Abstract
Computational secret image sharing (CSIS) is an effective way to protect a secret image during its transmission and storage, and thus it has attracted lots of attentions since its appearance. Nowadays, it has become a hot topic for researchers to improve the embedding capacity and eliminate the underflow and overflow situations, which is embarrassing and difficult to deal with. The scheme, which has the highest embedding capacity among the existing schemes, has the underflow and overflow problems. Although the underflow and overflow situations have been well dealt with by different methods, the embedding capacities of these methods are reduced more or less. Motivated by these concerns, we propose a novel scheme, in which we take the differential coding, Huffman coding, and data converting to compress the secret image before embedding it to further improve the embedding capacity, and the pixel mapping matrix embedding method with a newly designed matrix is used to embed secret image data into the cover image to avoid the underflow and overflow situations. Experiment results show that our scheme can improve the embedding capacity further and eliminate the underflow and overflow situations at the same time.
Highlights
Secret sharing was put forward by Blakley [1] and Shamir [2] in 1979, respectively
Due to the extensive application of images in our daily life, in 1995, Naor and Shamir [3] introduced the concept of secret sharing into the image field and proposed the first secret image sharing scheme which is known as visual secret sharing
Data converting is used to adapt this scheme to the power-of-two Galois Field GF(24)
Summary
Secret sharing was put forward by Blakley [1] and Shamir [2] in 1979, respectively. Due to the extensive application of images in our daily life, in 1995, Naor and Shamir [3] introduced the concept of secret sharing into the image field and proposed the first secret image sharing scheme which is known as visual secret sharing. Much attention was paid to the secret image sharing. It is such a technology, in which a secret image is transformed into multiple shares or stego images, so that the secret image can be recovered with a certain set of shares or stego images. In this case, we can use these shares to substitute the secret image during its transmission or storage and this can prevent the attackers from obtaining the secret image by monitoring communication channels or breaking into the storage devices. It is an effective method to ensure the security of the secret image during its transmission or storage, especially in the fields of military, commercial, financial, and so forth [3]
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.