Author:
Chang Sheng-Yu,Lee Suiang-Shyan,Yeh Tzu-Min,Chen Lee Shu-Teng,Lin Ja-Chen
Abstract
Abstract
Secure sharing of digital images is becoming an important issue. Consequently, many schemes for ensuring image sharing security have been proposed. However, existing approaches focus on the sharing of a single image, rather than multiple images. We propose three kinds of sharing methods that progressively reveal n given secret images according to the sensitivity level of each image. Method 1 divides each secret image into n parts and then combines and hides the parts of the images to get n steganographic (stego) JPEG codes of equal importance. Method 2 is similar; however, it allocates different stego JPEG codes of different ‘weights’ to indicate their strength. Method 3 first applies traditional threshold-sharing to the n secret images, then progressively shares k keys, and finally combines the two sharing results to get n stego JPEG codes. In the recovery phase, various parameters are compared to a pre-specified low/middle/high (L/M/H) threshold and, according to the respective method, determine whether or not secret images are reconstructed and the quality of the images reconstructed. The results of experiments conducted verify the efficacy of our methods.
Publisher
Springer Science and Business Media LLC
Reference27 articles.
1. A Shamir, How to share a secret. Commun. ACM 22(11), 612–613 (1979)
2. GR Blakley, Safeguarding cryptographic keys, in Proceedings of AFIPS 1979 National Computer Conference, New Jersey, USA, vol. 48, 1979, pp. 313–317
3. SK Chen, JC Lin, Fault-tolerant and progressive transmission of images. Pattern Recogn. 38(12), 2466–2471 (2005)
4. RZ Wang, SJ Shyu, Scalable secret image sharing. Signal Process. Image Comm. 22(4), 363–373 (2007)
5. KH Hung, YJ Chang, JC Lin, Progressive sharing of an image. Opt. Eng. 47(4), 047006 (2008)
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献