Abstract
Existing secret image sharing (SIS) schemes with steganography and authentication are only suitable for uncompressed grayscale images. To make it more practical, a scheme for sharing and hiding a secret image in color palette images with authentication is proposed in this paper. Three commonly used system color palettes are considered. In sharing phase, a secret image is encoded into shared bits by polynomial based SIS. The shared bits are concealed into the color palette cover image to form the stego images. Meanwhile, the authentication parity bits are generated and embedded as well. Two embedding strategies are developed for the color palette images. In authentication and recovery phase, the integrity of each stego image is verified. Then, the secret image are reconstructed by sufficient authentic stego images. Experimental results are demonstrated to show the effectiveness and merits of the proposed scheme.
Similar content being viewed by others
References
Bao L, Yi S, Zhou Y (2017) Combination of sharing matrix and image encryption for lossless (k, n)-secret image sharing. IEEE Trans Image Process 26(12):5618–5631
Blakley GR (1979) Safeguarding cryptographic keys. In: Proceedings of the national computer conference, vol 88, pp 317–317
Chan C, Cheng L (2004) Hiding data in images by simple LSB substitution. Pattern Recogn 37(3):469–474
Chang CC, Hsieh YP, Lin CH (2008) Sharing secrets in stego images with authentication. Pattern Recogn 41(10):3130–3137
Chao HC, Fan TY (2017) Random-grid based progressive visual secret sharing scheme with adaptive priority. Digital Signal Processing 68:69–80
Chen T, Tsao K (2009) Visual secret sharing by random grids revisited. Pattern Recogn 42(9):2203–2217
Cimato S, De Prisco R, De Santis A (2006) Probabilistic visual cryptography schemes. Comput J 49(1):97–107
Eslami Z, Razzaghi S, Ahmadabadi JZ (2010) Secret image sharing based on cellular automata and steganography. Pattern Recogn 43(1):397–404
Fridrich J, Du R (1999) Secure steganographic methods for palette images. In: International workshop on information hiding. Springer, pp 47–60
Ghebleh M, Kanso A (2018) A novel secret image sharing scheme using large primes. Multimed Tools Appl 77(10):11903–11923
Ito R, Kuwakado H, Tanaka H (1999) Image size invariant visual cryptography. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences 82(10):2172–2177
Jia X, Wang D, Nie D, Zhang C (2018) Collaborative visual cryptography schemes. IEEE Trans Circ Sys Video Technol 28(5):1056–1070
Jindal H, Kasana SS, Saxena S (2016) A novel image zooming technique using wavelet coefficients. In: Proceedings of the international conference on recent cognizance in wireless communication & image processing. Springer, pp 1–7
Jindal H, Kasana SS, Saxena S (2018) Underwater pipelines panoramic image transmission and refinement using acoustic sensors. International Journal of Wavelets, Multiresolution and Information Processing 16(03):1850013
Johnson NF, Jajodia S (1998) Exploring steganography: seeing the unseen. Computer 31(2)
Kabirirad S, Eslami Z (2018) A (t, n)-multi secret image sharing scheme based on boolean operations. J Vis Commun Image Represent 57:39–47
Kanso A, Ghebleh M (2017) An efficient (t, n)–threshold secret image sharing scheme. Multimed Tools Appl 76(15):16369–16388
Kaur S, Jindal H (2017) Enhanced image watermarking technique using wavelets and interpolation. International Journal of Image, Graphics and Signal Processing 11(7):23
Kim SM, Cheng Z, Yoo KY (2009) A new steganography scheme based on an index-color image. In: 2009 sixth international conference on information technology: new generations. IEEE, pp 376–381
Krawczyk H, Bellare M, Canetti R (1997) Hmac: keyed-hashing for message authentication
Kumar JS, Vemali C (2014) A novel secure image hiding on indexed images using pixel-matching technique. Oriental Journal of Computer Science and Technology 7(3):358–362
Lee JS, Chen YR (2017) Selective scalable secret image sharing with verification. Multimed Tools Appl 76(1):1–11
Li P, Liu Z, Yang CN (2018) A construction method of (t, k, n)-essential secret image sharing scheme. Signal Process Image Commun 65:210–220
Li P, Yang CN, Zhou Z (2016) Essential secret image sharing scheme with the same size of shadows. Digital Signal Processing 50:51–60
Lin CC, Tsai WH (2004) Secret image sharing with steganography and authentication. J Sys Soft 73(3):405–414
Liu Y, Yang C (2017) Scalable secret image sharing scheme with essential shadows. Signal Process Image Commun 58:49–55
