A Secret Image Sharing Method Using Integer Wavelet Transform
- PDF / 3,452,337 Bytes
- 13 Pages / 600.03 x 792 pts Page_size
- 79 Downloads / 209 Views
Research Article A Secret Image Sharing Method Using Integer Wavelet Transform Chin-Pan Huang1 and Ching-Chung Li2 1 Department 2 Department
of Computer and Communication Engineering, Ming Chuan University, Taoyuan 333, Taiwan of Electrical and Computer Engineering, University of Pittsburgh, Pittsburgh, PA 15261, USA
Received 28 August 2006; Revised 13 February 2007; Accepted 25 June 2007 Recommended by B¨ulent Sankur A new image sharing method, based on the reversible integer-to-integer (ITI) wavelet transform and Shamir’s (r, m) threshold scheme is presented, that provides highly compact shadows for real-time progressive transmission. This method, working in the wavelet domain, processes the transform coefficients in each subband, divides each of the resulting combination coefficients into m shadows, and allows recovery of the complete secret image by using any r or more shadows (r ≤ m). We take advantages of properties of the wavelet transform multiresolution representation, such as coefficient magnitude decay and excellent energy compaction, to design combination procedures for the transform coefficients and processing sequences in wavelet subbands such that small shadows for real-time progressive transmission are obtained. Experimental results demonstrate that the proposed method yields small shadow images and has the capabilities of real-time progressive transmission and perfect reconstruction of secret images. Copyright © 2007 C.-P. Huang and C.-C. Li. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
1.
INTRODUCTION
With the rapid development of computer and communication networks, Internet has been established worldwide that brings numerous applications such as commercial services, telemedicine, and military document transmissions. Due to the nature of the network, Internet is an open system; to transmit secret application data securely is an issue of great concern. Security could be introduced in many different ways, for example, by image hiding and watermarking. However, the common weak point of them is that a secret image is protected in a single information carrier, and once the carrier is damaged or destroyed the secret is lost. If many duplicates are used to overcome this deficiency, the danger of security exposure will also increase [1, 2]. A secret image sharing method provides a viable solution. To process the received data efficiently is another problem. As transmission proceeds, the receiver may gradually access images with increased visual quality. If the received data is of no interest, the transmission can be terminated immediately to increase efficacy. Therefore, the functionality of progressive reconstruction is very essential to be built in the scheme. The goal is to develop an efficient secret image sharing method with progressive transmission capability.
Shamir [1] and Blakley [3] first proposed a concept of secret sharing called the
Data Loading...