Improved Invertible Secret Image Sharing with Steganography

In 2010, Lin and Chan proposed an invertible secret image sharing with steganography scheme, in which each generated shadow image has natural appearance that conceals the track of the shared secret image elaborately. The method not only can reconstruct the secret image loss less but also can change...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Yung-Yi Lin, Ran-Zan Wang
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 96
container_issue
container_start_page 93
container_title
container_volume
creator Yung-Yi Lin
Ran-Zan Wang
description In 2010, Lin and Chan proposed an invertible secret image sharing with steganography scheme, in which each generated shadow image has natural appearance that conceals the track of the shared secret image elaborately. The method not only can reconstruct the secret image loss less but also can change the distorted cover image back to its origin version. It is practical for fulfilling image sharing with steganography scheme where the cover image is sensitive to alterations. However, the scheme suffers from an overflow problem in the case of embedding data in pixels with value greater than or equal to ⌈(2 k /p⌉×p in a k-bit cover image, where p is a prime number set in the sharing function, and some secret patterns were leaked from a single shadow image. In this paper an improved method of Lin and Chan's invertible secret image sharing scheme is proposed. The scheme divides the input secret image into multiple sections with each section fits in an alpha-bit space, the sharing function is carefully designed to conceal the statistical property of the secret image properly, and all arithmetic operations are performed in power-of-two Galois Field GF(2 α ). Experimental results show that the proposed scheme obtains better quality of shadow images, and the security property to the secret image is improved.
doi_str_mv 10.1109/IIHMSP.2011.58
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_6079542</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6079542</ieee_id><sourcerecordid>6079542</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-c0e72e5e42025cb8f0a32a334b4e2301bf298a3a4b76510ac12d1bac415492123</originalsourceid><addsrcrecordid>eNotj81Kw0AURkdEUGu2btzkBRLvnZ9MBldStB2oKKT7MpPeJCNNGyah0rc3oN_mcDYHPsYeEXJEMM_Wrj-qr5wDYq7KK5YYXYIujJIKNb9m9yiV1iiM1rcsGcdvmFcURhd4x15sP8TTmfapPZ4pTsEfKK2ojjSltnftLJ2L4dimP2Hq0mqi1h1PbXRDd3lgN407jJT8c8G272_b5TrbfK7s8nWTBQNTVgNpTookB65qXzbgBHdCSC-JC0DfcFM64aTXhUJwNfI9eldLVNJw5GLBnv6ygYh2Qwy9i5ddAXp-yMUvXhlHbw</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Improved Invertible Secret Image Sharing with Steganography</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Yung-Yi Lin ; Ran-Zan Wang</creator><creatorcontrib>Yung-Yi Lin ; Ran-Zan Wang</creatorcontrib><description>In 2010, Lin and Chan proposed an invertible secret image sharing with steganography scheme, in which each generated shadow image has natural appearance that conceals the track of the shared secret image elaborately. The method not only can reconstruct the secret image loss less but also can change the distorted cover image back to its origin version. It is practical for fulfilling image sharing with steganography scheme where the cover image is sensitive to alterations. However, the scheme suffers from an overflow problem in the case of embedding data in pixels with value greater than or equal to ⌈(2 k /p⌉×p in a k-bit cover image, where p is a prime number set in the sharing function, and some secret patterns were leaked from a single shadow image. In this paper an improved method of Lin and Chan's invertible secret image sharing scheme is proposed. The scheme divides the input secret image into multiple sections with each section fits in an alpha-bit space, the sharing function is carefully designed to conceal the statistical property of the secret image properly, and all arithmetic operations are performed in power-of-two Galois Field GF(2 α ). Experimental results show that the proposed scheme obtains better quality of shadow images, and the security property to the secret image is improved.</description><identifier>ISBN: 1457713977</identifier><identifier>ISBN: 9781457713972</identifier><identifier>EISBN: 9780769545172</identifier><identifier>EISBN: 0769545173</identifier><identifier>DOI: 10.1109/IIHMSP.2011.58</identifier><language>eng</language><publisher>IEEE</publisher><subject>Authentication ; Data Hiding ; Gray-scale ; Image reconstruction ; Image Sharing ; Pattern recognition ; PSNR ; Revertible Image Sharing ; Software ; Space shuttles</subject><ispartof>2011 Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011, p.93-96</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6079542$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2056,27924,54919</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6079542$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Yung-Yi Lin</creatorcontrib><creatorcontrib>Ran-Zan Wang</creatorcontrib><title>Improved Invertible Secret Image Sharing with Steganography</title><title>2011 Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing</title><addtitle>iih-msp</addtitle><description>In 2010, Lin and Chan proposed an invertible secret image sharing with steganography scheme, in which each generated shadow image has natural appearance that conceals the track of the shared secret image elaborately. The method not only can reconstruct the secret image loss less but also can change the distorted cover image back to its origin version. It is practical for fulfilling image sharing with steganography scheme where the cover image