Improved Secret Image Sharing Scheme in Embedding Capacity without Underflow and Overflow

Computational secret image sharing (CSIS) is an effective way to protect a secret image during its transmission and storage, and thus it has attracted lots of attentions since its appearance. Nowadays, it has become a hot topic for researchers to improve the embedding capacity and eliminate the underflow and overflow situations, which is embarrassing and difficult to deal with. The scheme, which has the highest embedding capacity among the existing schemes, has the underflow and overflow problems. Although the underflow and overflow situations have been well dealt with by different methods, the embedding capacities of these methods are reduced more or less. Motivated by these concerns, we propose a novel scheme, in which we take the differential coding, Huffman coding, and data converting to compress the secret image before embedding it to further improve the embedding capacity, and the pixel mapping matrix embedding method with a newly designed matrix is used to embed secret image data into the cover image to avoid the underflow and overflow situations. Experiment results show that our scheme can improve the embedding capacity further and eliminate the underflow and overflow situations at the same time.

[1]  Chin-Chen Chang,et al.  Sharing visual multi-secrets using circle shares , 2005, Comput. Stand. Interfaces.

[2]  Chin-Chen Chang,et al.  Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy , 2003, Pattern Recognit..

[3]  Vasif V. Nabiyev,et al.  Invertible secret image sharing for gray level and dithered cover images , 2013, J. Syst. Softw..

[4]  Tzung-Her Chen,et al.  Multi-image encryption by circular random grids , 2012, Inf. Sci..

[5]  Chin-Chen Chang,et al.  A hierarchical threshold secret image sharing , 2012, Pattern Recognit. Lett..

[6]  Chin-Chen Chang,et al.  Distortion-free secret image sharing mechanism using modulus operator , 2009, Pattern Recognit..

[7]  Ran-Zan Wang,et al.  Secret image sharing with smaller shadow images , 2006, Pattern Recognit. Lett..

[8]  Chin-Chen Chang,et al.  A Steganographic Method with High Embedding Capacity by Improving Exploiting Modification Direction , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[9]  Ja-Chen Lin,et al.  Secret image sharing , 2002, Comput. Graph..

[10]  Chin-Chen Chang,et al.  Image hiding scheme with modulus function and dynamic programming strategy on partitioned pixels , 2006, Pattern Recognit..

[11]  Ziba Eslami,et al.  Secret image sharing with authentication-chaining and dynamic embedding , 2011, J. Syst. Softw..

[12]  Chin-Chen Chang,et al.  A Secret Image Sharing Scheme with High Quality Shadows Based on Exploiting Modification Direction , 2011, J. Multim..

[13]  Liqin Wang,et al.  Color Image Sharing Method Based on Lagrange's Interpolating Polynomial , 2012, HIS.

[14]  Ja-Chen Lin,et al.  Sharing and hiding secret images with size constraint , 2004, Pattern Recognit..

[15]  Chien-Chang Chen,et al.  Weighted modulated secret image sharing method , 2009, J. Electronic Imaging.

[16]  Li Li,et al.  A Lossless Secret Image Sharing Scheme Based on Steganography , 2012, 2012 Second International Conference on Instrumentation, Measurement, Computer, Communication and Control.

[17]  Eero P. Simoncelli,et al.  Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.

[18]  Awadhesh Srivastava,et al.  A secret sharing scheme for secure transmission of color images , 2014, 2014 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT).

[19]  Ching-Nung Yang,et al.  Improvements of image sharing with steganography and authentication , 2007, J. Syst. Softw..

[20]  Vasif V. Nabiyev,et al.  Secret image sharing scheme with adaptive authentication strength , 2013, Pattern Recognit. Lett..

[21]  Moni Naor,et al.  Visual Cryptography , 1994, Encyclopedia of Multimedia.

[22]  Ja-Chen Lin,et al.  Fast-weighted secret image sharing , 2009 .

[23]  Chuankun Wu,et al.  Embedded Extended Visual Cryptography Schemes , 2011, IEEE Transactions on Information Forensics and Security.

[24]  Feng Liu,et al.  Cheating immune visual cryptography scheme , 2011, IET Inf. Secur..

[25]  Chin-Chen Chang,et al.  An Information Hiding Scheme Using Sudoku , 2008, 2008 3rd International Conference on Innovative Computing Information and Control.

[26]  Chin-Chen Chang,et al.  A novel secret image sharing scheme in color images using small shadow images , 2008, Inf. Sci..

[27]  Ja-Chen Lin,et al.  A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function , 2003, Pattern Recognit..

[28]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[29]  Bertram Felgenhauer,et al.  Mathematics of Sudoku I , 2006 .

[30]  Chin-Chen Chang,et al.  Sharing secrets in stego images with authentication , 2008, Pattern Recognit..

[31]  Ziba Eslami,et al.  Secret image sharing scheme with hierarchical threshold access structure , 2014, J. Vis. Commun. Image Represent..

[32]  Tung-Shou Chen,et al.  New visual cryptography system based on circular shadow image and fixed angle segmentation , 2005, J. Electronic Imaging.

[33]  Lee-Ming Cheng,et al.  Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..

[34]  Chang-Chou Lin,et al.  Secret image sharing with steganography and authentication , 2004, J. Syst. Softw..

[35]  Ja-Chen Lin,et al.  Image hiding by optimal LSB substitution and genetic algorithm , 2001, Pattern Recognit..

[36]  Pei-Yu Lin,et al.  Invertible secret image sharing with steganography , 2010, Pattern Recognit. Lett..

[37]  Xinpeng Zhang,et al.  Efficient Steganographic Embedding by Exploiting Modification Direction , 2006, IEEE Communications Letters.

[38]  Shyong Jian Shyu,et al.  Weighted Threshold Secret Image Sharing , 2009, PSIVT.

[39]  Ching-Nung Yang,et al.  Essential secret image sharing scheme with different importance of shadows , 2013, J. Vis. Commun. Image Represent..

[40]  Chin-Chen Chang,et al.  A Sudoku-based Secret Image Sharing Scheme with Reversibility (Invited Paper) , 2009, J. Commun..

[41]  S. Kannan,et al.  Secured secret color image sharing with steganography , 2012, 2012 International Conference on Recent Trends in Information Technology.