Partial reversible AMBTC-based secret image sharing with steganography

Abstract Existing secret image sharing (SIS) schemes with steganography and authentication are designed for uncompressed images. They cannot be applied to compressed domain. When the cover image is of significance, these schemes cannot revert the distorted stego image into its original form. To solve these problems, a ( k , n ) threshold partial reversible absolute moment block truncation coding (AMBTC) based SIS scheme with steganography and authentication is proposed. A secret image is split into n noise-like shares by employing the polynomial based SIS under G F ( 2 8 ) . To efficiently manage the shares, they are concealed into the AMBTC cover image with parity bits by the proposed embedding algorithms, and n meaningful stego images are constructed. Authentication is adopted so that the integrity of stego image can be verified. Sufficient stego images can perfectly reconstruct the secret. Meanwhile, the original AMBTC cover image can be partially recovered with high probability. Theoretical analysis and experimental results are demonstrated, showing the effectiveness and advantages of the proposed scheme.

[1]  Ching-Nung Yang,et al.  Halftone visual cryptography with minimum auxiliary black pixels and uniform image quality , 2015, Digit. Signal Process..

[2]  Tzung-Her Chen,et al.  Visual secret sharing by random grids revisited , 2009, Pattern Recognit..

[3]  Alimohammad Latif,et al.  An adaptive secret image sharing with a new bitwise steganographic property , 2016, Inf. Sci..

[4]  Jung-San Lee,et al.  Selective scalable secret image sharing with verification , 2015, Multimedia Tools and Applications.

[5]  Wen-Huang Cheng,et al.  Reversible AMBTC-Based Data Hiding With Security Improvement by Chaotic Encryption , 2019, IEEE Access.

[6]  Ali Kanso,et al.  An efficient (t,n)–threshold secret image sharing scheme , 2017, Multimedia Tools and Applications.

[7]  Dong Chen,et al.  A (k, n) threshold partial reversible AMBTC-based visual cryptography using one reference image , 2019, J. Vis. Commun. Image Represent..

[8]  Ching-Nung Yang,et al.  Improvements of image sharing with steganography and authentication , 2007, J. Syst. Softw..

[9]  Ja-Chen Lin,et al.  Secret image sharing , 2002, Comput. Graph..

[10]  Shang-Juh Kao,et al.  A high quality image sharing with steganography and adaptive authentication scheme , 2011, J. Syst. Softw..

[11]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[12]  Jian Weng,et al.  Adopting secret sharing for reversible data hiding in encrypted images , 2018, Signal Process..

[13]  Her-Chang Chao,et al.  Random-grid based progressive visual secret sharing scheme with adaptive priority , 2017, Digit. Signal Process..

[14]  Wei Sun,et al.  Extended Capabilities for XOR-Based Visual Cryptography , 2014, IEEE Transactions on Information Forensics and Security.

[15]  Yicong Zhou,et al.  Combination of Sharing Matrix and Image Encryption for Lossless $(k,n)$ -Secret Image Sharing , 2017, IEEE Transactions on Image Processing.

[16]  G. R. BLAKLEY Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).

[17]  Sushil Jajodia,et al.  Exploring steganography: Seeing the unseen , 1998 .

[18]  Ching-Nung Yang,et al.  k Out of n Region-Based Progressive Visual Cryptography , 2019, IEEE Trans. Circuits Syst. Video Technol..

[19]  Chin-Chen Chang,et al.  Sharing secrets in stego images with authentication , 2008, Pattern Recognit..

[20]  Shyong Jian Shyu,et al.  XOR-Based Visual Cryptographic Schemes With Monotonously Increasing and Flawless Reconstruction Properties , 2018, IEEE Transactions on Circuits and Systems for Video Technology.

[21]  Songfeng Lu,et al.  New Steganography Scheme to Conceal a Large Amount of Secret Messages Using an Improved-AMBTC Algorithm Based on Hybrid Adaptive Neural Networks , 2017, 2017 IEEE 3rd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing, (HPSC) and IEEE International Conference on Intelligent Data and Security (IDS).

[22]  Yuliang Lu,et al.  Partial secret image sharing for (k, n) threshold based on image inpainting , 2018, J. Vis. Commun. Image Represent..

[23]  Hans Ulrich Simon,et al.  Contrast-optimal k out of n secret sharing schemes in visual cryptography , 1997, Theor. Comput. Sci..

[24]  Wei Sun,et al.  Improving the visual quality of random grid-based visual secret sharing , 2013, Signal Process..

[25]  Lee-Ming Cheng,et al.  Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..

[26]  Chang-Chou Lin,et al.  Secret image sharing with steganography and authentication , 2004, J. Syst. Softw..

[27]  Peng Li,et al.  A construction method of (t, k, n)-essential secret image sharing scheme , 2018, Signal Process. Image Commun..

[28]  Ching-Nung Yang,et al.  Steganography and authentication in image sharing without parity bits , 2012 .

[29]  Chaoyang Zhang,et al.  Collaborative Visual Cryptography Schemes , 2018, IEEE Transactions on Circuits and Systems for Video Technology.

[30]  Moni Naor,et al.  Visual Cryptography , 1994, Encyclopedia of Multimedia.

[31]  Peng Li,et al.  Essential secret image sharing scheme with the same size of shadows , 2016, Digit. Signal Process..

[32]  Weiming Zhang,et al.  On the fault-tolerant performance for a class of robust image steganography , 2018, Signal Process..

[33]  Yuliang Lu,et al.  Contrast-improved visual secret sharing based on random grid for general access structure , 2017, Digit. Signal Process..

[34]  Yuliang Lu,et al.  Chinese remainder theorem-based two-in-one image secret sharing with three decoding options , 2018, Digit. Signal Process..

[35]  Henk D. L. Hollmann,et al.  XOR-based Visual Cryptography Schemes , 2005, Des. Codes Cryptogr..

[36]  Ching-Nung Yang,et al.  New visual secret sharing schemes using probabilistic method , 2004, Pattern Recognit. Lett..

[37]  Ziba Eslami,et al.  Secret image sharing based on cellular automata and steganography , 2010, Pattern Recognit..

[38]  Lisa M. Marvel,et al.  Spread spectrum image steganography , 1999, IEEE Trans. Image Process..

[39]  Ching-Nung Yang,et al.  Scalable secret image sharing scheme with essential shadows , 2017, Signal Process. Image Commun..

[40]  Ching-Nung Yang,et al.  Improving recovered image quality in secret image sharing by simple modular arithmetic , 2018, Signal Process. Image Commun..