Accession number:20094512430497
Title: Secret image sharing with reversible steganography
Authors: Chang, Chin-Chen (1); Lin, Pei-Yu (2); Chan, Chi-Shiang (3) Author affiliation:(1) Department of Information Engineering and Computer Science, Feng Chia University, 100 Wenhwa Rd., Seatwen, Taichung 40724, Taiwan; (2) Department of Computer Science and Information Engineering, National Chung Cheng University, 160 San- Hsing, Min-Hsiung, Chiayi 621, China; (3) Department of Information Science and Applications, Asia University, No. 500, Lioufeng Rd., Wufeng, Taichung 41354, Taiwan
Corresponding author:Chang, C.-C.
(ccc@cs.ccu.edu.tw)
Source title: Proceedings of the 2009 International Conference on Computational Intelligence and Natural Computing, CINC 2009 Abbreviated source title:Proc. Int. Conf Comput. Int. Nat. Comput., CINC
Issue:2
Monograph title:Proceedings of the 2009 International Conference on Computational Intelligence and Natural Computing, CINC 2009 Issue date:2009
Publication year:2009 Pages:253-256
Article number:5230993 Language:English
ISBN-13:9780769536453
Document type:Conference article (CA)
Conference name:2009 International Conference on Computational Intelligence and Natural Computing, CINC 2009
Conference date:June 6, 2009 - June 7, 2009 Conference location:Wuhan, China
Conference code:78020
Sponsor:Wuhan University of Science and Technology; Zhongnan Branch; Huazhong Normal University; Wuhan Institute of
Technology; Intell. Inf. Technol. Appl. Res. Assoc., IITA Assoc.
Publisher:IEEE Computer Society, 445 Hoes Lane - P.O.Box 1331, Piscataway, NJ 08855-1331, United States
Abstract:The significant essential of secret image sharing
approaches is that the revealed content of the secret image must be lossless. Moreover, the distorted stego images can be reverted to the original cover image. In order to achieve these purposes, we first transform the secret pixels into the m-ary notational system.
Then, the information data used to reconstruct original pixels from camouflaged pixels are calculated. The information data and
transformed secret data are shared using the (t, n)-threshold sharing scheme. In this way, we can retrieve the lossless secret image and reverse the stego image to the original image. According to the experiments, the shadows can be successfully camouflaged in the cover image, and the stego images have satisfactory quality.
Moreover, our scheme allows for a large capacity of embedded secret data. © 2009 IEEE.
Number of references:16 Main heading:Pixels
Controlled terms: Artificial intelligence - Computer science - Cryptography
Uncontrolled terms: Distortion-free - Modulo operator - Reversible - Secret sharing - Steganography
Classification code:723.5 Computer Applications - 723.4 Artificial Intelligence - 723 Computer Software, Data Handling and
Applications - 722.2 Computer Peripheral Equipment - 742.2
Photographic Equipment - 722 Computer Systems and Equipment - 718 Telephone Systems and Related Technologies; Line
Communications - 717 Optical Communication - 716
Telecommunication; Radar, Radio and Television - 721 Computer Circuits and Logic Elements
DOI:10.1109/CINC.2009.249 Database:Compendex
Compilation and indexing terms, Copyright 2009 Elsevier Inc.