Skip to main content

Secret Sharing in Images Based on Error-Diffused Block Truncation Coding and Error Diffusion

  • Conference paper
  • First Online:
Digital-Forensics and Watermarking (IWDW 2013)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8389))

Included in the following conference series:

  • 1584 Accesses

Abstract

This paper presents a novel \((n,n)\)–threshold secret sharing in images by using error-diffused block truncation coding (EDBTC) and error diffusion. The proposed scheme is designed to share a secret binary image, such as text image or natural image, into \(n\) EDBTC-compressed images including meaningful contents. The compressed shadows generated by our proposed scheme have good visual quality and no pixel expansion, which are beneficial to reduce suspicions from the invaders. Each value in the secret image is reconstructed by using boolean XOR operations which are considered as light-weight devices, thus the recovering process is simple and fast. In addition, EDBTC-compressed images instead of the original format images are selected as shadows, which can improve the efficiency for data transmission and storing. The experimental results demonstrate that the proposed scheme offers a high secure and effective mechanism for secret image sharing.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Blakley, G.: Safeguarding cryptographic keys. In: Proceedings AFIPS 1979 National Computer Conference, vol. 48, pp. 313–317 (1979)

    Google Scholar 

  2. Shamir, A.: How to share a secret. Commun. ACM 22, 612–613 (1979)

    Article  MATH  MathSciNet  Google Scholar 

  3. Naor, M., Shamir, A.: Visual Cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)

    Chapter  Google Scholar 

  4. Ateniese, G., Blundo, C., Santis, A.D., Stinson, D.R.: Extended capabilities for visual cryptography. Theor. Comput. Sci. 250(1), 143–161 (2001)

    Article  MATH  Google Scholar 

  5. Liu, F., Wu, C.: Embedded extended visual cryptography schemes. IEEE Trans. Inf. Forensics Secur. 6(2), 307–322 (2011)

    Article  Google Scholar 

  6. Zhou, Z., Arce, G.R., Di Crescenzo, G.: Halftone visual cryptography. IEEE Trans. Image Process. 15(8), 2441–2453 (2006)

    Article  Google Scholar 

  7. Wang, Z., Arce, G.R., Di Crescenzo, G.: Halftone visual cryptography via error diffusion. IEEE Trans. Inf. Forensics Secur. 4(3), 383–396 (2009)

    Article  Google Scholar 

  8. Thien, C.C., Lin, J.C.: Secret image sharing. Comput. Graph. 26, 765–770 (2002)

    Article  Google Scholar 

  9. Lin, C.C., Tsai, W.H.: Secret image sharing with steganography and authentication. J. Syst. Softw. 73, 405–414 (2004)

    Article  Google Scholar 

  10. Wallace, G.K.: The JPEG still picture compression standard. Commun. ACM 34(4), 30–44 (1991)

    Article  Google Scholar 

  11. Gray, R.: Vector quantization. IEEE ASSP Magazine 1(2), 4–29 (1984)

    Article  Google Scholar 

  12. Delp, E., Mitchell, O.: Image compression using block truncation coding. IEEE Trans. Commun. 27, 1335–1342 (1979)

    Article  Google Scholar 

  13. Guo, J.M.: Improved block truncation coding using modified error diffusion. Electron. Lett. 44, 462–464 (2008)

    Article  Google Scholar 

  14. Guo, J.M., Liu, Y.F.: Improved block truncation coding using optimized dot diffusion. In: Proceedings of 2010 IEEE International Symposium on Circuits and Systems (ISCAS) 2010, pp. 2634–2637 (2010).

    Google Scholar 

  15. Kolpatzik, B.W., Bouman, C.A.: Optimized error diffusion for image display. J. Electron. Imaging 1, 277–292 (1992)

    Article  Google Scholar 

  16. Cai, K.Y., Wang, S.S., Shiu, P.F., Lin, C.C.: A verifiable secret sharing scheme based on ambtc. In: Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication 129, pp. 1–9 (2011)

    Google Scholar 

  17. Kim, C., Shin, D., Shin, D., Tso, R., Yang, C.-N.: A secret sharing scheme for EBTC using steganography. J. Intelligent. Manuf. 25(2), 241–249 (2014)

    Article  Google Scholar 

  18. Kim, C., Shin, D., Shin, D., Yang, C.-N.: A (2, 2) secret sharing scheme based on hamming code and AMBTC. In: Pan, J.-S., Chen, S.-M., Nguyen, N.T. (eds.) ACIIDS 2012, Part II. LNCS, vol. 7197, pp. 129–139. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  19. Floyd, R.W., Steinberg, L.: An adaptive algorithm for spatial grayscale. Proc. SID 17, 75–77 (1976)

    Google Scholar 

  20. Ulichney, R.: Digital Halftoning. MIT Press, Cambridge (1987)

    Google Scholar 

Download references

Acknowledgments

This work was in part supported by 973 Program (Grant No. 2011CB302400) and Natural Science Foundation of Guangdong Province, China (Grant No. S2013010013728).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wei Sun .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ou, D., Wu, X., Dai, L., Sun, W. (2014). Secret Sharing in Images Based on Error-Diffused Block Truncation Coding and Error Diffusion. In: Shi, Y., Kim, HJ., Pérez-González, F. (eds) Digital-Forensics and Watermarking. IWDW 2013. Lecture Notes in Computer Science(), vol 8389. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-43886-2_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-43886-2_9

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-43885-5

  • Online ISBN: 978-3-662-43886-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics