New approaches for efficient information hiding-based secret image sharing schemes View Full Text


Ontology type: schema:ScholarlyArticle     


Article Info

DATE

2013-04-12

AUTHORS

Xuehu Yan, Shen Wang, Ahmed A. Abd El-Latif, Xiamu Niu

ABSTRACT

In recent years, various secret sharing schemes for digital images have been developed in order to promote communication security. Previous methods in the literature have made efforts to achieve the merits properties for a good secret image sharing scheme such as implement (\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$k,n)$$\end{document} threshold, simple recovery, no pixel expansion, the generated shadow images are meaningful, the order of shadow images is alternative and lossless recovery of the secret image. To the best of our knowledge, no previous secret sharing scheme achieves all the above properties with good quality of meaningful shadow images. In this paper, we propose two different secret image sharing schemes, (\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$n_1 ,n_1 )$$\end{document} and (\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$k,n_2 )$$\end{document} thresholds, based on information hiding theory to improve the quality of meaningful shadow images with lower computation and good expansibility. In addition, the proposed schemes have the advantages of lossless and alternative order recovery and no pixel expansion. Comparisons with previous approaches show the performance of the proposed schemes. More... »

PAGES

499-510

References to SciGraph publications

  • 2001-10-24. An Implementation of Key-Based Digital Signal Steganography in INFORMATION HIDING
  • 1995. Visual cryptography in ADVANCES IN CRYPTOLOGY — EUROCRYPT'94
  • 2010. A Comprehensive Study of Visual Cryptography in TRANSACTIONS ON DATA HIDING AND MULTIMEDIA SECURITY V
  • Identifiers

    URI

    http://scigraph.springernature.com/pub.10.1007/s11760-013-0465-y

    DOI

    http://dx.doi.org/10.1007/s11760-013-0465-y

    DIMENSIONS

    https://app.dimensions.ai/details/publication/pub.1023674296


    Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
    Incoming Citations Browse incoming citations for this publication using opencitations.net

    JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "about": [
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Information and Computing Sciences", 
            "type": "DefinedTerm"
          }, 
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0801", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Artificial Intelligence and Image Processing", 
            "type": "DefinedTerm"
          }
        ], 
        "author": [
          {
            "affiliation": {
              "alternateName": "School of Computer Science and Technology, Harbin Institute of Technology, 150080, Harbin, China", 
              "id": "http://www.grid.ac/institutes/grid.19373.3f", 
              "name": [
                "School of Computer Science and Technology, Harbin Institute of Technology, 150080, Harbin, China"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Yan", 
            "givenName": "Xuehu", 
            "id": "sg:person.010467364517.31", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010467364517.31"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "School of Computer Science and Technology, Harbin Institute of Technology, 150080, Harbin, China", 
              "id": "http://www.grid.ac/institutes/grid.19373.3f", 
              "name": [
                "School of Computer Science and Technology, Harbin Institute of Technology, 150080, Harbin, China"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Wang", 
            "givenName": "Shen", 
            "id": "sg:person.013117766471.90", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013117766471.90"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Mathematics Department, Faculty of Science, Menoufia University, 32511, Shebin El-Koom, Egypt", 
              "id": "http://www.grid.ac/institutes/grid.411775.1", 
              "name": [
                "School of Computer Science and Technology, Harbin Institute of Technology, 150080, Harbin, China", 
                "Mathematics Department, Faculty of Science, Menoufia University, 32511, Shebin El-Koom, Egypt"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Abd El-Latif", 
            "givenName": "Ahmed A.", 
            "id": "sg:person.015627443237.64", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015627443237.64"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "School of Computer Science and Technology, Harbin Institute of Technology, 150080, Harbin, China", 
              "id": "http://www.grid.ac/institutes/grid.19373.3f", 
              "name": [
                "School of Computer Science and Technology, Harbin Institute of Technology, 150080, Harbin, China"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Niu", 
            "givenName": "Xiamu", 
            "id": "sg:person.011071034626.54", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011071034626.54"
            ], 
            "type": "Person"
          }
        ], 
        "citation": [
          {
            "id": "sg:pub.10.1007/978-3-642-14298-7_5", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1050017989", 
              "https://doi.org/10.1007/978-3-642-14298-7_5"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-45496-9_2", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1024786161", 
              "https://doi.org/10.1007/3-540-45496-9_2"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/bfb0053419", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1008839066", 
              "https://doi.org/10.1007/bfb0053419"
            ], 
            "type": "CreativeWork"
          }
        ], 
        "datePublished": "2013-04-12", 
        "datePublishedReg": "2013-04-12", 
        "description": "In recent years, various secret sharing schemes for digital images have been developed in order to promote communication security. Previous methods in the literature have made efforts to achieve the merits properties for a good secret image sharing scheme such as implement (\\documentclass[12pt]{minimal}\n\t\t\t\t\\usepackage{amsmath}\n\t\t\t\t\\usepackage{wasysym}\n\t\t\t\t\\usepackage{amsfonts}\n\t\t\t\t\\usepackage{amssymb}\n\t\t\t\t\\usepackage{amsbsy}\n\t\t\t\t\\usepackage{mathrsfs}\n\t\t\t\t\\usepackage{upgreek}\n\t\t\t\t\\setlength{\\oddsidemargin}{-69pt}\n\t\t\t\t\\begin{document}$$k,n)$$\\end{document} threshold, simple recovery, no pixel expansion, the generated shadow images are meaningful, the order of shadow images is alternative and lossless recovery of the secret image. To the best of our knowledge, no previous secret sharing scheme achieves all the above properties with good quality of meaningful shadow images. In this paper, we propose two different secret image sharing schemes, (\\documentclass[12pt]{minimal}\n\t\t\t\t\\usepackage{amsmath}\n\t\t\t\t\\usepackage{wasysym}\n\t\t\t\t\\usepackage{amsfonts}\n\t\t\t\t\\usepackage{amssymb}\n\t\t\t\t\\usepackage{amsbsy}\n\t\t\t\t\\usepackage{mathrsfs}\n\t\t\t\t\\usepackage{upgreek}\n\t\t\t\t\\setlength{\\oddsidemargin}{-69pt}\n\t\t\t\t\\begin{document}$$n_1 ,n_1 )$$\\end{document} and (\\documentclass[12pt]{minimal}\n\t\t\t\t\\usepackage{amsmath}\n\t\t\t\t\\usepackage{wasysym}\n\t\t\t\t\\usepackage{amsfonts}\n\t\t\t\t\\usepackage{amssymb}\n\t\t\t\t\\usepackage{amsbsy}\n\t\t\t\t\\usepackage{mathrsfs}\n\t\t\t\t\\usepackage{upgreek}\n\t\t\t\t\\setlength{\\oddsidemargin}{-69pt}\n\t\t\t\t\\begin{document}$$k,n_2 )$$\\end{document} thresholds, based on information hiding theory to improve the quality of meaningful shadow images with lower computation and good expansibility. In addition, the proposed schemes have the advantages of lossless and alternative order recovery and no pixel expansion. Comparisons with previous approaches show the performance of the proposed schemes.", 
        "genre": "article", 
        "id": "sg:pub.10.1007/s11760-013-0465-y", 
        "isAccessibleForFree": false, 
        "isFundedItemOf": [
          {
            "id": "sg:grant.6998614", 
            "type": "MonetaryGrant"
          }
        ], 
        "isPartOf": [
          {
            "id": "sg:journal.1050964", 
            "issn": [
              "1863-1703", 
              "1863-1711"
            ], 
            "name": "Signal, Image and Video Processing", 
            "publisher": "Springer Nature", 
            "type": "Periodical"
          }, 
          {
            "issueNumber": "3", 
            "type": "PublicationIssue"
          }, 
          {
            "type": "PublicationVolume", 
            "volumeNumber": "9"
          }
        ], 
        "keywords": [
          "secret image sharing scheme", 
          "image sharing scheme", 
          "meaningful shadow images", 
          "secret sharing scheme", 
          "sharing scheme", 
          "shadow images", 
          "pixel expansion", 
          "previous secret sharing schemes", 
          "secret image", 
          "communication security", 
          "lossless recovery", 
          "low computation", 
          "good expansibility", 
          "digital images", 
          "previous approaches", 
          "previous methods", 
          "order recovery", 
          "images", 
          "scheme", 
          "new approach", 
          "recent years", 
          "security", 
          "good quality", 
          "lossless", 
          "expansibility", 
          "computation", 
          "implements", 
          "quality", 
          "order", 
          "performance", 
          "advantages", 
          "knowledge", 
          "method", 
          "efforts", 
          "above properties", 
          "simple recovery", 
          "threshold", 
          "literature", 
          "comparison", 
          "theory", 
          "addition", 
          "expansion", 
          "properties", 
          "recovery", 
          "years", 
          "approach", 
          "paper"
        ], 
        "name": "New approaches for efficient information hiding-based secret image sharing schemes", 
        "pagination": "499-510", 
        "productId": [
          {
            "name": "dimensions_id", 
            "type": "PropertyValue", 
            "value": [
              "pub.1023674296"
            ]
          }, 
          {
            "name": "doi", 
            "type": "PropertyValue", 
            "value": [
              "10.1007/s11760-013-0465-y"
            ]
          }
        ], 
        "sameAs": [
          "https://doi.org/10.1007/s11760-013-0465-y", 
          "https://app.dimensions.ai/details/publication/pub.1023674296"
        ], 
        "sdDataset": "articles", 
        "sdDatePublished": "2022-12-01T06:31", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-springernature-scigraph/baseset/20221201/entities/gbq_results/article/article_611.jsonl", 
        "type": "ScholarlyArticle", 
        "url": "https://doi.org/10.1007/s11760-013-0465-y"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/s11760-013-0465-y'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/s11760-013-0465-y'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/s11760-013-0465-y'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/s11760-013-0465-y'


