Sharing and hiding a secret image in color palette images with authentication
- PDF / 3,941,088 Bytes
- 21 Pages / 439.642 x 666.49 pts Page_size
- 85 Downloads / 195 Views
Sharing and hiding a secret image in color palette images with authentication Xiaotian Wu1
· Ching-Nung Yang2 · Yi-Yun Yang2
Received: 30 May 2019 / Revised: 29 April 2020 / Accepted: 24 June 2020 / © Springer Science+Business Media, LLC, part of Springer Nature 2020
Abstract Existing secret image sharing (SIS) schemes with steganography and authentication are only suitable for uncompressed grayscale images. To make it more practical, a scheme for sharing and hiding a secret image in color palette images with authentication is proposed in this paper. Three commonly used system color palettes are considered. In sharing phase, a secret image is encoded into shared bits by polynomial based SIS. The shared bits are concealed into the color palette cover image to form the stego images. Meanwhile, the authentication parity bits are generated and embedded as well. Two embedding strategies are developed for the color palette images. In authentication and recovery phase, the integrity of each stego image is verified. Then, the secret image are reconstructed by sufficient authentic stego images. Experimental results are demonstrated to show the effectiveness and merits of the proposed scheme. Keywords Secret image sharing · Steganography · Authentication · Color image · Palette image · Embedding
1 Introduction Nowadays, digital images have been widely used in different applications, such as transmission [14], zooming [13, 32], compression [30] and watermarking [18]. To prevent the content of an image from being accessed by illegal users, image encryption is used. Secret image sharing (SIS) can be considered as a special kind of image encryptions that splits a secret image into multiple pieces called shares or shadows, while sufficient shares can successfully reconstruct the image, but insufficient ones give no clue about the image. SIS Xiaotian Wu
[email protected] Ching-Nung Yang [email protected] 1
Department of Computer Science, Jinan University, Guangzhou, China
2
Department of Computer Science and Information Engineering, National Dong Hwa University, Hualien, Taiwan
Multimedia Tools and Applications
is derived from secret sharing, where the basic concept of secret sharing was proposed independently by Shamir [35] and Blakley [2] in 1979. In a (k, n) threshold SIS, a secret image is divided into n shadows which are then distributed to n corresponding participants. When the shares of any k or more participants are collected, the secret image can be revealed. But any (k − 1) or less shares reveal nothing about the secret. Generally speaking, SIS is separated into two categories: (1) visual cryptography scheme (VCS) for binary images and (2) SIS for grayscale/color images. For VCS, it encrypts a binary secret image into n random-looking shares. Any k or more shares can visually recover the secret by stacking the shares together via human visual system without computation. Based on Naor and Shamir’s poineer work [33], different kinds of VCSs [5–7, 11, 12, 36, 38, 40, 41, 48, 49, 52] were proposed. For SIS
Data Loading...