 - 1503
  • [10] Secret image sharing scheme based solely on ADDITION
    Tsai, M. -H.
    Chen, C. -K.
    Chen, Y. -F.
    Chan, Y. -K.
    Chen, K. -C.
    Chu, Y. -P.
    IMAGING SCIENCE JOURNAL, 2008, 56 (04): : 183 - 188