A sudoku-based secret image sharing scheme with reversibility

被引:45
|
作者
Chang C.-C. [1 ]
Lin P.-Y. [2 ]
Wang Z.H. [3 ]
Li M.C. [3 ]
机构
[1] Department of Information Engineering and Computer Science, Feng Chia University, Seatwen, Taichung 40724
[2] Department of Information Communication, Yuan Ze University, Chung-Li, 32003
[3] School of Software, Dalian University of Technology, Dalian, Liaoning
来源
Journal of Communications | 2010年 / 5卷 / 01期
关键词
Puzzle; Reversible; Secret sharing; Steganography; Sudoku;
D O I
10.4304/jcm.5.1.5-12
中图分类号
学科分类号
摘要
A common drawback of the image sharing with steganography approaches is that the revealed secret image is distorted due to the truncation of the grayscale secret image. To lossless reveal the secret image in the (t, n)-threshold, we provide a novel sharing scheme in this article. Moreover, the original host image can be recovered by the embedded shadow images. To accomplish the above purposes, the proposed scheme derives the secret shadows and generates the meaningful shadow images by adopting the sudoku. In the new scheme, the sudoku grid is setting to 16×16 and divided into sixteen 4×4 blocks. Thus, we can embed 4×(t-1) secret bits into each pixel pair of the host image. Besides, the embeddable secret capacity can be improved according to the threshold t in the (t, n)-threshold sharing system. The experiments show that the shadows can be successfully camouflaged in the host image with satisfactory quality. The distortion of the embedded host pixels is limited within range [0, 3]. Moreover, the proposed scheme provides a large capacity for embedded secret data. © 2010 Academy Publisher.
引用
收藏
页码:5 / 12
页数:7
相关论文
共 50 条
  • [31] An Implementation of Image Secret Sharing Scheme Based on Matrix Operations
    Ren, Zihan
    Li, Peng
    Wang, Xin
    MATHEMATICS, 2022, 10 (06)
  • [32] A novel proactive secret image sharing scheme based on LISS
    Guo, Cheng
    Zhang, Huan
    Fu, Zhangjie
    Feng, Bin
    Li, Mingchu
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (15) : 19569 - 19590
  • [33] Enhanced Matrix-Based Secret Image Sharing Scheme
    Yang, Ching-Nung
    Wu, Chih-Cheng
    Lin, Yi-Chin
    Kim, Cheonshik
    IEEE SIGNAL PROCESSING LETTERS, 2012, 19 (12) : 789 - 792
  • [34] A secret image sharing scheme based on Vector Quantization mechanism
    Chang, Chin-Chen
    Chan, Chi-Shiang
    Fan, Yi-Hsuan
    EMBEDDED AND UBIQUITOUS COMPUTING, PROCEEDINGS, 2006, 4096 : 469 - 478
  • [35] XOR Based Secret Image Sharing Scheme with Security Improvement
    Ratnam, Javvaji V. K.
    Reddy, T. Sreenivasulu
    Reddy, P. Ramana
    HELIX, 2018, 8 (05): : 3588 - 3592
  • [36] The Secret Image Sharing Scheme Based On Improved LSB Algorithm
    Li, Xiaohong
    Chen, Yuan
    Wang, Feng
    Tao Qinqin
    2014 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT, 2014,
  • [37] A Lossless Secret Image Sharing Scheme based on Bit Sharing Visual Cryptography
    Rao, Kanusu Srinivasa
    Sridhar, Mandapati
    2018 INTERNATIONAL CONFERENCE ON RECENT INNOVATIONS IN ELECTRICAL, ELECTRONICS & COMMUNICATION ENGINEERING (ICRIEECE 2018), 2018, : 1417 - 1420
  • [38] A Verifiable Secret Image Sharing Scheme Based on Compressive Sensing
    LI Xinyan
    XIAO Di
    MOU Huajian
    ZHANG Rui
    WuhanUniversityJournalofNaturalSciences, 2018, 23 (03) : 219 - 224
  • [39] Invertible secret image sharing scheme based on improved FEMD
    Ma L.
    Wang J.
    Tongxin Xuebao/Journal on Communications, 2019, 40 (07): : 48 - 56
  • [40] Construction of Sudoku-based uniform designs with mixed levels
    Li, Hongyi
    Chatterjee, Kashinath
    Li, Bo
    Qin, Hong
    STATISTICS & PROBABILITY LETTERS, 2016, 114 : 111 - 118