Improved Invertible Secret Image Sharing with Steganography
In 2010, Lin and Chan proposed an invertible secret image sharing with steganography scheme, in which each generated shadow image has natural appearance that conceals the track of the shared secret image elaborately. The method not only can reconstruct the secret image loss less but also can change...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 96 |
---|---|
container_issue | |
container_start_page | 93 |
container_title | |
container_volume | |
creator | Yung-Yi Lin Ran-Zan Wang |
description | In 2010, Lin and Chan proposed an invertible secret image sharing with steganography scheme, in which each generated shadow image has natural appearance that conceals the track of the shared secret image elaborately. The method not only can reconstruct the secret image loss less but also can change the distorted cover image back to its origin version. It is practical for fulfilling image sharing with steganography scheme where the cover image is sensitive to alterations. However, the scheme suffers from an overflow problem in the case of embedding data in pixels with value greater than or equal to ⌈(2 k /p⌉×p in a k-bit cover image, where p is a prime number set in the sharing function, and some secret patterns were leaked from a single shadow image. In this paper an improved method of Lin and Chan's invertible secret image sharing scheme is proposed. The scheme divides the input secret image into multiple sections with each section fits in an alpha-bit space, the sharing function is carefully designed to conceal the statistical property of the secret image properly, and all arithmetic operations are performed in power-of-two Galois Field GF(2 α ). Experimental results show that the proposed scheme obtains better quality of shadow images, and the security property to the secret image is improved. |
doi_str_mv | 10.1109/IIHMSP.2011.58 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_6079542</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6079542</ieee_id><sourcerecordid>6079542</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-c0e72e5e42025cb8f0a32a334b4e2301bf298a3a4b76510ac12d1bac415492123</originalsourceid><addsrcrecordid>eNotj81Kw0AURkdEUGu2btzkBRLvnZ9MBldStB2oKKT7MpPeJCNNGyah0rc3oN_mcDYHPsYeEXJEMM_Wrj-qr5wDYq7KK5YYXYIujJIKNb9m9yiV1iiM1rcsGcdvmFcURhd4x15sP8TTmfapPZ4pTsEfKK2ojjSltnftLJ2L4dimP2Hq0mqi1h1PbXRDd3lgN407jJT8c8G272_b5TrbfK7s8nWTBQNTVgNpTookB65qXzbgBHdCSC-JC0DfcFM64aTXhUJwNfI9eldLVNJw5GLBnv6ygYh2Qwy9i5ddAXp-yMUvXhlHbw</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Improved Invertible Secret Image Sharing with Steganography</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Yung-Yi Lin ; Ran-Zan Wang</creator><creatorcontrib>Yung-Yi Lin ; Ran-Zan Wang</creatorcontrib><description>In 2010, Lin and Chan proposed an invertible secret image sharing with steganography scheme, in which each generated shadow image has natural appearance that conceals the track of the shared secret image elaborately. The method not only can reconstruct the secret image loss less but also can change the distorted cover image back to its origin version. It is practical for fulfilling image sharing with steganography scheme where the cover image is sensitive to alterations. However, the scheme suffers from an overflow problem in the case of embedding data in pixels with value greater than or equal to ⌈(2 k /p⌉×p in a k-bit cover image, where p is a prime number set in the sharing function, and some secret patterns were leaked from a single shadow image. In this paper an improved method of Lin and Chan's invertible secret image sharing scheme is proposed. The scheme divides the input secret image into multiple sections with each section fits in an alpha-bit space, the sharing function is carefully designed to conceal the statistical property of the secret image properly, and all arithmetic operations are performed in power-of-two Galois Field GF(2 α ). Experimental results show that the proposed scheme obtains better quality of shadow images, and the security property to the secret image is improved.</description><identifier>ISBN: 1457713977</identifier><identifier>ISBN: 9781457713972</identifier><identifier>EISBN: 9780769545172</identifier><identifier>EISBN: 0769545173</identifier><identifier>DOI: 10.1109/IIHMSP.2011.58</identifier><language>eng</language><publisher>IEEE</publisher><subject>Authentication ; Data Hiding ; Gray-scale ; Image reconstruction ; Image Sharing ; Pattern recognition ; PSNR ; Revertible Image Sharing ; Software ; Space shuttles</subject><ispartof>2011 Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011, p.93-96</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6079542$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2056,27924,54919</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6079542$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Yung-Yi Lin</creatorcontrib><creatorcontrib>Ran-Zan Wang</creatorcontrib><title>Improved Invertible Secret Image Sharing with Steganography</title><title>2011 Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing</title><addtitle>iih-msp</addtitle><description>In 2010, Lin and Chan proposed an invertible secret image sharing with steganography scheme, in which each generated shadow image has natural appearance that conceals the track of the shared secret image elaborately. The method not only can reconstruct the secret image loss less but also can change the distorted cover image back to its origin version. It is practical for fulfilling image sharing with steganography scheme where the cover image is sensitive to alterations. However, the scheme suffers from an overflow problem in the case of embedding data in pixels with value greater than or equal to ⌈(2 k /p⌉×p in a k-bit cover image, where p is a prime number set in the sharing function, and some secret patterns were leaked from a single shadow image. In this paper an improved method of Lin and Chan's invertible secret image sharing scheme is proposed. The scheme divides the input secret image into multiple sections with each section fits in an alpha-bit space, the sharing function is carefully designed to conceal the statistical property of the secret image properly, and all arithmetic operations are performed in power-of-two Galois Field GF(2 α ). Experimental results show that the proposed scheme obtains better quality of shadow images, and the security property to the secret image is improved.