Multimedia Tools and Applications

, Volume 77, Issue 10, pp 12111–12138 | Cite as

Visual secret sharing in halftone images by multi-scale error diffusion

  • Po-Chyi Su
  • Tzung-Fu Tsai
  • Yu-Chien Chien


A secret sharing scheme in halftone images is proposed in this research. Given a secret halftone image, several gray-level images with the same resolution will be chosen from the database to collaboratively carry the secret information. The selected images will be transferred to halftone ones using Multi-scale Error Diffusion (MED), with the constraint imposed by the pixels of halftone secret image. The modified MED ensures that the resultant pixels of host halftone images should satisfy the required conditions such that collecting all the processed halftone images can successfully reveal the secret one. In addition to facilitating the perfect extraction of hidden information, maintaining the quality of all the halftone images in this secret sharing scenario is the other major objective, which is achieved by the usage of MED and selection of suitable host images. The experimental results demonstrate the satisfactory performance of the proposed method.


Secret sharing Halftone Multi-scale error diffusion Information hiding 


  1. 1.
    Adi S (1979) How to share a secret. Commun ACM 22(11):612–613MathSciNetCrossRefzbMATHGoogle Scholar
  2. 2.
    Analoui M, Rogowitz BE, Allebach JP (1992) Model based halftoning using direct binary search. In: Human vision, visual processing, and digital display III, vol 1666, pp 96–108Google Scholar
  3. 3.
    Ateniese G, Blundo C, De Santis A, Stinson DR (2001) Extended capabilities for visual cryptography. Theor Comput Sci 250(1-2):134–161MathSciNetCrossRefzbMATHGoogle Scholar
  4. 4.
    Beimel A (2011) Secret-sharing schemes: A survey. In: Proceedings of the third international conference on coding and cryptology, pp 11–46Google Scholar
  5. 5.
    Blakley GR (1979) Safeguarding cryptographic keys. In: Proceedings of the national computer conference, vol 48, pp 313–317Google Scholar
  6. 6.
    Cimato S, Yang JCN, Wu C-C (2014) Visual cryptography based watermarking. Transactions on Data Hiding and Multimedia Security IX. Lect Notes Comput Sci 8363:91–109CrossRefGoogle Scholar
  7. 7.
    (1994). Corel Stock Photo Library. Corel CorporationGoogle Scholar
  8. 8.
    Fung YH, Chan YH (2006) Embedding halftones of different resolutions in a full-scale halftone. IEEE Signal Process Lett 13(3):153–156CrossRefGoogle Scholar
  9. 9.
    Furht B (2008) Encyclopedia of multimedia springerGoogle Scholar
  10. 10.
    Guo JM, Tsai JJ (2009) Data hiding in halftone images using adaptive noise-balanced error diffusion and quality-noise look up table. In: IEEE International symposium on circuits and systems, vol 1, pp 201–204Google Scholar
  11. 11.
    Guo J-M, Liu Y-F (2012) High capacity data hiding for error-diffused block truncation coding. IEEE Trans on Image Processing 21(12):4808–4818MathSciNetCrossRefzbMATHGoogle Scholar
  12. 12.
    Guo JM, Huang JH (2010) Data hiding in halftone images with secret-shared dot diffusion. In: IEEE International symposium on circuits and systems, pp 1133–1136Google Scholar
  13. 13.
    Guo J-M, Liu Y-F (2010) Hiding multitone watermarks in halftone images. IEEE Multimed 17(1):34–43CrossRefGoogle Scholar
  14. 14.
    Guo J-M, Su C-C, Liu Y-F, Lee H, Lee J-D (2012) Oriented modulation for watermarking in direct binary search halftone images. IEEE Trans Image Process 21(9):4117–4127MathSciNetCrossRefzbMATHGoogle Scholar
  15. 15.
