Skip to main content

Advertisement

Log in

Real-time adaptive visual secret sharing with reversibility and high capacity

  • Special Issue Paper
  • Published:
Journal of Real-Time Image Processing Aims and scope Submit manuscript

Abstract

Visual secret sharing is an efficient technique for the protection of real-time message transmissions. For the sake of security enhancement, the data hiding-based visual secret sharing (DH-VSS) methods are emerging and have gained considerable research attention in recent years. However, although most of the existing DH-VSSs are real-time algorithms, the computational complexity for a typical DH-VSS scheme still needs to be improved. Therefore, in this paper, we propose a more efficient real-time \((2,2)\) DH-VSS scheme based on the least-significant-bit (LSB) substitution technique with large embedding capacity. The original cover image is divided into eight bit planes in such a way that the secret messages are embedded in the 3-LSB bit planes to create two meaningful shadow images. This is an adaptive method since extra secret bits can be embedded into the fourth LSB bit plane of the first shadow image, depending on whether the currently processed pixel is in a smooth or complex block. The embedded secret messages can be losslessly extracted by the cooperation of both shadows; the original cover image can also be exactly restored. Experimental results show that the computational complexity of the proposed DH-VSS scheme is significantly lower than that of related state-of-the-art methods. Furthermore, its embedding capacity is greatly enhanced under less execution time. Therefore, the proposed scheme is computation efficient as well as practical so as to be quite suitable for diverse real-time applications.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Tian, J.: Reversible data embedding using a difference expansion. IEEE Trans. Circuits Syst. Video Technol. 13(8), 890–896 (2003)

    Article  Google Scholar 

  2. Ni, Z., Shi, Y.Q., Ansari, N., Wei, S.: Reversible data hiding. IEEE Trans. Circuits Syst. Video Technol. 16(3), 354–362 (2006)

    Article  Google Scholar 

  3. Thodi, D.M., Rodriguez, J.J.: Expansion embedding techniques for reversible watermarking. IEEE Trans. Image Process. 16(3), 721–730 (2007)

    Article  MathSciNet  Google Scholar 

  4. Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)

    Article  MathSciNet  MATH  Google Scholar 

  5. Blakley, G.R.: Safeguarding cryptographic keys. Proceedings of American Federation of Information Processing Societies National Computer Conference, vol. 48, pp. 313–317, New York, USA (1979)

  6. Naor, M., Shamir, A.: Visual cryptography. Proceedings of Advances in Cryptology-Eurocrypt’94, pp. 1–12, Perugia, Italy (1995)

  7. Zhang, X., Wang, S.: Efficient steganographic embedding by exploiting modification direction. IEEE Commun. Lett. 10(11), 781–783 (2006)

    Article  Google Scholar 

  8. Chang, C.C., Kieu, T.D., Chou, Y.C.: Reversible data hiding scheme using two steganographic images. Proceedings of IEEE Region 10 International Conference (TENCON), pp. 1–4, Taipei, Taiwan (2007)

  9. Chang, C.C., Chou, Y.C., Kieu, T.D.: “Information hiding in dual images with reversibility. Proceedings of the Third International Conference on Multimedia and Ubiquitous Engineering, pp. 145–152, Qingdao, China (2009)

  10. Chang, C.C., Lu, T.C., Horng, G., Huang, Y.H., Hsu, Y.M.: A high payload data embedding scheme using dual stego-images with reversibility. Proceedings of the Third International Conference on Information, Communications and Signal Processing, pp. 1–5, Tainan, Taiwan (2013)

  11. Qin, C., Chang, C.C., Hsu, T.J.: Reversible data hiding scheme based on exploiting modification direction with two steganographic images. Multimedia Tools Appl. 74(15), 5861–5872 (2015)

    Article  Google Scholar 

  12. Chang, C.C., Chou, Y.C., Kieu, T.D.: “An information hiding scheme using Sudoku. Proceedings of The Third International Conference on Innovative Computing, Information and Control (ICICIC 2008), pp. 17–21, Dalian, China (2008)

  13. Chang, C.C., Lin, P.Y., Wang, Z.H., Li, M.C.: A Sudoku-based secret image sharing scheme with reversibility. J. Commun. 5(1), 5–12 (2010)

    Article  Google Scholar 

  14. Wang, Z.H., Guo, C., Chang, C.C.: A novel (n, n) secret image sharing scheme based on Sudoku. J. Electr. Sci. Technol. 11(1), 44–50 (2013)

    Google Scholar 

  15. Huynh, N.T., Bharanitharan, K., Chang, C.C.: Quadri-directional searching algorithm for secret image sharing using meaningful shadows. J. Vis. Commun. Image Represent. 28, 105–112 (2015)

    Article  Google Scholar 

  16. Chang, C.C., Liu, Y., Nguyen, T.S.: A novel turtle shell based scheme for data hiding. The Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2014), pp. 89–93, Kitakyushu, Japan (2014)

  17. Liu, Y., Chang, C.C.: A turtle shell-based visual secret sharing scheme with reversibility and authentication. Multimedia Tools Appl. (2018). https://doi.org/10.1007/s11042-018-5785-z

    Google Scholar 

  18. Lee, C.F., Wang, K.H., Chang, C.C., Huang, Y.L.: A reversible data hiding scheme based on dual steganographic images. Proceedings of the Third International Conference on Ubiquitous Information Management and Communication, pp. 228–237, Suwon, Korea (2009)

  19. Lee, C.F., Huang, Y.L.: Reversible data hiding scheme based on dual stegano-images using orientation combinations. Telecommun. Syst. 52(4), 2237–2247 (2013)

    Article  Google Scholar 

  20. Lu, T.C., Tseng, C.Y., Wu, J.H.: Dual imaging-based reversible hiding technique using LSB matching. Signal Process. 108, 77–89 (2015)

    Article  Google Scholar 

  21. Lu, T.C., Wu, J.H., Huang, C.C.: Dual-image-based reversible data hiding method using center folding strategy. Signal Process. 115, 195–213 (2015)

    Article  Google Scholar 

  22. Qin, C., Ji, P., Zhang, X., Dong, J., Wang, J.: Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy. Signal Process. 138, 280–293 (2017)

    Article  Google Scholar 

  23. Qin, C., Ji, P., Chang, C.C., Dong, J., Sun, X.: Non-uniform watermark sharing based on optimal iterative BTC for image tampering recovery. IEEE Multimed. (2018). https://doi.org/10.1109/MMUL.2018.112142509

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yanjun Liu.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chang, CC., Liu, Y. & Chen, K. Real-time adaptive visual secret sharing with reversibility and high capacity. J Real-Time Image Proc 16, 871–881 (2019). https://doi.org/10.1007/s11554-018-0813-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11554-018-0813-9

Keywords