Progressive secret image sharing scheme using meaningful shadows

Size: px
Start display at page:

Download "Progressive secret image sharing scheme using meaningful shadows"

Transcription

1 SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks 2016; 9: Published online 30 August 2016 in Wiley Online Library (wileyonlinelibrary.com) RESEARCH ARTICLE Progressive secret image sharing scheme using meaningful shadows Zhi-Hui Wang 1, Ya-Feng Di 1, Jianjun Li 2 *, Chin-Chen Chang 3 and Hui Liu 1 1 School of Software, Dalian University of Technology, Dalian, China 2 School of Computer Science and Technology, Hangzhou Dianzi University, Hangzhou, China 3 Department of Information Engineering and Computer Science, Feng Chia University, Taichung, Taiwan ABSTRACT This paper proposes a novel secret image sharing scheme, which progressively hides a secret image into multiple different meaningful cover (or host) images by utilizing a magic matrix. The produced shadows are high visual quality, meaningful images that differ from each other. As a result, they are not easy to cause the suspicion by the attackers. Moreover, the secret image in the proposed scheme can be recovered progressively via different numbers of shadows. The more shadows used, the better the quality of the secret image. The experimental results demonstrate the aforementioned advantages of the proposed scheme. Copyright 2016 John Wiley & Sons, Ltd. KEYWORDS secret image sharing; progressive secret image sharing; Sudoku; magic matrix *Correspondence Jianjun Li, School of Computer Science and Technology, Hangzhou Dianzi University, Hangzhou, China. lijjcan@gmail.com 1. INTRODUCTION We propose a novel secret image sharing scheme to solve existing problems such as meaningless shadow images, distorted recovery secret image, and stolen shadow image by utilizing the concept of magic matrix. Magic matrix is a number placement puzzle based on logic, and it is represented on a square grid. In this scheme, we can generate the high visual quality, meaningful shadow images that are quite important in medical, military, and artistic fields. In addition, our scheme allows authorized participants to cooperate to recover the secret image reversibly and progressively. The rest of the article is organized as follows. Definitions and the current status of the development of secret image sharing is discussed in Section 2. Section 3 introduces Sudoku and Shamir s(t, n)-threshold scheme briefly. Section 4 elaborates the proposed scheme, consisting of both shadow image generation and secret image recovery, followed by the experimental results in Section 5. Last, Section 6 gives a conclusion of the paper. 2. BACKGROUND With the rapid development of the Internet, a growing number of multimedia works appear in our lives, such as videos, audios, and images. To preserve these media, many methods have been proposed, such as steganography [1 3] and secret sharing scheme [4 7]. Sharing secret data among several involved participants is the purpose of the secret sharing mechanism [8,9]. After dividing the secret data into several parts, distributing them to paticipants, and a certain number of authorized participants can recover the secret data by cooperating. In 1979, Blakely and Shamir [8,9] first proposed the idea of a secret sharing system, the (t, n)-threshold secret sharing system. In this system, the dealer divides the secret data into n shares and then distributes to n participants. Only any t or more participants cooperating with their shares can recover the secret data. Later, Thien and Lin [10] extended the idea into the image field where they regarded the image as the secret data and generated n shadow images. The original secret image can be recovered by any t out of n shadows. Based on the scheme, Wang and Shyu [11] proposed a secret image sharing scheme, which is scalable and has three traits: the multi-secret, the priority, and the progressive. The shares distributed to the participants had different priorities, which determined the quality of the recovered secret image. Nevertheless, the shadow images had no meaning that would attract an intruder s attention. To obtain meaningful shadows, embedding the secret image into a host image was proposed. Lin and Tsai [12] and Wu et al. [13] used the Copyright 2016 John Wiley & Sons, Ltd. 4075

2 Progressive secret image sharing scheme using meaningful shadows Z.-H. Wang et al. (t 1)-degree polynomial to embed the secret image into the host image to acquire meaningful shadow images [14]. However, in this way, the recovered secret image is distorted in that pixel values larger than 250 are truncated. For recovering a lossless secret image, Zhao et al. [15] and Chang et al. [16] proposed using two pixels [17] on behalf of exceeding values, but the visual quality of shadow images was contorted to some degree. To avoid the risk of shadow images being stolen, Chen and Lin [18] proposed a progressive secret image sharing scheme. They divided the secret image into several shares with equal importance to avoid information disclosure in cases in which share is lost, and the secret image is transmitted using Figure 1. Instance of a 9 9 Sudoku grid using digits from 0 to 8. Figure 3. A Sudoku with digits from 0 to 8. Figure 2. Instance of matrix Security Comm. Networks 2016; 9: John Wiley & Sons, Ltd.

