A sudoku-based secret image sharing scheme with reversibility

被引:45
|
作者
Chang C.-C. [1 ]
Lin P.-Y. [2 ]
Wang Z.H. [3 ]
Li M.C. [3 ]
机构
[1] Department of Information Engineering and Computer Science, Feng Chia University, Seatwen, Taichung 40724
[2] Department of Information Communication, Yuan Ze University, Chung-Li, 32003
[3] School of Software, Dalian University of Technology, Dalian, Liaoning
来源
Journal of Communications | 2010年 / 5卷 / 01期
关键词
Puzzle; Reversible; Secret sharing; Steganography; Sudoku;
D O I
10.4304/jcm.5.1.5-12
中图分类号
学科分类号
摘要
A common drawback of the image sharing with steganography approaches is that the revealed secret image is distorted due to the truncation of the grayscale secret image. To lossless reveal the secret image in the (t, n)-threshold, we provide a novel sharing scheme in this article. Moreover, the original host image can be recovered by the embedded shadow images. To accomplish the above purposes, the proposed scheme derives the secret shadows and generates the meaningful shadow images by adopting the sudoku. In the new scheme, the sudoku grid is setting to 16×16 and divided into sixteen 4×4 blocks. Thus, we can embed 4×(t-1) secret bits into each pixel pair of the host image. Besides, the embeddable secret capacity can be improved according to the threshold t in the (t, n)-threshold sharing system. The experiments show that the shadows can be successfully camouflaged in the host image with satisfactory quality. The distortion of the embedded host pixels is limited within range [0, 3]. Moreover, the proposed scheme provides a large capacity for embedded secret data. © 2010 Academy Publisher.
引用
收藏
页码:5 / 12
页数:7
相关论文
共 50 条
  • [21] AN IMPROVED SCHEME FOR SECRET IMAGE SHARING
    Alharthi, Saeed
    Atrey, Pradeep K.
    2010 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO (ICME 2010), 2010, : 1661 - 1666
  • [22] Nonlinear Secret Image Sharing Scheme
    Shin, Sang-Ho
    Lee, Gil-Je
    Yoo, Kee-Young
    SCIENTIFIC WORLD JOURNAL, 2014,
  • [23] A secret sharing scheme for image encryption
    Lukac, R
    Plataniotis, KN
    PROCEEDINGS ELMAR-2004: 46TH INTERNATIONAL SYMPOSIUM ELECTRONICS IN MARINE, 2004, : 549 - 554
  • [24] Essential Secret Image Sharing Scheme
    Chen, Chien-chang
    PROCEEDINGS OF 2010 CROSS-STRAIT CONFERENCE ON INFORMATION SCIENCE AND TECHNOLOGY, 2010, : 471 - 474
  • [25] An Image Watermarking Scheme using Threshold Based Secret Sharing
    Latha, S. Bhargavi
    Reddy, D. Venkata
    Damodaram, A.
    2017 7TH IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2017, : 619 - 623
  • [26] Progressive Secret Image Sharing Scheme Based on Semantic Segmentation
    Zhang, Lina
    Zheng, Xiangqin
    Liu, Ying
    IEEE ACCESS, 2020, 8 : 173289 - 173297
  • [27] Pixel Position Based Efficient Image Secret Sharing Scheme
    Sagar, P. Reshma
    Chakra, J. Pruthvi Sri
    Purushothama, B. R.
    RECENT FINDINGS IN INTELLIGENT COMPUTING TECHNIQUES, VOL 3, 2018, 709 : 527 - 533
  • [28] Enhanced Modulo Based Multi Secret Image Sharing Scheme
    Deshmukh, Maroti
    Nain, Neeta
    Ahmed, Mushtaq
    INFORMATION SYSTEMS SECURITY, 2016, 10063 : 212 - 224
  • [29] A New Secret Image Sharing Scheme Based on Compressed Sensing
    Yang, Fuqiang
    Dang, Na
    Zhang, Junxing
    2017 2ND IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND BIG DATA ANALYSIS (ICCCBDA 2017), 2017, : 321 - 327
  • [30] A Randomized Kernel-Based Secret Image Sharing Scheme
    Tej, Akella Ravi
    Raviteja, Rekula
    Pankajakshan, Vinod
    2018 10TH IEEE INTERNATIONAL WORKSHOP ON INFORMATION FORENSICS AND SECURITY (WIFS), 2018,