Progressive sharing for a secret image

Based on the wavelet transform, a new progressive sharing scheme is proposed to share a secret image into several shadow images using SPIHT encoding processes and Shamir's threshold scheme. Quality refinement of the recovered image is achieved by the data consumed from the threshold number (r) of shadow images and each single shadow image reveals no information about the secret image. The size of each shadow image is smaller than 1/r of the secret image and any number of shadow images that is less than r reveals no information about the secret image. The proposed approach is secure for image sharing and provides excellent peak signal-to-noise ratio (PSNR) versus rate performance. Experimental results have demonstrated the promising performance of this method in progressive sharing.

[1]  Michel Barlaud,et al.  Image coding using wavelet transform , 1992, IEEE Trans. Image Process..

[2]  G. R. BLAKLEY Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).

[3]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[4]  Faouzi Kossentini,et al.  Reversible integer-to-integer wavelet transforms for image compression: performance evaluation and analysis , 2000, IEEE Trans. Image Process..

[5]  Chang-Chou Lin,et al.  Secret image sharing with capability of share data reduction , 2003 .

[6]  Jerome M. Shapiro,et al.  Embedded image coding using zerotrees of wavelet coefficients , 1993, IEEE Trans. Signal Process..

[7]  Ja-Chen Lin,et al.  Fault-tolerant and progressive transmission of images , 2005, Pattern Recognit..

[8]  I. Daubechies,et al.  Wavelet Transforms That Map Integers to Integers , 1998 .

[9]  N. Bourbakis,et al.  SCAN-Based Compression-Encryption-Hiding for Video on Demand , 2003, IEEE Multim..

[10]  Rabab Kreidieh Ward,et al.  Symmetric-extension-compatible reversible integer-to-integer wavelet transforms , 2003, IEEE Trans. Signal Process..

[11]  Shu Lin,et al.  Error control coding : fundamentals and applications , 1983 .

[12]  HyungJun Kim,et al.  Lossless and lossy image compression using biorthogonal wavelet transforms with multiplierless operations , 1998 .

[13]  Ja-Chen Lin,et al.  Secret image sharing , 2002, Comput. Graph..

[14]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[15]  Yun Q. Shi,et al.  Reversible Data Hiding , 2003, IWDW.

[16]  Lisa M. Marvel,et al.  Spread spectrum image steganography , 1999, IEEE Trans. Image Process..

[17]  Ran-Zan Wang,et al.  Secret image sharing with smaller shadow images , 2006, Pattern Recognit. Lett..

[18]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[19]  Scott Hauck,et al.  SPIHT image compression on FPGAs , 2005, IEEE Transactions on Circuits and Systems for Video Technology.

[20]  A. Said,et al.  Manuscript Submitted to the Ieee Transactions on Circuits and Systems for Video Technology a New Fast and Eecient Image Codec Based on Set Partitioning in Hierarchical Trees , 2007 .