Sharing a Large Secret Image Using Meaningful Shadows Based on VQ and Inpainting |
Wang, Zhi-Hui
(School of Software, Dalian University of Technology)
Chen, Kuo-Nan (Department of Computer Science and Information Engineering, National Chung Cheng University) Chang, Chin-Chen (Department of Computer Science and Information Engineering, Asia University) Qin, Chuan (Department of Information Engineering and Computer Science, Feng Chia University) |
1 | L. L. An, X. B. Gao, X. L. Li, D. C. Tao , C. Deng and J. Li “Robust reversible watermarking via clustering and enhanced pixel-wise masking,” IEEE Transactions on Image Processing, vol. 21, no. 8, pp. 3598-3611, August, 2012. Article(CrossRefLink) DOI |
2 | L. H. He, D. C. Tao, X. L. Li and X. B. Gao, “Sparse representation for blind image quality assessment,” in Proc. of 2012 IEEE Conference on Computer Vision and Pattern Recognition, Providence, Rhode Island, USA, pp. 1146-1153, June 16-21, 2012. |
3 | C. Qin, F. Cao and X. P. Zhang, “Efficient image inpainting using adaptive edge-preserving propagation,” The Imaging Science Journal, vol. 59, no. 4, pp. 211-218, August, 2011. Article(CrossRefLink) DOI |
4 | C. Qin, S. Z. Wang and X. P. Zhang, “Simultaneous inpainting for image structure and texture using anisotropic heat transfer model,” Multimedia Tools and Applications, vol. 56, no. 3, pp. 469-483, 2012. Article(CrossRefLink) DOI |
5 | X. B. Gao, L. L. An, Y. Yuan, D. C. Tao and X. L. Li, “Lossless data embedding using generalized statistical quantity histogram,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 21, no. 8, pp. 1061-1069, August, 2011. Article(CrossRefLink) DOI |
6 | X. Zhang and S. Wang, “Efficient steganographic embedding by exploiting modification direction,” IEEE Communications Letters, vol. 10, no. 11, pp. 781-783, November, 2006. Article(CrossRefLink) DOI |
7 | C. C. Wu, S. J. Kao, and M. S. Hwang, “A high quality image sharing with steganography and adaptive authentication scheme,” The Journal of Systems and Software, vol. 84, no. 12, pp. 2196-2207, December, 2011. Article(CrossRefLink) DOI |
8 | C. C. Wu, M. S. Hwang, and S. J. Kao, “A new approach to the secret image sharing with steganography and authentication,” The Imaging Science Journal, vol. 57, no. 3, pp. 140-151, June, 2009. Article(CrossRefLink) DOI |
9 | S. F. Chiou, I. E. Liao, and M. S. Hwang, “A capacity-enhanced reversible data hiding scheme based on SMVQ,” The Imaging Science Journal, vol. 59, no. 1, pp. 17-24, February, 2011. Article(CrossRefLink) DOI |
10 | A. Shamir, “How to share a secret,” Communications of the Association for Computing Machinery, vol. 22, no. 11, pp. 612-613, November, 1979. Article(CrossRefLink) DOI |
11 | C. C. Chang, Y. P. Hsieh, and C. C. Liao, “A visual secret sharing scheme for progressively restoring secrets,” Journal of Electronic Science and Technology, vol. 9, no. 4, pp. 325-331, December, 2011. |
12 | N. Noar and A. Shamir, “Visual cryptography,” Advances in Cryptology: Eurocrypt’94, Spring-Verlag, Berlin, Germany, pp. 1-12, 1995. |
13 | W. P. Fang, J. C. Lin, “Progressive viewing and sharing of sensitive images,” Pattern Recognition and Image Analysis, vol. 16, no. 4, pp. 632-636, 2006. Article(CrossRefLink) DOI |
14 | D. Jin, W. Q. Yan, and M. S. Kankanhalli “Progressive color visual cryptography,” Journal of Electronic Imaging, vol. 14, no. 3, pp. 033019.1-033019.13, 2005. DOI |
15 | R. M. Gray, “Vector quantization,” IEEE Transactions on Acoustics, Speech and Signal Processing, vol. 1, no. 2, pp. 4-29, 1984. |
16 | C. C. Thien and J. C. Lin, “An image-sharing method with user-friendly shadow images,” IEEE Transactions on Circuits and Systems, vol. 13, no. 12, pp. 1161-1169, 2003. |
17 | C. N. Yang, K. H. Yu, and R. Lukac., “User-friendly image sharing using polynomials with different primes,” International Journal of Imaging Systems and Technology, vol. 17, no. 1, pp. 40-47, June, 2007. Article(CrossRefLink) DOI |
18 | National Institute of Standards & Technology, "Data encryption standard (DES)," Federal Information Processing Standards Publication, vol. 46, January, 1977. |
19 | W. P. Fang, “Friendly progressive visual secret sharing,” Pattern Recognition, vol. 41, no. 4, pp. 1410-1414, April, 2008. Article(CrossRefLink) DOI |
20 | Y. Linde, A. Buzo and R.M. Gray, “An algorithm for vector quantizer design,” IEEE Transactions on Communications, vol. 28, no. 1, pp. 84-95, January,1980. Article(CrossRefLink) DOI |
21 | National Institute of Standards & Technology, "Announcing the advanced encryption standard (AES)," Federal Information Processing Standards Publication, vol. 197, no. l, 2001. |
22 | R. L. Rivest, A. Shamir and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” Communications of the ACM, vol. 21, no. 2, pp. 120-126, February, 1978. Article (CrossRef Link) DOI |
23 | H. Luo, F. X. Yu, H. Chen, Z. L. Huang, H. Li and P. H. Wang, “Reversible data hiding based on block median preservation,” Information Sciences, vol. 181, no. 2, pp. 308-328, January, 2011. Article (CrossRef Link) DOI |
24 | C. C. Chen and C. C. Chang, “LSB-based steganography using reflected gray code,” IEICE Transactions on Information and Systems, vol. E91-D, no. 4, pp. 1110-1116, April, 2008. Article (CrossRef Link) DOI |
25 | F. Peng, X. Li and B. Yang, “Adaptive reversible data hiding scheme based on integer transform,” Signal Processing, vol. 92, no. 1, pp. 54-62, January, 2012. Article (CrossRef Link) DOI |
26 | C. C. Chang, K. N. Chen, C. F. Lee and L. J. Liu, “A secure fragile watermarking scheme based on chaos-and-hamming code,” Journal of Systems and Software, vol. 84, no. 9, pp. 1462-1470, September, 2011. Article (CrossRef Link) DOI |
27 | C. H. Yang, “Inverted pattern approach to improve image quality of information hiding by LSB substitution,” Pattern Recognition, vol. 41, no. 8, pp. 2674-2683, August, 2008. Article (CrossRef Link) DOI |
28 | C. K. Chan and L. M. Cheng, “Hiding data in images by simple LSB substitution,” Pattern Recognition, vol. 37, no. 3, pp. 469-474, March, 2004. Article (CrossRef Link) DOI |