    Jarvis JF, Judice CN, Ninke WH (1976) A survey of techniques for the display of continuous-tone pictures on bilevel displays. Comput Graphics Image Process 5(1):13–40CrossRefGoogle Scholar
  16. 16.
    Katsavounidis I, Jay Kuo C-C (1997) A multiscale error diffusion technique for digital halftoning. IEEE Trans Image Process 6(3):483–490CrossRefGoogle Scholar
  17. 17.
    Knuth DE (1987) Digital halftones by dot diffusion. ACM Trans Graph 6(4):245–273MathSciNetCrossRefzbMATHGoogle Scholar
  18. 18.
    Myodo E, Sakazawa S, Takishima Y (2006) Visual cryptography based on void-and-cluster halftoning technique. In: IEEE International conference on image processing, pp 97–100Google Scholar
  19. 19.
    Myodo E, Takagi K, Miyaji S, Takishima Y (2007) Halftone visual cryptography embedding a natural grayscale image based on error diffusion technique. In: IEEE International conference on image processing, pp 2114–2117Google Scholar
  20. 20.
    Naor M, Shamir A (1995) Visual cryptography. In: Advances in cryptograhy: EUROCRYPT, LNCS, vol 950, pp 1–12Google Scholar
  21. 21.
    Pan J-S, Luo H, Lu Z-M (2006) A lossless watermarking scheme for halftone image authentication. Int J Comput Sci Netw Secur 6(2):147–151Google Scholar
  22. 22.
    Pang W-M, Yingge Q, Wong T-T, Cohen-Or D, Heng P-A (2008) Structure-aware halftoning. ACM Trans Graph 27(3):89:1–89:8MathSciNetCrossRefGoogle Scholar
  23. 23.
    Son C-H, Choo H (2014) Watermark detection from clustered halftone dots via learned dictionary. Signal Process 102(12):77–84CrossRefGoogle Scholar
  24. 24.
    Son C-H, Choo H (2014) Color recovery of black-and-white halftoned images via categorized color-embedding look-up tables. Digital Signal Process 28:93–105CrossRefGoogle Scholar
  25. 25.
    Son C-H, Lee K, Choo H (2015) Inverse color to black-and-white halftone conversion via dictionary learning and color mapping. Inf Sci 299:1–19MathSciNetCrossRefGoogle Scholar
  26. 26.
    Ulichney R (1987) Digital halftoning. MIT Press, CambridgeGoogle Scholar
  27. 27.
    Ulichney RA (1993) The void-and-cluster method for dither array generation. In: Proc. SPIE, Human Vis. Visual Process., Digit. Displays IV, vol 1913, pp 332–343Google Scholar
  28. 28.
    Wang Z, Arce GR (2006) Halftone visual cryptography through error diffusion. In: IEEE International conference on image processing, pp 109–112Google Scholar
  29. 29.
    Wang Z, Arce GR (2010) Halftone visual cryptography by iterative halftoning. In: IEEE Int. Conf. acoustics, Speech and Signal Processing, pp 1822–1825Google Scholar
  30. 30.
    Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: From error visibility to structural similarity. IEEE Trans on Image Process 13(4):600–612CrossRefGoogle Scholar
  31. 31.
    Weir J, Yan W (2010) A comprehensive study of visual cryptography. Transactions on Data Hiding and Multimedia Security V. Lect Notes Comput Sci 6010:70–105CrossRefGoogle Scholar
  32. 32.
    Wong PW (1996) Adaptive error diffusion and its application in multiresolution rendering. IEEE Trans on Image Process 5(7):1184–1196CrossRefGoogle Scholar
  33. 33.
    Wong PW (2003) Multi-resolution binary image embedding. In: Proc. SPIE security and watermarking of multimedia contents v, vol 5020, pp 423–429Google Scholar
  34. 34.
    Zhou Z, Arce GR, Di Crescenzo G (2006) Halftone visual cryptography. IEEE Trans on Image Process 15(8):2441–2453CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2017

Authors and Affiliations

  1. 1.Department of Computer Science and Information EngineeringNational Central UniversityTaoyuanTaiwan

Personalised recommendations