     

    This table displays all metadata directly associated to this object as RDF triples.

    143 TRIPLES      21 PREDICATES      74 URIs      63 LITERALS      6 BLANK NODES

    Subject Predicate Object
    1 sg:pub.10.1007/s11760-013-0465-y schema:about anzsrc-for:08
    2 anzsrc-for:0801
    3 schema:author N99819dc3605a4f8d90bda73eb61bc77e
    4 schema:citation sg:pub.10.1007/3-540-45496-9_2
    5 sg:pub.10.1007/978-3-642-14298-7_5
    6 sg:pub.10.1007/bfb0053419
    7 schema:datePublished 2013-04-12
    8 schema:datePublishedReg 2013-04-12
    9 schema:description In recent years, various secret sharing schemes for digital images have been developed in order to promote communication security. Previous methods in the literature have made efforts to achieve the merits properties for a good secret image sharing scheme such as implement (\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$k,n)$$\end{document} threshold, simple recovery, no pixel expansion, the generated shadow images are meaningful, the order of shadow images is alternative and lossless recovery of the secret image. To the best of our knowledge, no previous secret sharing scheme achieves all the above properties with good quality of meaningful shadow images. In this paper, we propose two different secret image sharing schemes, (\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$n_1 ,n_1 )$$\end{document} and (\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$k,n_2 )$$\end{document} thresholds, based on information hiding theory to improve the quality of meaningful shadow images with lower computation and good expansibility. In addition, the proposed schemes have the advantages of lossless and alternative order recovery and no pixel expansion. Comparisons with previous approaches show the performance of the proposed schemes.
    10 schema:genre article
    11 schema:isAccessibleForFree false
    12 schema:isPartOf N6cb1aeb7e00b4497881da5fb89724ffb
    13 Nedd323fba3b04b70b603d57f9f370eb0
    14 sg:journal.1050964
    15 schema:keywords above properties
    16 addition
    17 advantages
    18 approach
    19 communication security
    20 comparison
    21 computation
    22 digital images
    23 efforts
    24 expansibility
    25 expansion
    26 good expansibility
    27 good quality
    28 image sharing scheme
    29 images
    30 implements
    31 knowledge
    32 literature
    33 lossless
    34 lossless recovery
    35 low computation
    36 meaningful shadow images
    37 method
    38 new approach
    39 order
    40 order recovery
    41 paper
    42 performance
    43 pixel expansion
    44 previous approaches
    45 previous methods
    46 previous secret sharing schemes
    47 properties
    48 quality
    49 recent years
    50 recovery
    51 scheme
    52 secret image
    53 secret image sharing scheme
    54 secret sharing scheme
    55 security
    56 shadow images
    57 sharing scheme
    58 simple recovery
    59 theory
    60 threshold
    61 years
    62 schema:name New approaches for efficient information hiding-based secret image sharing schemes
    63 schema:pagination 499-510
    64 schema:productId N994dd00b232742d18fcaa95963054964
    65 Nac1330f377ae4c60b6df8af2cc03d10d
    66 schema:sameAs https://app.dimensions.ai/details/publication/pub.1023674296
    67 https://doi.org/10.1007/s11760-013-0465-y
    68 schema:sdDatePublished 2022-12-01T06:31
    69 schema:sdLicense https://scigraph.springernature.com/explorer/license/
    70 schema:sdPublisher N36fb97aef42e4533a35d22fe5db06d92
    71 schema:url https://doi.org/10.1007/s11760-013-0465-y
    72 sgo:license sg:explorer/license/
    73 sgo:sdDataset articles
    74 rdf:type schema:ScholarlyArticle
    75 N36fb97aef42e4533a35d22fe5db06d92 schema:name Springer Nature - SN SciGraph project
    76 rdf:type schema:Organization
    77 N6cb1aeb7e00b4497881da5fb89724ffb schema:volumeNumber 9
