Abstract
Visual secret sharing is an efficient technique for the protection of real-time message transmissions. For the sake of security enhancement, the data hiding-based visual secret sharing (DH-VSS) methods are emerging and have gained considerable research attention in recent years. However, although most of the existing DH-VSSs are real-time algorithms, the computational complexity for a typical DH-VSS scheme still needs to be improved. Therefore, in this paper, we propose a more efficient real-time \((2,2)\) DH-VSS scheme based on the least-significant-bit (LSB) substitution technique with large embedding capacity. The original cover image is divided into eight bit planes in such a way that the secret messages are embedded in the 3-LSB bit planes to create two meaningful shadow images. This is an adaptive method since extra secret bits can be embedded into the fourth LSB bit plane of the first shadow image, depending on whether the currently processed pixel is in a smooth or complex block. The embedded secret messages can be losslessly extracted by the cooperation of both shadows; the original cover image can also be exactly restored. Experimental results show that the computational complexity of the proposed DH-VSS scheme is significantly lower than that of related state-of-the-art methods. Furthermore, its embedding capacity is greatly enhanced under less execution time. Therefore, the proposed scheme is computation efficient as well as practical so as to be quite suitable for diverse real-time applications.






Similar content being viewed by others
References
Tian, J.: Reversible data embedding using a difference expansion. IEEE Trans. Circuits Syst. Video Technol. 13(8), 890–896 (2003)
Ni, Z., Shi, Y.Q., Ansari, N., Wei, S.: Reversible data hiding. IEEE Trans. Circuits Syst. Video Technol. 16(3), 354–362 (2006)
Thodi, D.M., Rodriguez, J.J.: Expansion embedding techniques for reversible watermarking. IEEE Trans. Image Process. 16(3), 721–730 (2007)
Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)
Blakley, G.R.: Safeguarding cryptographic keys. Proceedings of American Federation of Information Processing Societies National Computer Conference, vol. 48, pp. 313–317, New York, USA (1979)
Naor, M., Shamir, A.: Visual cryptography. Proceedings of Advances in Cryptology-Eurocrypt’94, pp. 1–12, Perugia, Italy (1995)
Zhang, X., Wang, S.: Efficient steganographic embedding by exploiting modification direction. IEEE Commun. Lett. 10(11), 781–783 (2006)
Chang, C.C., Kieu, T.D., Chou, Y.C.: Reversible data hiding scheme using two steganographic images. Proceedings of IEEE Region 10 International Conference (TENCON), pp. 1–4, Taipei, Taiwan (2007)
Chang, C.C., Chou, Y.C., Kieu, T.D.: “Information hiding in dual images with reversibility. Proceedings of the Third International Conference on Multimedia and Ubiquitous Engineering, pp. 145–152, Qingdao, China (2009)
Chang, C.C., Lu, T.C., Horng, G., Huang, Y.H., Hsu, Y.M.: A high payload data embedding scheme using dual stego-images with reversibility. Proceedings of the Third International Conference on Information, Communications and Signal Processing, pp. 1–5, Tainan, Taiwan (2013)
Qin, C., Chang, C.C., Hsu, T.J.: Reversible data hiding scheme based on exploiting modification direction with two steganographic images. Multimedia Tools Appl. 74(15), 5861–5872 (2015)
Chang, C.C., Chou, Y.C., Kieu, T.D.: “An information hiding scheme using Sudoku. Proceedings of The Third International Conference on Innovative Computing, Information and Control (ICICIC 2008), pp. 17–21, Dalian, China (2008)
Chang, C.C., Lin, P.Y., Wang, Z.H., Li, M.C.: A Sudoku-based secret image sharing scheme with reversibility. J. Commun. 5(1), 5–12 (2010)
Wang, Z.H., Guo, C., Chang, C.C.: A novel (n, n) secret image sharing scheme based on Sudoku. J. Electr. Sci. Technol. 11(1), 44–50 (2013)
Huynh, N.T., Bharanitharan, K., Chang, C.C.: Quadri-directional searching algorithm for secret image sharing using meaningful shadows. J. Vis. Commun. Image Represent. 28, 105–112 (2015)
Chang, C.C., Liu, Y., Nguyen, T.S.: A novel turtle shell based scheme for data hiding. The Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP 2014), pp. 89–93, Kitakyushu, Japan (2014)
Liu, Y., Chang, C.C.: A turtle shell-based visual secret sharing scheme with reversibility and authentication. Multimedia Tools Appl. (2018). https://doi.org/10.1007/s11042-018-5785-z
Lee, C.F., Wang, K.H., Chang, C.C., Huang, Y.L.: A reversible data hiding scheme based on dual steganographic images. Proceedings of the Third International Conference on Ubiquitous Information Management and Communication, pp. 228–237, Suwon, Korea (2009)
Lee, C.F., Huang, Y.L.: Reversible data hiding scheme based on dual stegano-images using orientation combinations. Telecommun. Syst. 52(4), 2237–2247 (2013)
Lu, T.C., Tseng, C.Y., Wu, J.H.: Dual imaging-based reversible hiding technique using LSB matching. Signal Process. 108, 77–89 (2015)
Lu, T.C., Wu, J.H., Huang, C.C.: Dual-image-based reversible data hiding method using center folding strategy. Signal Process. 115, 195–213 (2015)
Qin, C., Ji, P., Zhang, X., Dong, J., Wang, J.: Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy. Signal Process. 138, 280–293 (2017)
Qin, C., Ji, P., Chang, C.C., Dong, J., Sun, X.: Non-uniform watermark sharing based on optimal iterative BTC for image tampering recovery. IEEE Multimed. (2018). https://doi.org/10.1109/MMUL.2018.112142509
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Rights and permissions
About this article
Cite this article
Chang, CC., Liu, Y. & Chen, K. Real-time adaptive visual secret sharing with reversibility and high capacity. J Real-Time Image Proc 16, 871–881 (2019). https://doi.org/10.1007/s11554-018-0813-9
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11554-018-0813-9