</description><subject>Authentication</subject><subject>Data Hiding</subject><subject>Gray-scale</subject><subject>Image reconstruction</subject><subject>Image Sharing</subject><subject>Pattern recognition</subject><subject>PSNR</subject><subject>Revertible Image Sharing</subject><subject>Software</subject><subject>Space shuttles</subject><isbn>1457713977</isbn><isbn>9781457713972</isbn><isbn>9780769545172</isbn><isbn>0769545173</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2011</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotj81Kw0AURkdEUGu2btzkBRLvnZ9MBldStB2oKKT7MpPeJCNNGyah0rc3oN_mcDYHPsYeEXJEMM_Wrj-qr5wDYq7KK5YYXYIujJIKNb9m9yiV1iiM1rcsGcdvmFcURhd4x15sP8TTmfapPZ4pTsEfKK2ojjSltnftLJ2L4dimP2Hq0mqi1h1PbXRDd3lgN407jJT8c8G272_b5TrbfK7s8nWTBQNTVgNpTookB65qXzbgBHdCSC-JC0DfcFM64aTXhUJwNfI9eldLVNJw5GLBnv6ygYh2Qwy9i5ddAXp-yMUvXhlHbw</recordid><startdate>201110</startdate><enddate>201110</enddate><creator>Yung-Yi Lin</creator><creator>Ran-Zan Wang</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201110</creationdate><title>Improved Invertible Secret Image Sharing with Steganography</title><author>Yung-Yi Lin ; Ran-Zan Wang</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-c0e72e5e42025cb8f0a32a334b4e2301bf298a3a4b76510ac12d1bac415492123</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2011</creationdate><topic>Authentication</topic><topic>Data Hiding</topic><topic>Gray-scale</topic><topic>Image reconstruction</topic><topic>Image Sharing</topic><topic>Pattern recognition</topic><topic>PSNR</topic><topic>Revertible Image Sharing</topic><topic>Software</topic><topic>Space shuttles</topic><toplevel>online_resources</toplevel><creatorcontrib>Yung-Yi Lin</creatorcontrib><creatorcontrib>Ran-Zan Wang</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Yung-Yi Lin</au><au>Ran-Zan Wang</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Improved Invertible Secret Image Sharing with Steganography</atitle><btitle>2011 Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing</btitle><stitle>iih-msp</stitle><date>2011-10</date><risdate>2011</risdate><spage>93</spage><epage>96</epage><pages>93-96</pages><isbn>1457713977</isbn><isbn>9781457713972</isbn><eisbn>9780769545172</eisbn><eisbn>0769545173</eisbn><abstract>In 2010, Lin and Chan proposed an invertible secret image sharing with steganography scheme, in which each generated shadow image has natural appearance that conceals the track of the shared secret image elaborately. The method not only can reconstruct the secret image loss less but also can change the distorted cover image back to its origin version. It is practical for fulfilling image sharing with steganography scheme where the cover image is sensitive to alterations. However, the scheme suffers from an overflow problem in the case of embedding data in pixels with value greater than or equal to ⌈(2 k /p⌉×p in a k-bit cover image, where p is a prime number set in the sharing function, and some secret patterns were leaked from a single shadow image. In this paper an improved method of Lin and Chan's invertible secret image sharing scheme is proposed. The scheme divides the input secret image into multiple sections with each section fits in an alpha-bit space, the sharing function is carefully designed to conceal the statistical property of the secret image properly, and all arithmetic operations are performed in power-of-two Galois Field GF(2 α ). Experimental results show that the proposed scheme obtains better quality of shadow images, and the security property to the secret image is improved.</abstract><pub>IEEE</pub><doi>10.1109/IIHMSP.2011.58</doi><tpages>4</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISBN: 1457713977 |
ispartof | 2011 Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011, p.93-96 |
issn | |
language | eng |
recordid | cdi_ieee_primary_6079542 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Authentication Data Hiding Gray-scale Image reconstruction Image Sharing Pattern recognition PSNR Revertible Image Sharing Software Space shuttles |
title | Improved Invertible Secret Image Sharing with Steganography |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-12T21%3A22%3A03IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Improved%20Invertible%20Secret%20Image%20Sharing%20with%20Steganography&rft.btitle=2011%20Seventh%20International%20Conference%20on%20Intelligent%20Information%20Hiding%20and%20Multimedia%20Signal%20Processing&rft.au=Yung-Yi%20Lin&rft.date=2011-10&rft.spage=93&rft.epage=96&rft.pages=93-96&rft.isbn=1457713977&rft.isbn_list=9781457713972&rft_id=info:doi/10.1109/IIHMSP.2011.58&rft_dat=%3Cieee_6IE%3E6079542%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=9780769545172&rft.eisbn_list=0769545173&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=6079542&rfr_iscdi=true |