Secret Image Sharing with Reversible Steganography

The significant essential of secret image sharing approaches is that the revealed content of the secret image must be lossless. Moreover, the distorted stego images can be reverted to the original cover image. In order to achieve these purposes, we first transform the secret pixels into the m-ary notational system. Then, the information data used to reconstruct original pixels from camouflaged pixels are calculated. The information data and transformed secret data are shared using the (t, n)-threshold sharing scheme. In this way, we can retrieve the lossless secret image and reverse the stego image to the original image. According to the experiments, the shadows can be successfully camouflaged in the cover image, and the stego images have satisfactory quality. Moreover, our scheme allows for a large capacity of embedded secret data.

[1]  Ching-Nung Yang,et al.  Improvements of image sharing with steganography and authentication , 2007, J. Syst. Softw..

[2]  Chin-Chen Chang,et al.  A novel secret image sharing scheme in color images using small shadow images , 2008, Inf. Sci..

[3]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[4]  Wei Su,et al.  Robust Lossless Image Data Hiding Designed for Semi-Fragile Image Authentication , 2008, IEEE Transactions on Circuits and Systems for Video Technology.

[5]  Chin-Chen Chang,et al.  Sharing multiple secrets in digital images , 2002, J. Syst. Softw..

[6]  Chang-Chou Lin,et al.  Secret image sharing with steganography and authentication , 2004, J. Syst. Softw..

[7]  Moni Naor,et al.  Visual Cryptography , 1994, Encyclopedia of Multimedia.

[8]  Ja-Chen Lin,et al.  Secret image sharing , 2002, Comput. Graph..

[9]  Jeffrey J. Rodríguez,et al.  Expansion Embedding Techniques for Reversible Watermarking , 2007, IEEE Transactions on Image Processing.

[10]  Rong Zhao,et al.  A new image secret sharing scheme to identify cheaters , 2009, Comput. Stand. Interfaces.

[11]  Ran-Zan Wang,et al.  Secret image sharing with smaller shadow images , 2006, Pattern Recognit. Lett..

[12]  Ja-Chen Lin,et al.  Sharing and hiding secret images with size constraint , 2004, Pattern Recognit..

[13]  G. R. Blakley,et al.  Safeguarding cryptographic keys , 1899, 1979 International Workshop on Managing Requirements Knowledge (MARK).

[14]  Chin-Chen Chang,et al.  Sharing secrets in stego images with authentication , 2008, Pattern Recognit..

[15]  Jun Tian,et al.  Reversible data embedding using a difference expansion , 2003, IEEE Trans. Circuits Syst. Video Technol..

[16]  Nien-Lin Hsueh,et al.  A lossless data hiding scheme based on three-pixel block differences , 2008, Pattern Recognit..