Meaningful Secret Image Sharing Scheme with High Visual Quality Based on Natural Steganography

The (k,n)-threshold Secret Image Sharing scheme (SISS) is a solution to image protection. However, the shadow images generated by traditional SISS are noise-like, easily arousing deep suspicions, so that it is significant to generate meaningful shadow images. One solution is to embed the shadow images into meaningful natural images and visual quality should be considered first. Limited by embedding rate, the existing schemes have made concessions in size and visual quality of shadow images, and few of them take the ability of anti-steganalysis into consideration. In this paper, a meaningful SISS that is based on Natural Steganography (MSISS-NS) is proposed. The secret image is firstly divided into n small-sized shadow images with Chinese Reminder Theorem, which are then embedded into RAW images to simulate the images with higher ISO parameters with NS. In MSISS-NS, the visual quality of shadow images is improved significantly. Additionally, as the payload of cover images with NS is larger than the size of small-sized shadow images, the scheme performs well not only in visual camouflage, but also in other aspects, like lossless recovery, no pixel expansion, and resisting steganalysis.

[1]  Yuliang Lu,et al.  Lossless $(k,n)$ -Threshold Image Secret Sharing Based on the Chinese Remainder Theorem Without Auxiliary Encryption , 2019, IEEE Access.

[2]  Jessica J. Fridrich,et al.  Ensemble Classifiers for Steganalysis of Digital Media , 2012, IEEE Transactions on Information Forensics and Security.

[3]  Rastislav Lukac,et al.  User-Friendly Image Sharing in Multimedia Database Using Polynomials with Different Primes , 2007, MMM.

[4]  Ching-Nung Yang,et al.  Enhanced Boolean-based multi secret image sharing scheme , 2016, J. Syst. Softw..

[5]  Shaohua Tang,et al.  A secure image sharing scheme with high quality stego-images based on steganography , 2017, Multimedia Tools and Applications.

[6]  Xuehu Yan,et al.  Chinese Remainder Theorem-Based Secret Image Sharing with Small-Sized Shadow Images , 2018, Symmetry.

[7]  Yuliang Lu,et al.  General Meaningful Shadow Construction in Secret Image Sharing , 2018, IEEE Access.

[8]  Hai-Dong Yuan,et al.  Secret sharing with multi-cover adaptive steganography , 2014, Inf. Sci..

[9]  Alfredo De Santis,et al.  Extended capabilities for visual cryptography , 2001, Theor. Comput. Sci..

[10]  Jessica J. Fridrich,et al.  Rich Models for Steganalysis of Digital Images , 2012, IEEE Transactions on Information Forensics and Security.

[11]  Q. M. Jonathan Wu,et al.  Coverless image steganography using partial-duplicate image retrieval , 2018, Soft Computing.

[12]  Pei-Ling Chiu,et al.  Efficient constructions for progressive visual cryptography with meaningful shares , 2019, Signal Process..

[13]  Li Liu,et al.  Secret sharing: using meaningful image shadows based on Gray code , 2016, Multimedia Tools and Applications.

[14]  K. Egiazarian,et al.  Noise Measurement for Raw-Data of Digital Imaging Sensors by Automatic Segmentation of Nonuniform Targets , 2007, IEEE Sensors Journal.

[15]  Jessica J. Fridrich,et al.  Minimizing Additive Distortion in Steganography Using Syndrome-Trellis Codes , 2011, IEEE Transactions on Information Forensics and Security.

[16]  John Bloom,et al.  A modular approach to key safeguarding , 1983, IEEE Trans. Inf. Theory.

[17]  Chang-Chou Lin,et al.  Secret image sharing with steganography and authentication , 2004, J. Syst. Softw..

[18]  Yuliang Lu,et al.  Reversible Image Secret Sharing , 2020, IEEE Transactions on Information Forensics and Security.

[19]  Adi Shamir,et al.  How to share a secret , 1979, CACM.