Skip to main content
Log in

Sharing and hiding a secret image in color palette images with authentication

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Existing secret image sharing (SIS) schemes with steganography and authentication are only suitable for uncompressed grayscale images. To make it more practical, a scheme for sharing and hiding a secret image in color palette images with authentication is proposed in this paper. Three commonly used system color palettes are considered. In sharing phase, a secret image is encoded into shared bits by polynomial based SIS. The shared bits are concealed into the color palette cover image to form the stego images. Meanwhile, the authentication parity bits are generated and embedded as well. Two embedding strategies are developed for the color palette images. In authentication and recovery phase, the integrity of each stego image is verified. Then, the secret image are reconstructed by sufficient authentic stego images. Experimental results are demonstrated to show the effectiveness and merits of the proposed scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Bao L, Yi S, Zhou Y (2017) Combination of sharing matrix and image encryption for lossless (k, n)-secret image sharing. IEEE Trans Image Process 26(12):5618–5631

    MathSciNet  MATH  Google Scholar 

  2. Blakley GR (1979) Safeguarding cryptographic keys. In: Proceedings of the national computer conference, vol 88, pp 317–317

  3. Chan C, Cheng L (2004) Hiding data in images by simple LSB substitution. Pattern Recogn 37(3):469–474

    MATH  Google Scholar 

  4. Chang CC, Hsieh YP, Lin CH (2008) Sharing secrets in stego images with authentication. Pattern Recogn 41(10):3130–3137

    MATH  Google Scholar 

  5. Chao HC, Fan TY (2017) Random-grid based progressive visual secret sharing scheme with adaptive priority. Digital Signal Processing 68:69–80

    Google Scholar 

  6. Chen T, Tsao K (2009) Visual secret sharing by random grids revisited. Pattern Recogn 42(9):2203–2217

    MATH  Google Scholar 

  7. Cimato S, De Prisco R, De Santis A (2006) Probabilistic visual cryptography schemes. Comput J 49(1):97–107

    MATH  Google Scholar 

  8. Eslami Z, Razzaghi S, Ahmadabadi JZ (2010) Secret image sharing based on cellular automata and steganography. Pattern Recogn 43(1):397–404

    MATH  Google Scholar 

  9. Fridrich J, Du R (1999) Secure steganographic methods for palette images. In: International workshop on information hiding. Springer, pp 47–60

  10. Ghebleh M, Kanso A (2018) A novel secret image sharing scheme using large primes. Multimed Tools Appl 77(10):11903–11923

    Google Scholar 

  11. Ito R, Kuwakado H, Tanaka H (1999) Image size invariant visual cryptography. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences 82(10):2172–2177

    Google Scholar 

  12. Jia X, Wang D, Nie D, Zhang C (2018) Collaborative visual cryptography schemes. IEEE Trans Circ Sys Video Technol 28(5):1056–1070

    Google Scholar 

  13. Jindal H, Kasana SS, Saxena S (2016) A novel image zooming technique using wavelet coefficients. In: Proceedings of the international conference on recent cognizance in wireless communication & image processing. Springer, pp 1–7

  14. Jindal H, Kasana SS, Saxena S (2018) Underwater pipelines panoramic image transmission and refinement using acoustic sensors. International Journal of Wavelets, Multiresolution and Information Processing 16(03):1850013

    MathSciNet  MATH  Google Scholar 

  15. Johnson NF, Jajodia S (1998) Exploring steganography: seeing the unseen. Computer 31(2)

  16. Kabirirad S, Eslami Z (2018) A (t, n)-multi secret image sharing scheme based on boolean operations. J Vis Commun Image Represent 57:39–47

    Google Scholar 

  17. Kanso A, Ghebleh M (2017) An efficient (t, n)–threshold secret image sharing scheme. Multimed Tools Appl 76(15):16369–16388

    Google Scholar 

  18. Kaur S, Jindal H (2017) Enhanced image watermarking technique using wavelets and interpolation. International Journal of Image, Graphics and Signal Processing 11(7):23

    Google Scholar 

  19. Kim SM, Cheng Z, Yoo KY (2009) A new steganography scheme based on an index-color image. In: 2009 sixth international conference on information technology: new generations. IEEE, pp 376–381

  20. Krawczyk H, Bellare M, Canetti R (1997) Hmac: keyed-hashing for message authentication

  21. Kumar JS, Vemali C (2014) A novel secure image hiding on indexed images using pixel-matching technique. Oriental Journal of Computer Science and Technology 7(3):358–362

    Google Scholar 

  22. Lee JS, Chen YR (2017) Selective scalable secret image sharing with verification. Multimed Tools Appl 76(1):1–11

    Google Scholar 

  23. Li P, Liu Z, Yang CN (2018) A construction method of (t, k, n)-essential secret image sharing scheme. Signal Process Image Commun 65:210–220

    Google Scholar 

  24. Li P, Yang CN, Zhou Z (2016) Essential secret image sharing scheme with the same size of shadows. Digital Signal Processing 50:51–60

    Google Scholar 

  25. Lin CC, Tsai WH (2004) Secret image sharing with steganography and authentication. J Sys Soft 73(3):405–414

    Google Scholar 

  26. Liu Y, Yang C (2017) Scalable secret image sharing scheme with essential shadows. Signal Process Image Commun 58:49–55

    Google Scholar 

  27. Liu YN, Zhong Q, Xie M, Chen ZB (2018) A novel multiple-level secret image sharing scheme. Multimed Tools Appli 77(5):6017–6031

