Abstract
This paper presents a novel \((n,n)\)–threshold secret sharing in images by using error-diffused block truncation coding (EDBTC) and error diffusion. The proposed scheme is designed to share a secret binary image, such as text image or natural image, into \(n\) EDBTC-compressed images including meaningful contents. The compressed shadows generated by our proposed scheme have good visual quality and no pixel expansion, which are beneficial to reduce suspicions from the invaders. Each value in the secret image is reconstructed by using boolean XOR operations which are considered as light-weight devices, thus the recovering process is simple and fast. In addition, EDBTC-compressed images instead of the original format images are selected as shadows, which can improve the efficiency for data transmission and storing. The experimental results demonstrate that the proposed scheme offers a high secure and effective mechanism for secret image sharing.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Blakley, G.: Safeguarding cryptographic keys. In: Proceedings AFIPS 1979 National Computer Conference, vol. 48, pp. 313–317 (1979)
Shamir, A.: How to share a secret. Commun. ACM 22, 612–613 (1979)
Naor, M., Shamir, A.: Visual Cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)
Ateniese, G., Blundo, C., Santis, A.D., Stinson, D.R.: Extended capabilities for visual cryptography. Theor. Comput. Sci. 250(1), 143–161 (2001)
Liu, F., Wu, C.: Embedded extended visual cryptography schemes. IEEE Trans. Inf. Forensics Secur. 6(2), 307–322 (2011)
Zhou, Z., Arce, G.R., Di Crescenzo, G.: Halftone visual cryptography. IEEE Trans. Image Process. 15(8), 2441–2453 (2006)
Wang, Z., Arce, G.R., Di Crescenzo, G.: Halftone visual cryptography via error diffusion. IEEE Trans. Inf. Forensics Secur. 4(3), 383–396 (2009)
Thien, C.C., Lin, J.C.: Secret image sharing. Comput. Graph. 26, 765–770 (2002)
Lin, C.C., Tsai, W.H.: Secret image sharing with steganography and authentication. J. Syst. Softw. 73, 405–414 (2004)
Wallace, G.K.: The JPEG still picture compression standard. Commun. ACM 34(4), 30–44 (1991)
Gray, R.: Vector quantization. IEEE ASSP Magazine 1(2), 4–29 (1984)
Delp, E., Mitchell, O.: Image compression using block truncation coding. IEEE Trans. Commun. 27, 1335–1342 (1979)
Guo, J.M.: Improved block truncation coding using modified error diffusion. Electron. Lett. 44, 462–464 (2008)
Guo, J.M., Liu, Y.F.: Improved block truncation coding using optimized dot diffusion. In: Proceedings of 2010 IEEE International Symposium on Circuits and Systems (ISCAS) 2010, pp. 2634–2637 (2010).
Kolpatzik, B.W., Bouman, C.A.: Optimized error diffusion for image display. J. Electron. Imaging 1, 277–292 (1992)
Cai, K.Y., Wang, S.S., Shiu, P.F., Lin, C.C.: A verifiable secret sharing scheme based on ambtc. In: Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication 129, pp. 1–9 (2011)
Kim, C., Shin, D., Shin, D., Tso, R., Yang, C.-N.: A secret sharing scheme for EBTC using steganography. J. Intelligent. Manuf. 25(2), 241–249 (2014)
Kim, C., Shin, D., Shin, D., Yang, C.-N.: A (2, 2) secret sharing scheme based on hamming code and AMBTC. In: Pan, J.-S., Chen, S.-M., Nguyen, N.T. (eds.) ACIIDS 2012, Part II. LNCS, vol. 7197, pp. 129–139. Springer, Heidelberg (2012)
Floyd, R.W., Steinberg, L.: An adaptive algorithm for spatial grayscale. Proc. SID 17, 75–77 (1976)
Ulichney, R.: Digital Halftoning. MIT Press, Cambridge (1987)
Acknowledgments
This work was in part supported by 973 Program (Grant No. 2011CB302400) and Natural Science Foundation of Guangdong Province, China (Grant No. S2013010013728).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ou, D., Wu, X., Dai, L., Sun, W. (2014). Secret Sharing in Images Based on Error-Diffused Block Truncation Coding and Error Diffusion. In: Shi, Y., Kim, HJ., Pérez-González, F. (eds) Digital-Forensics and Watermarking. IWDW 2013. Lecture Notes in Computer Science(), vol 8389. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-43886-2_9
Download citation
DOI: https://doi.org/10.1007/978-3-662-43886-2_9
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-43885-5
Online ISBN: 978-3-662-43886-2
eBook Packages: Computer ScienceComputer Science (R0)