is sensitive to alterations. However, the scheme suffers from an overflow problem in the case of embedding data in pixels with value greater than or equal to ⌈(2 k /p⌉×p in a k-bit cover image, where p is a prime number set in the sharing function, and some secret patterns were leaked from a single shadow image. In this paper an improved method of Lin and Chan's invertible secret image sharing scheme is proposed. The scheme divides the input secret image into multiple sections with each section fits in an alpha-bit space, the sharing function is carefully designed to conceal the statistical property of the secret image properly, and all arithmetic operations are performed in power-of-two Galois Field GF(2 α ). Experimental results show that the proposed scheme obtains better quality of shadow images, and the security property to the secret image is improved.</description><subject>Authentication</subject><subject>Data Hiding</subject><subject>Gray-scale</subject><subject>Image reconstruction</subject><subject>Image Sharing</subject><subject>Pattern recognition</subject><subject>PSNR</subject><subject>Revertible Image Sharing</subject><subject>Software</subject><subject>Space shuttles</subject><isbn>1457713977</isbn><isbn>9781457713972</isbn><isbn>9780769545172</isbn><isbn>0769545173</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2011</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotj81Kw0AURkdEUGu2btzkBRLvnZ9MBldStB2oKKT7MpPeJCNNGyah0rc3oN_mcDYHPsYeEXJEMM_Wrj-qr5wDYq7KK5YYXYIujJIKNb9m9yiV1iiM1rcsGcdvmFcURhd4x15sP8TTmfapPZ4pTsEfKK2ojjSltnftLJ2L4dimP2Hq0mqi1h1PbXRDd3lgN407jJT8c8G272_b5TrbfK7s8nWTBQNTVgNpTookB65qXzbgBHdCSC-JC0DfcFM64aTXhUJwNfI9eldLVNJw5GLBnv6ygYh2Qwy9i5ddAXp-yMUvXhlHbw</recordid><startdate>201110</startdate><enddate>201110</enddate><creator>Yung-Yi Lin</creator><creator>Ran-Zan Wang</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201110</creationdate><title>Improved Invertible Secret Image Sharing with Steganography</title><author>Yung-Yi Lin ; Ran-Zan Wang</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-c0e72e5e42025cb8f0a32a334b4e2301bf298a3a4b76510ac12d1bac415492123</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2011</creationdate><topic>Authentication</topic><topic>Data Hiding</topic><topic>Gray-scale</topic><topic>Image reconstruction</topic><topic>Image Sharing</topic><topic>Pattern recognition</topic><topic>PSNR</topic><topic>Revertible Image Sharing</topic><topic>Software</topic><topic>Space shuttles</topic><toplevel>online_resources</toplevel><creatorcontrib>Yung-Yi Lin</creatorcontrib><creatorcontrib>Ran-Zan Wang</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Yung-Yi Lin</au><au>Ran-Zan Wang</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Improved Invertible Secret Image Sharing with Steganography</atitle><btitle>2011 Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing</btitle><stitle>iih-msp</stitle><date>2011-10</date><risdate>2011</risdate><spage>93</spage><epage>96</epage><pages>93-96</pages><isbn>1457713977</isbn><isbn>9781457713972</isbn><eisbn>9780769545172</eisbn><eisbn>0769545173</eisbn><abstract>In 2010, Lin and Chan proposed an invertible secret image sharing with steganography scheme, in which each generated shadow image has natural appearance that conceals the track of the shared secret image elaborately. The method not only can reconstruct the secret image loss less but also can change the distorted cover image back to its origin version. It is practical for fulfilling image sharing with steganography scheme where the cover image is sensitive to alterations. However, the scheme suffers from an overflow problem in the case of embedding data in pixels with value greater than or equal to ⌈(2 k /p⌉×p in a k-bit cover image, where p is a prime number set in the sharing function, and some secret patterns were leaked from a single shadow image. In this paper an improved method of Lin and Chan's invertible secret image sharing scheme is proposed. The scheme divides the input secret image into multiple sections with each section fits in an alpha-bit space, the sharing function is carefully designed to conceal the statistical property of the secret image properly, and all arithmetic operations are performed in power-of-two Galois Field GF(2 α ). Experimental results show that the proposed scheme obtains better quality of shadow images, and the security property to the secret image is improved.</abstract><pub>IEEE</pub><doi>10.1109/IIHMSP.2011.58</doi><tpages>4</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISBN: 1457713977
ispartof 2011 Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011, p.93-96
issn
language eng
recordid cdi_ieee_primary_6079542
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Authentication
Data Hiding
Gray-scale
Image reconstruction
Image Sharing
Pattern recognition
PSNR
Revertible Image Sharing
Software
Space shuttles
title Improved Invertible Secret Image Sharing with Steganography
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-12T21%3A22%3A03IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Improved%20Invertible%20Secret%20Image%20Sharing%20with%20Steganography&rft.btitle=2011%20Seventh%20International%20Conference%20on%20Intelligent%20Information%20Hiding%20and%20Multimedia%20Signal%20Processing&rft.au=Yung-Yi%20Lin&rft.date=2011-10&rft.spage=93&rft.epage=96&rft.pages=93-96&rft.isbn=1457713977&rft.isbn_list=9781457713972&rft_id=info:doi/10.1109/IIHMSP.2011.58&rft_dat=%3Cieee_6IE%3E6079542%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=9780769545172&rft.eisbn_list=0769545173&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=6079542&rfr_iscdi=true