An Image Secret Sharing Technique with Block Based Image Coding

A (t, n) threshold secret image sharing scheme generates n share images from a secret image in such a way that any t or more share images can be used to reconstruct the secret image. In this paper we have proposed a (t, n) secret image sharing scheme where the secret image is first encoded by block based lossy compression technique and define t sub-images. The image compression technique gives a good quality image. To enhance the security level, the sub-images are scrambled by Arnold transform and then shares are generated. Finally, image hiding (i.e., Steganography) concept is adopted to hide the shares within cover images. The proposed method gives good quality of the stego images.

[1]  Ja-Chen Lin,et al.  Sharing and hiding secret images with size constraint , 2004, Pattern Recognit..

[2]  Wei Sun,et al.  A user-friendly secret image sharing scheme with reversible steganography based on cellular automata , 2012, J. Syst. Softw..

[3]  Vasif V. Nabiyev,et al.  Invertible secret image sharing for gray level and dithered cover images , 2013, J. Syst. Softw..

[4]  Ja-Chen Lin,et al.  Secret image sharing , 2002, Comput. Graph..

[5]  Long-Wen Chang,et al.  Adaptive Data Hiding for Images Based on Harr Discrete Wavelet Transform , 2006, PSIVT.

[6]  Shyong Jian Shyu,et al.  Optimum Pixel Expansions for Threshold Visual Secret Sharing Schemes , 2011, IEEE Trans. Inf. Forensics Secur..

[7]  Xingang You,et al.  A DCT-based image steganographic method resisting statistical attacks , 2004, 2004 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[8]  김인택 [서평]「Information Hiding Techniques for Steganography and Digital Watermarking」 , 2000 .

[9]  Linfei Chen,et al.  Image encryption based on singular value decomposition and Arnold transform in fractional domain , 2013 .

[10]  Wu-Lin Chen,et al.  Efficient VQ-based image coding scheme using inverse function and lossless index coding , 2013, Signal Process..

[11]  Ran-Zan Wang,et al.  Secret image sharing with smaller shadow images , 2006, Pattern Recognit. Lett..

[12]  Bhabatosh Chanda,et al.  Color image compression based on block truncation coding using pattern fitting principle , 2007, Pattern Recognit..

[13]  Ran-Zan Wang,et al.  Region Incrementing Visual Cryptography , 2009, IEEE Signal Processing Letters.

[14]  Bhabatosh Chanda,et al.  A fast progressive image transmission scheme using block truncation coding by pattern fitting , 2012, J. Vis. Commun. Image Represent..

[15]  Bhabatosh Chanda,et al.  Block truncation coding using pattern fitting , 2004, Pattern Recognit..

[16]  Lee-Ming Cheng,et al.  Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..

[17]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[18]  Sushil Jajodia,et al.  Exploring steganography: Seeing the unseen , 1998, Computer.

[19]  Ja-Chen Lin,et al.  Secret Image Sharing based on Vector Quantization , 2009 .

[20]  Chin-Chen Chang,et al.  Sharing Secret Omages using Shadow Codebooks , 1998, Inf. Sci..

[21]  N. Koblitz A Course in Number Theory and Cryptography , 1987 .

[22]  L. Washington Elliptic Curves: Number Theory and Cryptography , 2003 .

[23]  Chin-Chen Chang,et al.  New method of secret image sharing based upon vector quantization , 2001, J. Electronic Imaging.

[24]  M. Hwang,et al.  Image steganographic scheme based on pixel-value differencing and LSB replacement methods , 2005 .

[25]  H. H. Zayed,et al.  An adaptive steganographic technique based on integer wavelet transform , 2009, 2009 International Conference on Networking and Media Convergence.

[26]  Juan M. Vilardy,et al.  Double image encryption method using the Arnold transform in the fractional Hartley domain , 2013, Iberoamerican Meeting of Optics and the Latin American Meeting of Optics, Lasers and Their Applications.

[27]  Chih-Fong Tsai,et al.  Block-based progressive visual secret sharing , 2013, Inf. Sci..

[28]  Niels Provos,et al.  Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..

[29]  Yu-Chen Hu,et al.  Fast VQ codebook search algorithm for grayscale image coding , 2008, Image Vis. Comput..

[30]  G. R. BLAKLEY Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).

[31]  Ying-Yu Chen,et al.  Quality-adaptive visual secret sharing by random grids , 2013, J. Syst. Softw..

[32]  Vasif V. Nabiyev,et al.  Secret image sharing scheme with adaptive authentication strength , 2013, Pattern Recognit. Lett..

[33]  Wei Sun,et al.  Visual secret sharing for general access structures by random grids , 2012, IET Inf. Secur..

[34]  Moni Naor,et al.  Visual Cryptography , 1994, Encyclopedia of Multimedia.