Browse > Article
http://dx.doi.org/10.3837/tiis.2015.12.024

Sharing a Large Secret Image Using Meaningful Shadows Based on VQ and Inpainting  

Wang, Zhi-Hui (School of Software, Dalian University of Technology)
Chen, Kuo-Nan (Department of Computer Science and Information Engineering, National Chung Cheng University)
Chang, Chin-Chen (Department of Computer Science and Information Engineering, Asia University)
Qin, Chuan (Department of Information Engineering and Computer Science, Feng Chia University)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.9, no.12, 2015 , pp. 5170-5188 More about this Journal
Abstract
This paper proposes a novel progressive secret image-hiding scheme based on the inpainting technique, the vector quantization technique (VQ) and the exploiting modification direction (EMD) technique. The proposed scheme first divides the secret image into non-overlapping blocks and categorizes the blocks into two groups: complex and smooth. The blocks in the complex group are compressed by VQ with PCA sorted codebook to obtain the VQ index table. Instead of embedding the original secret image, the proposed method progressively embeds the VQ index table into the cover images by using the EMD technique. After the receiver recovers the complex parts of the secret image by decoding the VQ index table from the shadow images, the smooth parts can be reconstructed by using the inpainting technique based on the content of the complex parts. The experimental results demonstrate that the proposed scheme not only has the advantage of progressive data hiding, which involves more shadow images joining to recover the secret image so as to produce a higher quality steganography image, but also can achieve high hiding capacity with acceptable recovered image quality.
Keywords
Vector Quantization; EMD; secret sharing; image inpainting;
Citations & Related Records
연도 인용수 순위
  • Reference
1 L. L. An, X. B. Gao, X. L. Li, D. C. Tao , C. Deng and J. Li “Robust reversible watermarking via clustering and enhanced pixel-wise masking,” IEEE Transactions on Image Processing, vol. 21, no. 8, pp. 3598-3611, August, 2012. Article(CrossRefLink)   DOI
2 L. H. He, D. C. Tao, X. L. Li and X. B. Gao, “Sparse representation for blind image quality assessment,” in Proc. of 2012 IEEE Conference on Computer Vision and Pattern Recognition, Providence, Rhode Island, USA, pp. 1146-1153, June 16-21, 2012.
3 C. Qin, F. Cao and X. P. Zhang, “Efficient image inpainting using adaptive edge-preserving propagation,” The Imaging Science Journal, vol. 59, no. 4, pp. 211-218, August, 2011. Article(CrossRefLink)   DOI
4 C. Qin, S. Z. Wang and X. P. Zhang, “Simultaneous inpainting for image structure and texture using anisotropic heat transfer model,” Multimedia Tools and Applications, vol. 56, no. 3, pp. 469-483, 2012. Article(CrossRefLink)   DOI
5 X. B. Gao, L. L. An, Y. Yuan, D. C. Tao and X. L. Li, “Lossless data embedding using generalized statistical quantity histogram,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 21, no. 8, pp. 1061-1069, August, 2011. Article(CrossRefLink)   DOI
6 X. Zhang and S. Wang, “Efficient steganographic embedding by exploiting modification direction,” IEEE Communications Letters, vol. 10, no. 11, pp. 781-783, November, 2006. Article(CrossRefLink)   DOI
7 C. C. Wu, S. J. Kao, and M. S. Hwang, “A high quality image sharing with steganography and adaptive authentication scheme,” The Journal of Systems and Software, vol. 84, no. 12, pp. 2196-2207, December, 2011. Article(CrossRefLink)   DOI
8 C. C. Wu, M. S. Hwang, and S. J. Kao, “A new approach to the secret image sharing with steganography and authentication,” The Imaging Science Journal, vol. 57, no. 3, pp. 140-151, June, 2009. Article(CrossRefLink)   DOI
9 S. F. Chiou, I. E. Liao, and M. S. Hwang, “A capacity-enhanced reversible data hiding scheme based on SMVQ,” The Imaging Science Journal, vol. 59, no. 1, pp. 17-24, February, 2011. Article(CrossRefLink)   DOI
10 A. Shamir, “How to share a secret,” Communications of the Association for Computing Machinery, vol. 22, no. 11, pp. 612-613, November, 1979. Article(CrossRefLink)   DOI
11 C. C. Chang, Y. P. Hsieh, and C. C. Liao, “A visual secret sharing scheme for progressively restoring secrets,” Journal of Electronic Science and Technology, vol. 9, no. 4, pp. 325-331, December, 2011.