    78 rdf:type schema:PublicationVolume
    79 N96f0c21ce96b435baee9afe8b3cb8a7a rdf:first sg:person.013117766471.90
    80 rdf:rest Nc41c6c87b7db4784bdca0c74218a2864
    81 N994dd00b232742d18fcaa95963054964 schema:name doi
    82 schema:value 10.1007/s11760-013-0465-y
    83 rdf:type schema:PropertyValue
    84 N99819dc3605a4f8d90bda73eb61bc77e rdf:first sg:person.010467364517.31
    85 rdf:rest N96f0c21ce96b435baee9afe8b3cb8a7a
    86 Nac1330f377ae4c60b6df8af2cc03d10d schema:name dimensions_id
    87 schema:value pub.1023674296
    88 rdf:type schema:PropertyValue
    89 Nc41c6c87b7db4784bdca0c74218a2864 rdf:first sg:person.015627443237.64
    90 rdf:rest Ne69a84f2fb3545f7831519915717c8d6
    91 Ne69a84f2fb3545f7831519915717c8d6 rdf:first sg:person.011071034626.54
    92 rdf:rest rdf:nil
    93 Nedd323fba3b04b70b603d57f9f370eb0 schema:issueNumber 3
    94 rdf:type schema:PublicationIssue
    95 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
    96 schema:name Information and Computing Sciences
    97 rdf:type schema:DefinedTerm
    98 anzsrc-for:0801 schema:inDefinedTermSet anzsrc-for:
    99 schema:name Artificial Intelligence and Image Processing
    100 rdf:type schema:DefinedTerm
    101 sg:grant.6998614 http://pending.schema.org/fundedItem sg:pub.10.1007/s11760-013-0465-y
    102 rdf:type schema:MonetaryGrant
    103 sg:journal.1050964 schema:issn 1863-1703
    104 1863-1711
    105 schema:name Signal, Image and Video Processing
    106 schema:publisher Springer Nature
    107 rdf:type schema:Periodical
    108 sg:person.010467364517.31 schema:affiliation grid-institutes:grid.19373.3f
    109 schema:familyName Yan
    110 schema:givenName Xuehu
    111 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010467364517.31
    112 rdf:type schema:Person
    113 sg:person.011071034626.54 schema:affiliation grid-institutes:grid.19373.3f
    114 schema:familyName Niu
    115 schema:givenName Xiamu
    116 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011071034626.54
    117 rdf:type schema:Person
    118 sg:person.013117766471.90 schema:affiliation grid-institutes:grid.19373.3f
    119 schema:familyName Wang
    120 schema:givenName Shen
    121 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013117766471.90
    122 rdf:type schema:Person
    123 sg:person.015627443237.64 schema:affiliation grid-institutes:grid.411775.1
    124 schema:familyName Abd El-Latif
    125 schema:givenName Ahmed A.
    126 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015627443237.64
    127 rdf:type schema:Person
    128 sg:pub.10.1007/3-540-45496-9_2 schema:sameAs https://app.dimensions.ai/details/publication/pub.1024786161
    129 https://doi.org/10.1007/3-540-45496-9_2
    130 rdf:type schema:CreativeWork
    131 sg:pub.10.1007/978-3-642-14298-7_5 schema:sameAs https://app.dimensions.ai/details/publication/pub.1050017989
    132 https://doi.org/10.1007/978-3-642-14298-7_5
    133 rdf:type schema:CreativeWork
    134 sg:pub.10.1007/bfb0053419 schema:sameAs https://app.dimensions.ai/details/publication/pub.1008839066
    135 https://doi.org/10.1007/bfb0053419
    136 rdf:type schema:CreativeWork
    137 grid-institutes:grid.19373.3f schema:alternateName School of Computer Science and Technology, Harbin Institute of Technology, 150080, Harbin, China
    138 schema:name School of Computer Science and Technology, Harbin Institute of Technology, 150080, Harbin, China
    139 rdf:type schema:Organization
    140 grid-institutes:grid.411775.1 schema:alternateName Mathematics Department, Faculty of Science, Menoufia University, 32511, Shebin El-Koom, Egypt
    141 schema:name Mathematics Department, Faculty of Science, Menoufia University, 32511, Shebin El-Koom, Egypt
    142 School of Computer Science and Technology, Harbin Institute of Technology, 150080, Harbin, China
    143 rdf:type schema:Organization
     




    Preview window. Press ESC to close (or click here)


    ...