3 Z.-H. Wang et al. Progressive secret image sharing scheme using meaningful shadows several channels to avoid the secret image being stolen. The advantage is that the quality of the recovered secret image depends on the number of participating shadow images, that is, the process of recovery is progressive. However, if the visual quality of shadow images is not good enough, it can attract an intruder s attention in transmission over the Internet. 3. THE RELATED WORK In this section, we introduce the concept of Sudoku, a magic matrix [19 22] adopted for embedding and recovering secret images in the proposed scheme. Subsequently, a concrete magic matrix example and Shamir s (t, n)-threshold sharing mechanism [8,9] are illustrated, respectively. Figure 4. Instance of matrix M. Figure 5. Instance of the embedding result. Security Comm. Networks 2016; 9: John Wiley & Sons, Ltd. 4077

4 Progressive secret image sharing scheme using meaningful shadows Z.-H. Wang et al Sudoku Sudoku, originally called Number Placement, is a logicbased puzzle presented in a square grid. The most common Sudoku has a 9 9 grid with nine 3 3 sub-grids (also called blocks). In addition to 9 9 Sudoku, 4 4 and Sudoku are also significant. Figure 1(a) shows a 9 9 Sudoku that has not been completed, and the goal is to complete the grids under the following rules: digits in each row, column, and 3 3 block must be ranged from 0 to 8 and cannot duplicate. Figure 1(b) gives one solution of the incomplete Sudoku shown in Figure 1(a) Magic matrix Many kinds of magic matrix exist; for instance, Kim s magic matrix is filled with digits 0 to 8 and Zhang and Wang s matrix is filled with digits 0 to 4 [23]. Different magic matrixes can bring different experimental results, such as different numbers of shadow images and different quality of shadow images. In our proposed scheme, the size of the magic matrix M is , and the content is composed using Sudoku, assumed as stu, the size of which is N 2 N 2. The method of magic matrix construction is shown as follows: For i ¼ 0 to 255 For j ¼ 0 to 255 M½Šj i ¼ stu i mod N 2 j mod N 2 ; where N ¼ 2; 3; 4; 16 The magic matrix is a composition involving a large number of Sudokus and, as a result, it has all the characteristics of Sudoku. Figure 2 shows part of a magic matrix of size , which is one of the magic matrixes used in our experiments. The Sudoku size in the magic matrix is 9 9, where N =3. authorized participants can recover all the coefficients s, m 1, m 2,, m t 1 by constructing F(x). So the secret can be obtained through the participants cooperation. In contrast, if the number of participants is less than t, the shadow containing these participants is a forbidden set, that is, it cannot reconstruct the F(x) by LIP. One thing to note is that the values of y i sare limited within [0, p 1], and because the coefficients m 1, m 2,, m t 1 are randomly determined, the shadows appear meaningless. To prevent intruders from being suspicious about the shadows, the proposed scheme camouflages the shadows with host images to generate n meaningful shadow images. 4. OUR PROPOSED METHOD Given a secret image, the dealer is responsible for preparing n cover images and then generates n shadow images with the secret image. The shadow-generating procedure is introduced in Subsection 4.1. Using different number of shadow images, secret images with different visual quality can be reconstructed by the participants, that is, the more shadow images are used, the better quality of the reconstructed secret image has. The process of reconstructing is described in Subsection 4.2. To describe the scheme clearly, an example of the two procedures is introduced in Subsection The process of shadow generation The proposed scheme uses grayscale images as test images. The pixel value is ranged from 0 to 255. The small 3.3. The (t, n)-threshold secret sharing system If a secret s is going to be shared, the dealer sets a prime p and generates a (t 1)-degree polynomialf(x)as Fx ðþ¼ s þ m 1 x þ þ m t 1 x t 1 mod p (1) Here, the coefficients m 1, m 2,, m t 1 are randomly determined within integers [0, p 1]. Then n shadows (y 1, y 2,, y n ) can be derived as y 1 ¼ Fð1Þ; y 2 ¼ Fð2Þ; ; y n ¼ Fn ðþ (2) Then, the shadows are distributed to the participants. In general, if the authorized participants have at least t shadows, we call the shadow set a qualified set, which means that these participants in the qualified set can reconstruct F(x) using the Lagrange interpolation polynomial (LIP) with cooperation. In other words, these Figure 6. Instance of the embedding result Security Comm. Networks 2016; 9: John Wiley & Sons, Ltd.