    Google Scholar 

  28. Liu YX, Yang CN, Chou YS, Wu SY, Sun QD (2018) Progressive (k, n) secret image sharing scheme with meaningful shadow images by gemd and rgemd. J Vis Commun Image Represent 55:766–777

    Google Scholar 

  29. Liu YX, Yang CN, Wu CM, Sun QD, Bi W (2019) Threshold changeable secret image sharing scheme based on interpolation polynomial. Multimed Tools Appl 78(13):18653–18667

    Google Scholar 

  30. Mander K, Jindal H (2017) An improved image compression-decompression technique using block truncation and wavelets. International Journal of Image, Graphics and Signal Processing 9(8):17

    Google Scholar 

  31. Marvel LM, Boncelet CG, Retter CT (1999) Spread spectrum image steganography. IEEE Trans Image Process 8(8):1075–1083

    Google Scholar 

  32. Mittal A, Jindal H (2017) Novelty in image reconstruction using dwt and clahe. International Journal of Image, Graphics and Signal Processing 9(5):28

    Google Scholar 

  33. Naor M, Shamir A (1995) Visual cryptography. Lect Notes Comput Sci 950(1):1–12

    MathSciNet  MATH  Google Scholar 

  34. NIST SHS (1995) Federal information processing standard. Tech. rep., FIPS-180-1 April

  35. Shamir A (1979) How to share a secret. Commun ACM 22(11):612–613

    MathSciNet  MATH  Google Scholar 

  36. Shyu SJ (2018) Xor-based visual cryptographic schemes with monotonously increasing and flawless reconstruction properties. IEEE Trans Circ Sys Video Technol 28(9):2397–2401

    Google Scholar 

  37. Thien CC, Lin JC (2002) Secret image sharing. Computers & Graphics 26(5):765–770

    Google Scholar 

  38. Tuyls P, Hollmann H, Lint J, Tolhuizen L (2005) Xor-based visual cryptography schemes. Des Codes Crypt 37(1):169–186

    MathSciNet  MATH  Google Scholar 

  39. Wu CC, Kao SJ, Hwang MS (2011) A high quality image sharing with steganography and adaptive authentication scheme. J Sys Softw 84 (12):2196–2207

    Google Scholar 

  40. Wu X, Sun W (2013) Improving the visual quality of random grid-based visual secret sharing. Signal Process 93(5):977–995

    Google Scholar 

  41. Wu X, Sun W (2014) Extended capabilities for xor-based visual cryptography. IEEE Trans Inform Forensics Secur 9(10):1592–1605

    Google Scholar 

  42. Wu X, Weng J, Yan W (2018) Adopting secret sharing for reversible data hiding in encrypted images. Signal Process 143:269–281

    Google Scholar 

  43. Wu X, Yang CN (2019) Invertible secret image sharing with steganography and authentication for ambtc compressed images. Signal Process Image Commun 78:437–447

    Google Scholar 

  44. Wu X, Yang CN, Zhuang YT, Hsu SC (2018) Improving recovered image quality in secret image sharing by simple modular arithmetic. Signal Process Image Commun 66:42–49

    Google Scholar 

  45. Xie XZ, Chang CC, Lin CC (2019) Reversibility-oriented secret image sharing mechanism with steganography and authentication based on code division multiplexing. IET Image Process 13(9):1411–1420

    Google Scholar 

  46. Yan X, Gong Q, Li L, Yang G, Lu Y, Liu J (2020) Secret image sharing with separate shadow authentication ability. Signal Process Image Commun 82:115721

    Google Scholar 

  47. Yan X, Lu Y, Liu L, Liu J, Yang G (2018) Chinese remainder theorem-based two-in-one image secret sharing with three decoding options. Digital Signal Processing 82:80–90

    Google Scholar 

  48. Yan X, Wang S, Niu X, Yang CN (2015) Halftone visual cryptography with minimum auxiliary black pixels and uniform image quality. Digital Signal Processing 38:53–65

    Google Scholar 

  49. Yang C (2004) New visual secret sharing schemes using probabilistic method. Pattern Recogn Lett 25(4):486–494

    Google Scholar 

  50. Yang C, Chen T, Yu K, Wang C (2007) Improvements of image sharing with steganography and authentication. J Sys Softw 80(7):1070–1076

    Google Scholar 

  51. Yang CN, Ouyang JF, Harn L (2012) Steganography and authentication in image sharing without parity bits. Opt Commun 285(7):1725–1735

    Google Scholar 

  52. Yang CN, Wu CC, Lin YC (2017) K out of n region-based progressive visual cryptography. IEEE Trans Circ Sys Video Technol

  53. Zarepour-Ahmadabadi J, Ahmadabadi MS, Latif A (2016) An adaptive secret image sharing with a new bitwise steganographic property. Inf Sci 369:467–480

    MathSciNet  Google Scholar 

Download references

Acknowledgments

This work was partially supported by National Natural Science Foundation of China (Grant Nos. 61972179 and 61602211), Guangdong Basic and Applied Basic Research Foundation (Grant No. 2020A1515011476), Science and Technology Program of Guangzhou, China (Grant No. 201707010259), Fundamental Research Funds for the Central Universities and Ministry of Science and Technology, under Grant MOST 108-2221-E-259-009- MY2 and 109-2221-E-259-010.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiaotian Wu.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wu, X., Yang, CN. & Yang, YY. Sharing and hiding a secret image in color palette images with authentication. Multimed Tools Appl 79, 25657–25677 (2020). https://doi.org/10.1007/s11042-020-09253-2

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-09253-2

Keywords

Navigation