Abstract
In recent years, various secret sharing schemes for digital images have been developed in order to promote communication security. Previous methods in the literature have made efforts to achieve the merits properties for a good secret image sharing scheme such as implement (\(k,n)\) threshold, simple recovery, no pixel expansion, the generated shadow images are meaningful, the order of shadow images is alternative and lossless recovery of the secret image. To the best of our knowledge, no previous secret sharing scheme achieves all the above properties with good quality of meaningful shadow images. In this paper, we propose two different secret image sharing schemes, (\(n_1 ,n_1 )\) and (\(k,n_2 )\) thresholds, based on information hiding theory to improve the quality of meaningful shadow images with lower computation and good expansibility. In addition, the proposed schemes have the advantages of lossless and alternative order recovery and no pixel expansion. Comparisons with previous approaches show the performance of the proposed schemes.
Similar content being viewed by others
References
Naor, M., Shamir, A.: Visual cryptography. In: Advances in Cryptography, Eurocrypt’94, Italy, May 9–12, pp. 1–12 (1994)
Weir, J., Yan, W.Q.: A comprehensive study of visual cryptography. In: Transactions on DHMS V, LNCS 6010, pp. 70–105 (2010)
Wu, X.-T., Sun, W.: Image sharing scheme based on error diffusion. J. Comput. Appl. 31(1), 74–81 (2011)
Li, L., Yan, X., Wang, N., Abd El-Latif, A.A., Niu, X.: Meaningful image sharing threshold scheme based on error diffusion. Int. J. Digit. Content Technol. Appl. (JDCTA) 6(13), 275–284 (2012)
Feng, B.J., Wu, H.C., Tsai, C.S., et al.: A new multi-secret images sharing scheme using Lagrange’s interpolation [J]. J. Syst. Softw. 76(3), 327–339 (2005)
Thien, C.C., Lin, J.C.: Secret image sharing. Comput. Graph 26(5), 765–770 (2002)
Thien, C.C., Lin, J.C.: An image-sharing method with user-friendly shadow images. IEEE Trans. Circuits Syst. Video Technol. 13(12), 1161–1169 (2003)
Zhao, R., Zhao, J.J., Dai, F., Zhao, F.Q.: A new image secret sharing scheme to identify cheaters. Comput. Stand. Interfaces 31(1), 252–257 (2009)
Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Extended capabilities for visual cryptography [J]. Theor. Comput. Sci. 250(1/2), 143–161 (2001)
Yang, C.: New visual secret sharing schemes using probabilistic method [J]. Pattern Recognit. Lett. 25(4), 481–494 (2004)
Zhou, Z., Arce, G.R., Crescenzo, G.D.: Halftone visual cryptography. IEEE Trans. Image Process. 15(8), 2441–2453 (2006)
Myodo, E., Sakazawa, S., Takishima, Y.: Visual cryptography based on void and cluster halftoning technique. In: ICIP, Atlanta, GA, USA, Oct. 8-11, pp. 97–100 (2006)
Myodo, E., Takagi, K., Miyaji, S., Takishima, Y.: Halftone visual cryptography embedding a natural grayscale image based on error diffusion technique. In: ICME, Beijing, China, July 2–5, pp. 2114–2117 (2007)
Wang, Z., Arce, G.R.: Halftone visual cryptography through error diffusion. In: ICIP, Atlanta, GA, USA, Oct. 8-11, pp. 109–112 (2006)
Wang, D.-S., Zhang, L., Ning, M.A., et al.: Two secret sharing schemes based on Boolean operations [J]. Pattern Recognit. 40(10), 2776–2785 (2007)
Niu, X.-M., Lu, Z.-M.: Digital watermarking of still image with grag-scale digital water marks. IEEE Trans. Consumer Electron. 46(1), 137–145 (2000)
Wu, X., Ou, D., Liang, Q., Sun, W.: A user-friendly secret image sharing scheme with reversible steganography based on cellular automata. J. Syst. Softw. 85, 1852–1863 (2012)
Liu, M., Huang, W.-J., Niu, X.-M.: The hiding information technology in video. J. Test Meas. Technol. 18, 77–80 (2004)
Liu, Q., Sung, A.H.: Image complexity and feature mining for steganalysis of least significant bit matching steganography. Inf. Sci. 178, 21–36 (2008)
van Schyndel, R.G., Tirkel, A.Z., Osborne, C.F.: A digital watermark [J]. In: Proceeding ICIP [C], Austin, Texas, USA, November 13–16 (1994)
Sharp, T.: An implementation of key-based digital signal steganography [C]. In: Proceedings of the 4th International Workshop on Information Hiding, vol. 2137, pp. 13–26. IEEE Press, Pittsburgh (2001)
Guo, C., Chang, C.-C., Qin, C.: A multi-threshold secret image sharing scheme based on MSP. Pattern Recognit. Lett. 33, 1594–1600 (2012)
NIST/SEMATECH e-Handbook of Statistical Methods. http://www.itl.nist.gov/div898/handbook/eda/section3/eda3652.htm
Yan, X., Wang, S., Li, L., Wei, Z., Niu, X.: A new assessment measure of shadow image quality based on error diffusion techniques. J. Inf. Hiding Multimedia Signal Process. (JIHMSP) 4(2), 118–126 (2013)
Hsu, C.T., Wu, J.L.: Hidden digital watermarks in images. IEEE Trans. Image Process. 8(1), 58–68 (1999)
Chen, W.Y., Chen, C.H.: A robust watermarking scheme using phase shift keying with the combination of amplitude boost and low amplitude block selection. Pattern Recognit. 38(4), 587–598 (2005)
Kutter, M., Petiteolas, F.: A fair benchnlark for image watermarking systems[J]. SPIE Secur. Watermarking Multimedia Contents 3657, 226–239 (1999)
Acknowledgments
The authors wish to thank the anonymous reviewers for their suggestions to improve this paper. This work is supported by the National Natural Science Foundation of China (Grant Number: 61100187) and the Fundamental Research Funds for the Central Universities (Grant Number: HIT. NSRIF. 2010046, HIT. NSRIF. 2013061).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Yan, X., Wang, S., Abd El-Latif, A.A. et al. New approaches for efficient information hiding-based secret image sharing schemes. SIViP 9, 499–510 (2015). https://doi.org/10.1007/s11760-013-0465-y
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11760-013-0465-y