5 Z.-H. Wang et al. Progressive secret image sharing scheme using meaningful shadows change of pixel value is hard to observe with the human vision system, so we can change the value of every pixel slightly to embed the secret image. In this paper, we assume that the secret image S has pixels, as do the cover images and shadow images. Then, we choose a Sudoku to generate a magic matrix called M whose size is In the proposed scheme, the dealer first prepares host images and a secret image. Assuming the size of the Sudoku we use is N 2 N 2, dlog N 2256eþ 1host images are used in the proposed scheme. The process of shadow generation is as follows: Step 1: Divide the array [0,255] into N 2 average parts with the last part allowed to contain Figure 7. Three groups of host images. Security Comm. Networks 2016; 9: John Wiley & Sons, Ltd. 4079

6 Progressive secret image sharing scheme using meaningful shadows Z.-H. Wang et al. more numbers; that j is, k each of the first N 2 1parts contains 256 numbers and then 2 N 2 th part contains the rest of the numbers. Then compute the average value of every part A i,as Avg i, where i=1, 2,, N 2. Step 2: Take out the first pixel from the secret image, which we assume is a and a A i ; that is, a belongs to the i th part. Then, in the same way, take out the first pixel in both host 1 and host 2, which we assume are b and c, respectively. Then we regard b and c as the horizontal and vertical coordinates to locate the corresponding N N block in the matrix M. Next, we find number i, which is also the part number of a, in the located block and record the abscissa value and ordinate value of i as b 1 and c 1, respectively. Then b 1 is put into shadow 1 and c 1 is put into shadow 2. Also, the average value of part A i is put into the corresponding position of a new secret imagesecret. Repeat Step 2 until all pixels in the secret image and the two host images are processed. Then, we have three new pictures, shadow 1, shadow 2, and secret. Step 3: Use secret and the new picture host 3 to generate shadow 3. First is to divide the aforementioned calculated part A i in Step 2 into N 2 parts and to calculate the average value Avg ij of every new part A ij, where j=1, 2,, N 2. Assuming that the first secret pixel a belongs to part A ij, put the average value of this part into the first position of a new image secret. Next, take out the first pixel from image host 3 and the first pixel value from secret, which is the average of part A i. Then locate a 1 N 2 block from the matrix M, which contains the unit with the aforementioned two values as ordinate and abscissa values, respectively. We find the part number of A ij in the located 1 N 2 block and put its ordinate value in a new image shadow 3. The reason that we use the 1 N 2 block instead of the N N block is because the abscissa is not supposed to be changed The process of reconstructing secret images using shadow images The process of reconstructing is the reverse of the process of producing shadows but very similar to it. The process is as follows: Step 1: Divide array [0, 255] into N 2 average parts as in Step 1 in the process of shadow generation. Then take out the first pixel in both the shadow 1 and shadow 2, which we assume are p and q, respectively. Then mapping p and q at matrix M, we acquire an integer called x. Put the value Avg x, which is the average of the array with the secret data, into image S 1, and S 1 contains the majority of the secret image. Step 2: Divide the array A x into N 2 parts, the average value of which is Avg xj, where j =1, 2,, N 2. Then take the first pixel of shadow 3, which we assume is m. Mapping Avg x and m at matrix M, we obtain an integer y. Put the value Avg xy, which is the average of the array with the secret data after dividing into the image S 2, and S 2 contains more secret image data than S 1. Step 3: Divide the array A xy into N 2 parts, and the averages of them are Avg xyl, where l = 1,2,, N 2. Then take the first pixel in shadow 4, which we assume is n. Mapping Avg xy and n at matrix M, we obtain a digit z. Put the value Avg xyz, which is the average of the array with the secret data, after dividing into the image S 3, and S 3 contains more secret image data than S 2. Step 4: Do as in Step 3 until the last shadow image is processed An example of shadow generation and secret image reconstruction In the example, we use 9 9 Sudoku, which is shown in Figure 3. A part of the matrix generated by the Sudoku is shown in Figure 4. The detailed description of the embedding procedure and the reconstructing procedure is described in Subsections and 4.3.2, respectively. Repeat Step 3 until all pixels insecret and host 3 are processed. Then, we have two new pictures, shadow 3 and secret. Step 4: Generate shadow 4 with image host 4 and secret in the same way as in Step 3. The rest of the shadow images can also be generated by following the same method until we have dlog N 2256eþ 1 images. Figure 8. An example of secret image Airplane Security Comm. Networks 2016; 9: John Wiley & Sons, Ltd.

