Improved Data Hiding Technique for Shares in Extended Visual Secret Sharing Schemes

  • Rabia Sirhindi
  • Saeed Murtaza
  • Mehreen Afzal
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5308)


An improved data hiding technique is proposed in this paper to hide the shares of a secret image in an Extended Visual Secret Sharing (EVSS) scheme. It is based on Least Significant Bit (LSB) substitution with a little modification that the embedding capacity varies with each pixel of the host image and depends upon the surrounding pixels’ color difference. This not only increases the embedding capacity of the host image as compared to simple LSB substitution but also yields high Peak Signal to Noise Ratio (PSNR) values for host and stego images. Moreover, results indicate that the proposed data hiding process improves the security of camouflage images in EVSS schemes since shares are completely hidden in the cover images without any trace of their presence, unlike most of the previous share hiding approaches, thus preventing shares from alteration during transmission.


Visual cryptography extended visual secret sharing data hiding LSB encoding adaptive LSB encoding 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Naor, M., Shamir, A.: Visual Cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)CrossRefGoogle Scholar
  2. 2.
    Ateniese, G., Blundo, C., Santis, A.D., Stinson, D.: Extended Schemes for Visual Cryptography. Theoretical Computer Science 250(1-2), 143–161 (2001)MathSciNetCrossRefzbMATHGoogle Scholar
  3. 3.
    Verheul, E., Tilborg, H.V.: Constructions and Properties of k out of n Visual Secret Sharing Schemes. Designs, Codes and Cryptography 11(2), 179–196 (1997)MathSciNetCrossRefzbMATHGoogle Scholar
  4. 4.
    Rijmen, V., Preneel, B.: Efficient Color Visual Encryption for Shared Colors of Benetton. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070. Springer, Heidelberg (1996)Google Scholar
  5. 5.
    Lukac, R., Plataniotis, K.N.: Color Image Secret Sharing. IEE Electronic Letters 40(9), 529–530 (2004)CrossRefGoogle Scholar
  6. 6.
    Chang, C., Tsai, C., Chen, T.: A New Scheme for Sharing Secret Color Images in Computer Network. In: Proc. International Conference on Parallel and Distributed Systems, pp. 21–27 (2000)Google Scholar
  7. 7.
    Chang, C.C., Yu, T.X.: Sharing a Secret Gray Image in Multiple Images. In: Proc. International Symposium on Cyber Worlds: Theories and Practice, pp. 230–237 (2002)Google Scholar
  8. 8.
    Sirhindi, R., Afzal, M., Murtaza, S.: An Extended Secret Sharing Scheme for Color Images with Fixed Pixel Expansion. In: Proc. International Conference on Global e-Security. CCIS, vol. 12, pp. 81–89. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  9. 9.
    Fischer, I., Herfet, T.: Visually Authenticated Communication. In: International Symposium on System and Information Security, pp. 471–474 (2006)Google Scholar
  10. 10.
    Fischer, I., Herfet, T.: Visual Document Authentication using Watermarks and Text Transformations. Journal of Computers 2(5), 44–53 (2007)CrossRefGoogle Scholar
  11. 11.
    Chan, C.K., Cheng, L.M.: Hiding data in images by simple LSB substitution. Pattern Recognition 37, 469–474 (2004)CrossRefzbMATHGoogle Scholar
  12. 12.
    Li, S.L., Leung, K.C., Chan, C.K.: Data Hiding in Images using Adaptive LSB Substitution based on Pixel Value Differencing. In: Proc: IEEE First International Conference on Innovative Computing, Information and Control (2006)Google Scholar
  13. 13.
    Gonzalez, R.C., Woods, R.: Digital Image Fundamentals. Addison-Wesley, Reading (1992)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2008

Authors and Affiliations

  • Rabia Sirhindi
    • 1
  • Saeed Murtaza
    • 1
  • Mehreen Afzal
    • 1
  1. 1.College of SignalsNational University of Sciences and TechnologyPakistan

Personalised recommendations