Progressive sharing of multiple images with sensitivity-controlled decoding

Secure sharing of digital images is becoming an important issue. Consequently, many schemes for ensuring image sharing security have been proposed. However, existing approaches focus on the sharing of a single image, rather than multiple images. We propose three kinds of sharing methods that progressively reveal n given secret images according to the sensitivity level of each image. Method 1 divides each secret image into n parts and then combines and hides the parts of the images to get n steganographic (stego) JPEG codes of equal importance. Method 2 is similar; however, it allocates different stego JPEG codes of different ‘weights’ to indicate their strength. Method 3 first applies traditional threshold-sharing to the n secret images, then progressively shares k keys, and finally combines the two sharing results to get n stego JPEG codes. In the recovery phase, various parameters are compared to a pre-specified low/middle/high (L/M/H) threshold and, according to the respective method, determine whether or not secret images are reconstructed and the quality of the images reconstructed. The results of experiments conducted verify the efficacy of our methods.

[1]  Ran-Zan Wang,et al.  Scalable secret image sharing , 2007, Signal Process. Image Commun..

[2]  Ja-Chen Lin,et al.  Protection of PDF Files: a Sharing Approach , 2014 .

[3]  G. Athisha,et al.  IMPROVING THE PROTECTION OF FPGA BASED SEQUENTIAL IP CORE DESIGNS USING HIERARCHICAL WATERMARKING TECHNIQUE , 2014 .

[4]  Feng Yi,et al.  On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme , 2010, EURASIP J. Adv. Signal Process..

[5]  Du-Shiau Tsai,et al.  Reversible data hiding scheme based on neighboring pixel differences , 2013, Digit. Signal Process..

[6]  Ja-Chen Lin,et al.  Reversible JPEG-Based Hiding Method with High Hiding-Ratio , 2010, Int. J. Pattern Recognit. Artif. Intell..

[7]  Chang-Chou Lin,et al.  Secret image sharing with capability of share data reduction , 2003 .

[8]  Ja-Chen Lin,et al.  Progressive sharing of an image , 2008 .

[9]  G. R. BLAKLEY Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).

[10]  Wen-Pinn Fang,et al.  Friendly progressive visual secret sharing , 2008, Pattern Recognit..

[11]  Kuang-Shyr Wu A secret image sharing scheme for light images , 2013, EURASIP J. Adv. Signal Process..

[12]  Ja-Chen Lin,et al.  Secret image sharing , 2002, Comput. Graph..

[13]  Chang-Chou Lin,et al.  Secret image sharing with steganography and authentication , 2004, J. Syst. Softw..

[14]  Niels Provos,et al.  Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..

[15]  E. Castillo,et al.  Automated Signature Insertion in Combinational Logic Patterns for HDL IP Core Protection , 2008, 2008 4th Southern Conference on Programmable Logic.

[16]  Tzung-Her Chen,et al.  Threshold visual secret sharing by random grids , 2011, J. Syst. Softw..

[17]  Miroslav Goljan,et al.  Digital camera identification from sensor pattern noise , 2006, IEEE Transactions on Information Forensics and Security.

[18]  Shilpy Dilip Mukherjee,et al.  Review on algorithns and techniques of reversible data hiding , 2014 .

[19]  T. Chen,et al.  Symmetric Threshold Multipath (STM): An online symmetric key management scheme , 2014, Inf. Sci..

[20]  Ja-Chen Lin,et al.  Multithreshold progressive image sharing with compact shadows , 2010, J. Electronic Imaging.

[21]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[22]  Ja-Chen Lin,et al.  Fault-tolerant and progressive transmission of images , 2005, Pattern Recognit..

[23]  Dimitrios Hatzinakos,et al.  Biometric Methods for Secure Communications in Body Sensor Networks: Resource-Efficient Key Management and Signal-Level Data Scrambling , 2008, EURASIP J. Adv. Signal Process..

[24]  Eero P. Simoncelli,et al.  Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.

[25]  M. Weeks,et al.  Watermarking with wavelets: Simplicity leads to robustness , 2008, IEEE SoutheastCon 2008.

[26]  Irena Orovic,et al.  An image watermarking based on the pdf modeling and quantization effects in the wavelet domain , 2012, Multimedia Tools and Applications.