7 Z.-H. Wang et al. Progressive secret image sharing scheme using meaningful shadows Example of shadow generation. Step 1: Divide the array [0, 255] into nine parts. Each of the first eight arrays contains 28 digits and the last array contains the rest of the digits. Thus, the arrays are A 1 = [0, 27], A 2 = [28, 55],, A 9 = [224, 255], and the averages of all the parts are Avg 1 = 14, Avg 2 = 42,, Avg 9 = 240. Step 2: Take out the first pixel from the secret image and assume its value is 36. We obtain both first pixels in Baboon and Cameraman, which are assumed to be a = 36 and b = 4. Referring to a and b, we can acquire a block, and there must be a number 2, which is the segment to which the secret number 36 belongs. Then put a and b, which are the coordinates of the located number 2, into shadow 1 and shadow 2. Last, put the average of the second part, that is, Avg 2 = 42, into secret. Figure 5 shows the process. Figure 9. The three groups of shadow images using 9 9 Sudoku. Security Comm. Networks 2016; 9: John Wiley & Sons, Ltd. 4081

8 Progressive secret image sharing scheme using meaningful shadows Z.-H. Wang et al. Figure 10. The three groups of shadow images using 4 4 Sudoku Security Comm. Networks 2016; 9: John Wiley & Sons, Ltd.

9 Z.-H. Wang et al. Progressive secret image sharing scheme using meaningful shadows Step 3: Continue to divide the second part into nine parts, which are A 21 = [28, 30], A 22 = [31, 33],, A 29 = [52, 55]. Because we have the average of part A 2, we should use the average as the abscissa, and the ordinate c is from the third host image to locate the block shown in Figure 6(a). Then find the new segment number 3, which is the number of the segment to which the secret 36 belongs, in the located block. Then the ordinate number c of number 3 is recorded into the shadow 3 and the average of A 23 is put into secret. Step 4: Continue to divide part A 33 into nine parts. We cannot divide averagely, so we add the same digits as the last digit in the array; that is, we deal with the nine parts like this: [34] [35] [36] [36] [36] [36] [36] [36] [36]. According to Figure 6(b), we put d = 87 into shadow PSNR ¼ 10 log 10 db MSE The mean square error (MSE) of an image with H W pixels is defined as MSE ¼ 1 HW H W u¼1 v¼1 ðp uv p uv Þ 2 where p uv is the original pixel value and p uv is the pixel value of the shadow image Shadow images generated with secret and host images To test the performance of the proposed scheme, we make a comparison by using 9 9 Sudoku and 4 4 Sudoku, the block size of which is 3 3 and 2 2, respectively Example of secret image reconstruction. Following the example of the shadow generation phase, an example of the reconstruction process is illustrated as follows. Step 1: Acquire the first pixel from shadow 1 and shadow 2, which are a = 37 and b = 3. Referring to the matrix, a and b are treated as the horizontal and vertical coordinates, respectively, and we acquire the integer 2 then put the average of the second part, that is, 42, intosecret, as shown in Figure 5. Step 2: Acquire the first pixel from shadow 3, which is c = 52. Referring to the matrix, treat 42 and c as the horizontal and vertical coordinates, respectively, and we acquire the integer 3. Then put the average of the third part, that is, 35, intosecret, as shown in Figure 6(a). Step 3: Acquire the first pixel from shadow 4, which is d. Referring to the matrix, we acquire the integer 3. Then put the average of the third part, that is, 36, intosecret, as shown in Figure 6(b), and secret is the recovered secret image that we want. Table I. The peak signal-to-noise rate (PSNR) value (db) of the shadow images with Group 1. Shadow images PSNR(dB) (with 9 9 Sudoku) PSNR(dB) (with 4 4 Sudoku) Shadow Shadow Shadow Shadow Shadow Average Table II. The peak signal-to-noise rate (PSNR) value (db) of the shadow images with Group 2. Shadow images PSNR(dB) (with 9 9 Sudoku) PSNR(dB) (with 4 4 Sudoku) Shadow Shadow Shadow Shadow Shadow Average EXPERIMENTAL RESULTS We demonstrate the performance of the proposed scheme using 12 grayscale cover images with pixels, as shown in Figure 7. Figure 7 shows three example groups of host images, and every group contains four images, that is, images (a d) belong to group 1, images (e h) belong to group 2, and images (i l) belong to group 3. An example of a secret image is shown in Figure 8. To estimate the quality of the shadow images, we use the peak signal-tonoise rate (PSNR): Table III. The peak signal-to-noise rate (PSNR) value (db) of the shadow images with Group 3. Shadow images PSNR(dB) (with 9 9 Sudoku) PSNR(dB) (with 4 4 Sudoku) Shadow Shadow Shadow Shadow Shadow Average Security Comm. Networks 2016; 9: John Wiley & Sons, Ltd. 4083