Liu YN, Zhong Q, Xie M, Chen ZB (2018) A novel multiple-level secret image sharing scheme. Multimed Tools Appli 77(5):6017–6031
Liu YX, Yang CN, Chou YS, Wu SY, Sun QD (2018) Progressive (k, n) secret image sharing scheme with meaningful shadow images by gemd and rgemd. J Vis Commun Image Represent 55:766–777
Liu YX, Yang CN, Wu CM, Sun QD, Bi W (2019) Threshold changeable secret image sharing scheme based on interpolation polynomial. Multimed Tools Appl 78(13):18653–18667
Mander K, Jindal H (2017) An improved image compression-decompression technique using block truncation and wavelets. International Journal of Image, Graphics and Signal Processing 9(8):17
Marvel LM, Boncelet CG, Retter CT (1999) Spread spectrum image steganography. IEEE Trans Image Process 8(8):1075–1083
Mittal A, Jindal H (2017) Novelty in image reconstruction using dwt and clahe. International Journal of Image, Graphics and Signal Processing 9(5):28
Naor M, Shamir A (1995) Visual cryptography. Lect Notes Comput Sci 950(1):1–12
NIST SHS (1995) Federal information processing standard. Tech. rep., FIPS-180-1 April
Shamir A (1979) How to share a secret. Commun ACM 22(11):612–613
Shyu SJ (2018) Xor-based visual cryptographic schemes with monotonously increasing and flawless reconstruction properties. IEEE Trans Circ Sys Video Technol 28(9):2397–2401
Thien CC, Lin JC (2002) Secret image sharing. Computers & Graphics 26(5):765–770
Tuyls P, Hollmann H, Lint J, Tolhuizen L (2005) Xor-based visual cryptography schemes. Des Codes Crypt 37(1):169–186
Wu CC, Kao SJ, Hwang MS (2011) A high quality image sharing with steganography and adaptive authentication scheme. J Sys Softw 84 (12):2196–2207
Wu X, Sun W (2013) Improving the visual quality of random grid-based visual secret sharing. Signal Process 93(5):977–995
Wu X, Sun W (2014) Extended capabilities for xor-based visual cryptography. IEEE Trans Inform Forensics Secur 9(10):1592–1605
Wu X, Weng J, Yan W (2018) Adopting secret sharing for reversible data hiding in encrypted images. Signal Process 143:269–281
Wu X, Yang CN (2019) Invertible secret image sharing with steganography and authentication for ambtc compressed images. Signal Process Image Commun 78:437–447
Wu X, Yang CN, Zhuang YT, Hsu SC (2018) Improving recovered image quality in secret image sharing by simple modular arithmetic. Signal Process Image Commun 66:42–49
Xie XZ, Chang CC, Lin CC (2019) Reversibility-oriented secret image sharing mechanism with steganography and authentication based on code division multiplexing. IET Image Process 13(9):1411–1420
Yan X, Gong Q, Li L, Yang G, Lu Y, Liu J (2020) Secret image sharing with separate shadow authentication ability. Signal Process Image Commun 82:115721
Yan X, Lu Y, Liu L, Liu J, Yang G (2018) Chinese remainder theorem-based two-in-one image secret sharing with three decoding options. Digital Signal Processing 82:80–90
Yan X, Wang S, Niu X, Yang CN (2015) Halftone visual cryptography with minimum auxiliary black pixels and uniform image quality. Digital Signal Processing 38:53–65
Yang C (2004) New visual secret sharing schemes using probabilistic method. Pattern Recogn Lett 25(4):486–494
Yang C, Chen T, Yu K, Wang C (2007) Improvements of image sharing with steganography and authentication. J Sys Softw 80(7):1070–1076
Yang CN, Ouyang JF, Harn L (2012) Steganography and authentication in image sharing without parity bits. Opt Commun 285(7):1725–1735
Yang CN, Wu CC, Lin YC (2017) K out of n region-based progressive visual cryptography. IEEE Trans Circ Sys Video Technol
Zarepour-Ahmadabadi J, Ahmadabadi MS, Latif A (2016) An adaptive secret image sharing with a new bitwise steganographic property. Inf Sci 369:467–480
Acknowledgments
This work was partially supported by National Natural Science Foundation of China (Grant Nos. 61972179 and 61602211), Guangdong Basic and Applied Basic Research Foundation (Grant No. 2020A1515011476), Science and Technology Program of Guangzhou, China (Grant No. 201707010259), Fundamental Research Funds for the Central Universities and Ministry of Science and Technology, under Grant MOST 108-2221-E-259-009- MY2 and 109-2221-E-259-010.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Wu, X., Yang, CN. & Yang, YY. Sharing and hiding a secret image in color palette images with authentication. Multimed Tools Appl 79, 25657–25677 (2020). https://doi.org/10.1007/s11042-020-09253-2
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-020-09253-2