Browse > Article
http://dx.doi.org/10.9717/kmms.2014.17.7.849

Reversible Secret Image Sharing Scheme Using Histogram Shifting and Difference Expansion  

Jeon, B.H. (School of Computer Science and Engineering, Kyungpook National University)
Lee, G.J. (School of Computer Science and Engineering, Kyungpook National University)
Jung, K.H. (School of computer Information, Yeungjin college)
Yoo, Kee Young (School of Computer Science and Engineering, Kyungpook National University)
Publication Information
Abstract
In this paper, we propose a (2,2)-reversible secret image sharing scheme using histogram shifting and difference expansion. Two techniques are widely used in information hiding. Advantages of them are the low distortion between cover and stego images, and high embedding capacity. In secret image sharing procedure, unlike Shamir's secret sharing, a histogram generate that the difference value between the original image and copy image is computed by difference expansion. And then, the secret image is embedded into original and copy images by using histogram shifting. Lastly, two generated shadow images are distributed to each participant by the dealer. In the experimental results, we measure a capacity of a secret image and a distortion ratio between original image and shadow image. The results show that the embedding capacity and image distortion ratio of the proposed scheme are superior to the previous schemes.
Keywords
Reversible Secret Image Sharing; Histogram Shifting; Difference Expansion; Embedding Capacity; PSNR;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 C.N. Yang, T.S. Chen, K.H. Yu, and C.C. Wang, "Improvements of Image Sharing with Steganography and Authentication," The Journal of Systems and Software, Vol. 80, No. 7, pp. 1070-1076, 2007.   DOI   ScienceOn
2 C.C. Chang, Y.P. Hsieh, and C.H. Lin, "Sharing Secrets in Stego Images with Authentication," Journal of Pattern Recognition, Vol. 41, No. 10, pp. 3130-3137, 2008.   DOI
3 S.J. Shyu and Y.R. Chen, "Threshold Secret Image Sharing by Chinese Remainder Theorem," Proceeding of IEEE Asia-Pacific Services Computing Conference, pp. 1332-1337, 2008.
4 P.Y. Lin, J.S. Lee, and C.C Chang, "Distortionfree Secret Image Sharing Mechanism using Modulus Operator," Pattern recognition, Vol. 42, No. 5, pp. 886-895, 2009.   DOI
5 P.Y. Lin and C.S. Chan, "Invertible Secret Image Sharing with Steganography," Journal of Pattern Recognition Letters, Vol. 31, No. 13, pp. 1887-1893, 2010.   DOI
6 Z. Ni, Y.Q. Shi, N. Ansari, and W. Su, "Reversible Data Hiding," IEEE Transactions on Circuits and Systems for Video Technology, Vol. 16, No. 3, pp. 354-362, 2006.   DOI   ScienceOn
7 P. Tsai, Y.C. Hu, and H.L. Yeh, "Reversible Image Hiding Scheme using Predictive Coding and Histogram Shifting," Signal Processing, Vol. 89, No. 6, pp. 1129-1143, 2009.   DOI   ScienceOn
8 S.H. Bae, "A High Capacity Reversible Watermarking using Histogram Shifting," Journal of Korea Multimedia Society, Vol. 13, No. 1, pp. 76-82, 2010.   과학기술학회마을
9 J. Tian, "Reversible Watermarking by Difference Expansion," IEEE Transactions on Circuits and System for Video Technology, Vol. 13, Issue 8, pp. 890-896, 2003.   DOI   ScienceOn
10 B. Li, J. He, J. Huang, and Y.Q. Shi, "A Survey on Image Steganography and Steganalysis," Journal of Information Hiding and Multimedia signal Processing, Vol. 2, No. 2, pp. 142- 172. 2011.
11 K.J. Kim, S.H. Shin, and K.Y. Yoo, "A New Information Data hiding Scheme based on Pattern Information of Secret Data," Journal of Korea Multimedia Society, Vol. 15, No. 4, pp. 526-539, 2012.   DOI   ScienceOn
12 W. Stallings, Cryptography and Network Security, Prentice Hall, USA, 2010.
13 G.R. Blakley, "Safeguarding Cryptographic Keys," Managing Requirements Knowledge, Proceeding of the International Workshop on the National Computer Conference, pp. 313-317, 1979.
14 A. Shamir, "How to Share a Secret," Communications of the ACM, Vol. 22, No. 11, pp. 612-613, 1979.   DOI   ScienceOn
15 C.C. Thien and J.C. Lin, "Secret Image Sharing," Journal of Computers & Graphics, Vol. 26, No. 5, pp. 765-770, 2002.   DOI   ScienceOn
16 C.C. Lin and W.H. Tsai, "Secret Image Sharing with Steganography and Authentication," Journal of Systems and Software, Vol. 73, No. 3, pp. 405-414, 2004.   DOI   ScienceOn
17 Y.S. Wu, C.C Thien, and J.C. Lin, "Sharing and Hiding Secret Images with Size Constraint," Journal of Patten Recognition, Vol. 37, No. 7, pp. 1377-1385, 2004.   DOI
18 C.Y. Yang and W.C. Hu, "High-Performance Reversible Data Hiding with Overflow/ Underflow Avoidance," ETRI Journal, Vol. 33, No. 5, pp. 580-588, 2011.   DOI