Abstract
Different from secret image sharing technique, the secret of a scalable secret image sharing is displayed in the way that it could be progressively recovered by a set of shares. In other word, incomplete gathering of shadows cannot be used to reconstruct the whole image S immediately. To improve the security of SSIS, Lee and Chen have designed a selective scalable secret image sharing mechanism (SSSIS) to reduce the awareness of malicious attackers. Nevertheless, the quality of Lee and Chen’s scheme is not good due to the image distortion and storage overhead of static embedding. Thus, we introduce the concept of adaptive pixel-embedding into SSSIS, in which the embedded bits could be uniformly distributed in the stego image. Aside from the human vision perception, experimental results have demonstrated the superiority of new method over related works in terms of two objective indexes, including peak signal to noise ratio (PSNR) and structural similarity (SSIM).
Similar content being viewed by others
References
Chang CC, Hsiao JY, Chan CS (2003) Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy. Pattern Recogn 36(7):1583–1595
Chang CC, Chan CS, Fan YH (2006) Image hiding scheme with modulus function and dynamic programming strategy on partitioned pixels. Pattern Recogn 39(6):1155–1167
Chang CC, Hsieh YP, Lin CH (2008) Sharing secrets in stego images with authentication. Pattern Recogn 41(10):3130–3137
Eslami Z, Ahmadabadi JZ (2011) Secret image sharing with authentication- chaining and dynamic embedding. J Syst Softw 84(5):803–809
Eslami Z, Razzaghi SH, Ahmadabadi JZ (2010) Secret image sharing based on cellular automata and steganography. Pattern Recogn 43(1):397–404
Jiang H, Wang J, Yuan Z, Wu Y, Zheng N, Li S (2013) Salient object detection: a discriminative regional feature integration approach. Proceedings of 2013 I.E. Conference on Computer Vision and Pattern Recognition, pp 2083–2090
Lee JS, Chen YR (2017) Selective scalable secret image sharing with verification. Multimed Tools Appl 76(1):1–11
Lee JS, Wei KJ, Chen SJ, Wang YH (2016) Tele-micropayment scam prevention based on visual secret sharing technique. Multimed Tools Appl 75(4):2233–2248
Lin CC, Tsai WH (2004) Secret image sharing with steganography and authentication. J Syst Softw 73(3):405–414
Rao TRN, Yang CH (2006) Aryabhata remainder theorem: relevance to public-key crypto-algorithms. J Syst Softw 25(1):1–15
Shamir A (1979) How to share a secret. Commun ACM 22(11):612–613
Thien CC, Lin JC (2002) Secret image sharing. Comput Graph 26:765–770
Wang RZ, Shyu SJ (2007) Scalable secret image sharing. Signal Process Image Commun 22(4):363–373
Wang J, Jiang H, Yuan Z, Cheng MM, Hu X, Zheng N (2017) Salient object detection: a discriminative regional feature integration approach. Int J Comput Vis 123(2):251–268
Yang CN, Chu YY (2011) A general (k, n) scalable secret image sharing scheme with the smooth scalability. J Syst Softw 84(10):1726–1733
Yang CN, Huang SM (2010) Constructions and properties of k out of n scalable secret image sharing. Opt Commun 283(9):1750–1762
Yang CN, Chen TS, Yu KH, Wang CC (2007) Improvements of image sharing with steganography and authentication. J Syst Softw 80(7):1070–1076
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Chen, YC., Lee, JS. & Su, HC. Selective scalable secret image sharing with adaptive pixel-embedding technique. Multimed Tools Appl 77, 27107–27121 (2018). https://doi.org/10.1007/s11042-018-5908-6
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-018-5908-6