Part of the book series:Lecture Notes in Computer Science ((LNTCS,volume 4688))
Included in the following conference series:
1470Accesses
Abstract
This paper presents a scalable secure scheme for sharing and hiding secret image. The given secret image is firstly divided into numerous non-overlapping blocks, and then transformed each block into wavelet frequency by one-level discrete wavelet transform. Second, quantization the wavelet coefficients into 256 gray level. Third, a bit-plane scanning method rearranges the gray value information of the quantized image. Four, share the rearranged image into n shadows by using multiple thresholds. Five, conceal each shadow image in R, G and B channels of the cover image, which doesn’t attract Attracters’ attention. Six, the more shadows the better quality of the retrieved secret image. The experimental results show that the retrieved secret image presents higher visual quality and the stego-images present better invisibility than traditional methods.
This is a preview of subscription content,log in via an institution to check access.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Blakley, G.R.: Safeguarding cryptographic keys. In: Proceedings AFIPS 1979. National Computer Conference, New York, USA, vol. 48, pp. 313–317 (June 1979)
Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)
Thien, C.C., Lin, J.C.: Secret image sharing. Computer, Graphics 26, 765–770 (2002)
Wu, Y.S., Thien, C.C., Lin, J.C.: Sharing and hiding secret images with size constraint. Pattern Recognition 37(7), 1377–1385 (2004)
Chen, S.K., Lin, J.C.: Fault-tolerant and progressive transmission of images. Pattern Recognition 38, 2466–2471 (2005)
Wu, D.C., Tsai, W.H.: Spatial-domain image hiding using image differencing. IEE Proceedings: Vision, Image & Signal Processing 147(1), 29–37 (2000)
Chang, C.C., Lin, M.H., Hu, Y.C.: A fast and secure image hiding scheme based on LSB substitution. Int. J. Pattern Recognition Artif. Intel. 16(4), 399–416 (2002)
Wang, R.-Z., Lin, C.-F., Lin, J.-C.: Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recognition 34(3), 671–683 (2001)
Wang, R.-Z., Lin, C.-F., Lin, J.-C.: Hiding data in images by optimal moderately significant-bit replacement. IEEElectron. Lett. 36(25), 2069–2070 (2000)
Thien, C.C., Lin, J.C.: A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function. Pattern Recognition 36, 2876–2881 (2003)
Chang, C.C., Chiang, C.L., Hsiao, J.Y.: A DCT-domain System for Hiding Fractal Compressed Images. In: Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 1550-455X/05(C), IEEE, Los Alamitos (2005)
Author information
Authors and Affiliations
Computer School, Northeast Normal University, Changchun, Jilin Province, China
Jun Kong, Yanfen Zhang, Xiangbo Meng, Ying Zheng & Yinghua Lu
Key Laboratory for Applied Statistics of MOE, China
Jun Kong, Yanfen Zhang, Xiangbo Meng & Ying Zheng
- Jun Kong
You can also search for this author inPubMed Google Scholar
- Yanfen Zhang
You can also search for this author inPubMed Google Scholar
- Xiangbo Meng
You can also search for this author inPubMed Google Scholar
- Ying Zheng
You can also search for this author inPubMed Google Scholar
- Yinghua Lu
You can also search for this author inPubMed Google Scholar
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kong, J., Zhang, Y., Meng, X., Zheng, Y., Lu, Y. (2007). A Scalable Secret Image Sharing Method Based on Discrete Wavelet Transform. In: Li, K., Fei, M., Irwin, G.W., Ma, S. (eds) Bio-Inspired Computational Intelligence and Applications. LSMS 2007. Lecture Notes in Computer Science, vol 4688. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74769-7_78
Download citation
Publisher Name:Springer, Berlin, Heidelberg
Print ISBN:978-3-540-74768-0
Online ISBN:978-3-540-74769-7
eBook Packages:Computer ScienceComputer Science (R0)
Share this paper
Anyone you share the following link with will be able to read this content:
Sorry, a shareable link is not currently available for this article.
Provided by the Springer Nature SharedIt content-sharing initiative