10 Progressive secret image sharing scheme using meaningful shadows Z.-H. Wang et al. Figure 11. The test images in Chen and Lin s scheme. Figure 12. The shadow images in our scheme using 9 9 Sudoku Security Comm. Networks 2016; 9: John Wiley & Sons, Ltd.

11 Z.-H. Wang et al. Progressive secret image sharing scheme using meaningful shadows Figure 9 shows the three groups of shadow images with 9 9 Sudoku. Figure 10 shows the three groups of shadow images with the 4 4 Sudoku. The value of the PSNR of the shadow images is shown in Tables I III. We use the notation shadow s.t to represent shadow t in the group s. From Figures 9 and 10, we can see that the distortion is imperceptible with either the 9 9 Sudoku or the 4 4 Sudoku. That is, our proposed scheme can successfully camouflage shadows from intruders. From Tables I III, we can observe that using 4 4 Sudoku achieves higher PSNR than 9 9 Sudoku because the size of the Sudoku matters. As to the experiments with 4 4 Sudoku, the variation range of shadow 1 and shadow 2 is [ 1, 1] and the variation range of the other shadow images is [ 3, 3]. With respect to the experiments with 9 9 Sudoku, the variation ranges of pixels in shadow 1 and shadow 2 are [ 2, 2] and the variation ranges of the other shadow images are [ 8, 8]. In addition, to evaluate the performance of the proposed scheme, we compare the experimental results with Chen and Lin s [18] scheme. The test images used in Chen and Lin s scheme are shown in Figure 11. We use the same test images to make a fair comparison. In the experiment, we test the proposed scheme with 9 9 Sudoku and 4 4 Sudoku again, and the generated shadow images are shown in Figures 12 and 13. Table IV shows the PSNRs of the shadow images from the proposed scheme and from Chen and Lin s. Obviously, the proposed scheme achieves higher PSNR of the same shadow images. In every table, we can see that shadow images like shadow 1 and shadow 2 have a higher value of PSNR, while shadow 3, shadow 4, and other shadow images have a lower Table IV. The contrast of shadow images peak signal-to-noise rate in two schemes. 9 9 Sudoku (db) 4 4 Sudoku (db) value. The reason is that the variation ranges of the pixel values after the embedding in shadow 1 and shadow 2 are [ (N 1), N 1], while in the rest of the shadows, they are [ (N 2 1), N 2 1] Recovered images using shadow images progressively Chen and Lin s scheme (db) Boat Airplane Man Fish Fruit After the process of reconstruction, we obtain the secret image using the shadow images. Sudoku with a 3 3 block using the images is shown in Figure 7. Figure 14 demonstrates one group of recovered images. Image (a) is recovered with two shadow images and image (b) is recovered with three shadow images, while image (c) is recovered with four shadow images and image (d) is the original secret image. Figure 15 shows the progressively recovered secret images with 4 4 Sudoku using the images in Chen and Lin s scheme, as shown in Figure 11. We can figure that by using more shadow images, the recovered image is closer to the original image. When using all the shadow Figure 13. The shadow images in our scheme using 4 4 Sudoku. Security Comm. Networks 2016; 9: John Wiley & Sons, Ltd. 4085

12 Progressive secret image sharing scheme using meaningful shadows Z.-H. Wang et al. Figure 14. The recovered images and the secret image. Figure 15. The recovered images Security Comm. Networks 2016; 9: John Wiley & Sons, Ltd.

