Abstract
A secret sharing model can secure a secret over multiple noise-like shadows and remain recoverable despite multiple shadow failures. Even if some of the shadows are compromised, the secret will not be revealed as long as the number of the compromised shadows is smaller than a pre-determined threshold. Moreover, there are some necessary details of concerns: the malicious tampering on shadows must be detectable; the shadows must be concealed in a camouflage image with adequate quality to reduce suspicion and possible attack; color image properties must be considered. In addition to these concerns, in this paper, an adaptable mechanism is further designed to balance the hiding quantity and the quality of camouflage image depending on different applications. This is an important and interesting aspect that has never been discussed in previous research.
Article PDF
Avoid common mistakes on your manuscript.
References
Alvarez, G., Hernández E. A., Hernández E. L. and Martín R. A., A secure scheme to share secret color images, Computer Physics Communications, 173(1), 2005, pp. 9–16.
Chang, C. C., Lin, C. C., Lin, C. H. and Chen, Y. H., A novel secret image sharing scheme in color images using small shadow images, Information Sciences, 178(11), 2008, pp. 2433–2447.
Chang, C. C., Hsieh, Y. P. and Lin, C. H., Sharing secrets in stego images with authentication, Pattern Recognition, 41(10), 2008, pp. 3130–3137.
Chang, C. C. and Lin, I. C., A new (t, n) threshold image hiding scheme for sharing a secret color image, Proceedings of IEEE International Conference on Communication Technology, 2003, pp. 196–202.
Chen, C. C. and Suen, G. Y., Sharing an image with cheater identification, International Journal of Innovative Computing, Information and Control, 6(2), 2010, pp. 677–685.
Lukac, R. and Plataniotis, K. N., A color image secret sharing scheme satisfying the perfect reconstruction property, Proceedings of IEEE 6th Workshop on Multimedia Signal Processing, 2004, pp. 351–354.
Lukac, R. and Plataniotis, K. N., A cost-effective encryption scheme for color images, Real-Time Imaging, 11(5), 2005, pp. 454–464.
Lukac, R. and Plataniotis, K. N., Bit-level based secret sharing for image encryption, Pattern Recognition, 38(5), 2005, pp. 767–772.
Shamir, A., How to share a secret, Communications of ACM, 22(11), 1979, pp. 612–613.
Thien, C. C. and Lin, J. C., Secret image sharing, Computers and Graphics, 26(5), 2002, 765–770.
Tsai, M. H., Lin, Y. B. and Wang, C. M., Image sharing with steganography and cheater identification, International Journal of Innovative Computing, Information and Control, 6(3), 2010, pp. 1165–1178.
Wang, Z., Li, S., Lv, Y. and Yang, K., Remote sensing image enhancement based on orthogonal wavelet transformation analysis and pseudo-color processing, International Journal of Computational Intelligence Systems, 3(6), 2010, pp. 745–753.
Witte, V. D., Schulte, S. and Kerre, E. E., New vector ordering in the redgreenblue colour model with application to morphological image magnification, International Journal of Computational Intelligence Systems, 1(2), 2008, pp. 103–115.
Wu, X. and Zhang, N., Primary-consistent soft-decision color demosaicking for digital cameras, IEEE Transactions on Image Processing, 13(9), 2004, pp. 1263–1274.
Wu, Y. S., Thien, C. C. and Lin, J. C., Sharing and hiding secret images with size constraint, Pattern Recognition, 37(7), 2004, pp. 1377–1385.
Yang, C. N., Chen, T. S., Yu, K. H. and Wang, C. C., Improvements of image sharing with steganography and authentication, Journal of Systems and Software, 80(7), 2007, pp. 1070–1076.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
This is an open access article distributed under the CC BY-NC license (https://doi.org/creativecommons.org/licenses/by-nc/4.0/).
About this article
Cite this article
Li, JH., Lee, WB., Ye, D. et al. Adaptive Secret Sharing for Color Images. Int J Comput Intell Syst 4, 797–805 (2011). https://doi.org/10.2991/ijcis.2011.4.5.6
Published:
Issue Date:
DOI: https://doi.org/10.2991/ijcis.2011.4.5.6