Skip to main content
Log in

Selective scalable secret image sharing with adaptive pixel-embedding technique

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Different from secret image sharing technique, the secret of a scalable secret image sharing is displayed in the way that it could be progressively recovered by a set of shares. In other word, incomplete gathering of shadows cannot be used to reconstruct the whole image S immediately. To improve the security of SSIS, Lee and Chen have designed a selective scalable secret image sharing mechanism (SSSIS) to reduce the awareness of malicious attackers. Nevertheless, the quality of Lee and Chen’s scheme is not good due to the image distortion and storage overhead of static embedding. Thus, we introduce the concept of adaptive pixel-embedding into SSSIS, in which the embedded bits could be uniformly distributed in the stego image. Aside from the human vision perception, experimental results have demonstrated the superiority of new method over related works in terms of two objective indexes, including peak signal to noise ratio (PSNR) and structural similarity (SSIM).

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Chang CC, Hsiao JY, Chan CS (2003) Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy. Pattern Recogn 36(7):1583–1595

    Article  Google Scholar 

  2. Chang CC, Chan CS, Fan YH (2006) Image hiding scheme with modulus function and dynamic programming strategy on partitioned pixels. Pattern Recogn 39(6):1155–1167

    Article  MATH  Google Scholar 

  3. Chang CC, Hsieh YP, Lin CH (2008) Sharing secrets in stego images with authentication. Pattern Recogn 41(10):3130–3137

    Article  MATH  Google Scholar 

  4. Eslami Z, Ahmadabadi JZ (2011) Secret image sharing with authentication- chaining and dynamic embedding. J Syst Softw 84(5):803–809

    Article  Google Scholar 

  5. Eslami Z, Razzaghi SH, Ahmadabadi JZ (2010) Secret image sharing based on cellular automata and steganography. Pattern Recogn 43(1):397–404

    Article  MATH  Google Scholar 

  6. Jiang H, Wang J, Yuan Z, Wu Y, Zheng N, Li S (2013) Salient object detection: a discriminative regional feature integration approach. Proceedings of 2013 I.E. Conference on Computer Vision and Pattern Recognition, pp 2083–2090

  7. Lee JS, Chen YR (2017) Selective scalable secret image sharing with verification. Multimed Tools Appl 76(1):1–11

    Article  Google Scholar 

  8. Lee JS, Wei KJ, Chen SJ, Wang YH (2016) Tele-micropayment scam prevention based on visual secret sharing technique. Multimed Tools Appl 75(4):2233–2248

    Article  Google Scholar 

  9. Lin CC, Tsai WH (2004) Secret image sharing with steganography and authentication. J Syst Softw 73(3):405–414

    Article  Google Scholar 

  10. Rao TRN, Yang CH (2006) Aryabhata remainder theorem: relevance to public-key crypto-algorithms. J Syst Softw 25(1):1–15

    MathSciNet  MATH  Google Scholar 

  11. Shamir A (1979) How to share a secret. Commun ACM 22(11):612–613

    Article  MathSciNet  MATH  Google Scholar 

  12. Thien CC, Lin JC (2002) Secret image sharing. Comput Graph 26:765–770

    Article  Google Scholar 

  13. Wang RZ, Shyu SJ (2007) Scalable secret image sharing. Signal Process Image Commun 22(4):363–373

    Article  Google Scholar 

  14. Wang J, Jiang H, Yuan Z, Cheng MM, Hu X, Zheng N (2017) Salient object detection: a discriminative regional feature integration approach. Int J Comput Vis 123(2):251–268

    Article  Google Scholar 

  15. Yang CN, Chu YY (2011) A general (k, n) scalable secret image sharing scheme with the smooth scalability. J Syst Softw 84(10):1726–1733

    Article  Google Scholar 

  16. Yang CN, Huang SM (2010) Constructions and properties of k out of n scalable secret image sharing. Opt Commun 283(9):1750–1762

    Article  Google Scholar 

  17. Yang CN, Chen TS, Yu KH, Wang CC (2007) Improvements of image sharing with steganography and authentication. J Syst Softw 80(7):1070–1076

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jung-San Lee.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chen, YC., Lee, JS. & Su, HC. Selective scalable secret image sharing with adaptive pixel-embedding technique. Multimed Tools Appl 77, 27107–27121 (2018). https://doi.org/10.1007/s11042-018-5908-6

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-018-5908-6

Keywords

Navigation