Secret Sharing and Information Hiding by Shadow Images

Secret sharing schemes and information hiding schemes have been separately developed by many researchers over years. Some researchers have been integrated information hiding technique into their proposed secret sharing scheme with the purpose of hiding shares and authentication. However, the combination of a secret sharing scheme and an information hiding technique with high embedding capacity is not explored by researchers. This paper presents a new secret sharing and information hiding scheme by grayscale images. The proposed scheme embeds a secret image and a secret bit stream into two shadow images. The experimental results show that the proposed scheme achieves very high embedding capacity (i.e. about 3 bits per pixel). Furthermore, after the secret bit stream has been extracted, the secret image can be completely restored pixel by pixel.

[1]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[2]  Cristian S. Calude,et al.  Automata Recognizing No Words: A Statistical Approach , 2006, Fundam. Informaticae.

[3]  Chin-Chen Chang,et al.  Secret Image Hiding and Sharing Based on the (t, n)-Threshold , 2007, Fundam. Informaticae.

[4]  Chang-Chou Lin,et al.  Secret image sharing with steganography and authentication , 2004, J. Syst. Softw..

[5]  Ja-Chen Lin,et al.  Image hiding by optimal LSB substitution and genetic algorithm , 2001, Pattern Recognit..

[6]  Ja-Chen Lin,et al.  Secret image sharing , 2002, Comput. Graph..

[7]  Ja-Chen Lin,et al.  Sharing and hiding secret images with size constraint , 2004, Pattern Recognit..

[8]  Adi Shamir,et al.  How to share a secret , 1979, CACM.