12 N. Noar and A. Shamir, “Visual cryptography,” Advances in Cryptology: Eurocrypt’94, Spring-Verlag, Berlin, Germany, pp. 1-12, 1995.
13 W. P. Fang, J. C. Lin, “Progressive viewing and sharing of sensitive images,” Pattern Recognition and Image Analysis, vol. 16, no. 4, pp. 632-636, 2006. Article(CrossRefLink)   DOI
14 D. Jin, W. Q. Yan, and M. S. Kankanhalli “Progressive color visual cryptography,” Journal of Electronic Imaging, vol. 14, no. 3, pp. 033019.1-033019.13, 2005.   DOI
15 R. M. Gray, “Vector quantization,” IEEE Transactions on Acoustics, Speech and Signal Processing, vol. 1, no. 2, pp. 4-29, 1984.
16 C. C. Thien and J. C. Lin, “An image-sharing method with user-friendly shadow images,” IEEE Transactions on Circuits and Systems, vol. 13, no. 12, pp. 1161-1169, 2003.
17 C. N. Yang, K. H. Yu, and R. Lukac., “User-friendly image sharing using polynomials with different primes,” International Journal of Imaging Systems and Technology, vol. 17, no. 1, pp. 40-47, June, 2007. Article(CrossRefLink)   DOI
18 National Institute of Standards & Technology, "Data encryption standard (DES)," Federal Information Processing Standards Publication, vol. 46, January, 1977.
19 W. P. Fang, “Friendly progressive visual secret sharing,” Pattern Recognition, vol. 41, no. 4, pp. 1410-1414, April, 2008. Article(CrossRefLink)   DOI
20 Y. Linde, A. Buzo and R.M. Gray, “An algorithm for vector quantizer design,” IEEE Transactions on Communications, vol. 28, no. 1, pp. 84-95, January,1980. Article(CrossRefLink)   DOI
21 National Institute of Standards & Technology, "Announcing the advanced encryption standard (AES)," Federal Information Processing Standards Publication, vol. 197, no. l, 2001.
22 R. L. Rivest, A. Shamir and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” Communications of the ACM, vol. 21, no. 2, pp. 120-126, February, 1978. Article (CrossRef Link)   DOI
23 H. Luo, F. X. Yu, H. Chen, Z. L. Huang, H. Li and P. H. Wang, “Reversible data hiding based on block median preservation,” Information Sciences, vol. 181, no. 2, pp. 308-328, January, 2011. Article (CrossRef Link)   DOI
24 C. C. Chen and C. C. Chang, “LSB-based steganography using reflected gray code,” IEICE Transactions on Information and Systems, vol. E91-D, no. 4, pp. 1110-1116, April, 2008. Article (CrossRef Link)   DOI
25 F. Peng, X. Li and B. Yang, “Adaptive reversible data hiding scheme based on integer transform,” Signal Processing, vol. 92, no. 1, pp. 54-62, January, 2012. Article (CrossRef Link)   DOI
26 C. C. Chang, K. N. Chen, C. F. Lee and L. J. Liu, “A secure fragile watermarking scheme based on chaos-and-hamming code,” Journal of Systems and Software, vol. 84, no. 9, pp. 1462-1470, September, 2011. Article (CrossRef Link)   DOI
27 C. H. Yang, “Inverted pattern approach to improve image quality of information hiding by LSB substitution,” Pattern Recognition, vol. 41, no. 8, pp. 2674-2683, August, 2008. Article (CrossRef Link)   DOI
28 C. K. Chan and L. M. Cheng, “Hiding data in images by simple LSB substitution,” Pattern Recognition, vol. 37, no. 3, pp. 469-474, March, 2004. Article (CrossRef Link)   DOI