13 Z.-H. Wang et al. Progressive secret image sharing scheme using meaningful shadows Table V. Peak signal-to-noise rates using different numbers of shadow images. Numbers of shadow images images, the recovered image has no distortion. The PSNRs of the recovered images are shown in Table V. One can see that by using the same number of shadow images, the results with 3 3 Sudoku are better than with 4 4 Sudoku because using 9 9 Sudoku can embed more secret data than 4 4 Sudoku does, so with the same number of shadow images, the 9 9 Sudoku can reconstruct more secret data. 6. CONCLUSIONS In this paper, a progressive secret image sharing scheme with meaningful shadows is proposed. We embed secret images into host images using a magic matrix generated by different sizes of Sudoku and simultaneously obtain different numbers of shadow images. If the size of the Sudoku is smaller, the quality of the generated shadow images is more satisfactory, which can reduce the malicious intruder s attention when the image is transmitted over the Internet. In addition, the quality of the reconstructed secret image is proportional to the number of shadow images; the lossless secret image can be retrieved when all shadow images work together. Also, compared with Chen and Lin s scheme, the proposed scheme achieves a higher PSNR of the same shadow images in the experiments. ACKNOWLEDGEMENTS This work was supported by the National Nature Science Foundation of China under Grant No REFERENCES Chen and Lin s scheme The proposed scheme 4 4 Sudoku (db) 9 9 Sudoku (db) Lossless 5 Lossless Lossless 1. Qin C, Chang CC, Huang YH, Liao LT. An inpainting-assisted reversible steganographic scheme using a histogram shifting mechanism. IEEE Transactions on Circuits and Systems for Video Technology 2013; 23(7): Qin C, Chang CC, Chen YC. Efficient reversible data hiding for VQ-compressed images based on index mapping mechanism. Signal Processing 2013; 93(9): Qin C, Chang CC, Hsu TJ. Reversible data hiding scheme based on exploiting modification direction with two steganographic images. Multimedia Tools and Applications 2015; 74(15): Drăgan CC, Ţiplea FL. Distributive weighted threshold secret sharing schemes. Information Sciences 2016; 339: Hou YC, Quan ZY, Tsai CF. A privilege-based visual secret sharing model. Journal of Visual Communication and Image Representation 2015; 33: Yang CN, Chen CHand Cai SR. Enhanced Booleanbased multi secret image sharing scheme. Journal of Systems and Software 2016; 116: Chang CC, Hwang RJ. Efficient cheater identification method for threshold schemes. IEE Proceedings- Computers and Digital Techniques 1997; 144(1): Blakley GR. Safeguarding cryptographic keys. AFIPS Conference Proceedings 1979; 48: Shamir A. How to share a secret. Communications of the ACM 1979; 22(11): Thien CC, Lin JC. Secret image sharing. Computers & Graphics 2002; 26(5): Wang RZ, Shyu SJ. Scalable secret image sharing. Signal Processing: Image Communication 2007; 22(4): Lin CC, Tsai WH. Secret image sharing with steganography and authentication. Journal of Systems and Software 2004; 73(3): Wu YS, Thien CC, Lin JC. Sharing and hiding secret images with size constraint. Pattern Recognition 2004; 37(7): Tsai CS, Chang CC, Chen TS. Sharing multiple secrets in digital images. Journal of Systems and Software 2002; 64(2): Zhao R, Zhao JJ, Dai F, Zhao FQ. A new image secret sharing scheme to identify cheaters. Computer Standards & Interfaces 2009; 31(1): Chang CC, Hsieh YP, Lin CH. Sharing secrets in stego images with authentication. Pattern Recognition 2008; 41(10): Yang CN, Chen TS, Yu KH, Wang CC. Improvements of image sharing with steganography and authentication. Journal of Systems and Software 2007; 80(7): Chen SK, Lin JC. Fault-tolerant and progressive transmission of images. Pattern Recognition 2005; 38(12): Aaronson L. Sudoku science. IEEE Spectrum 2006; 43(2): Felgenhauer B, Jarvis F. Mathematics of sudoku I. Mathematical Spectrum 2006; 39(1): Security Comm. Networks 2016; 9: John Wiley & Sons, Ltd. 4087

14 Progressive secret image sharing scheme using meaningful shadows Z.-H. Wang et al. 21. Russell E, Jarvis F. Mathematics of sudoku II. Mathematical Spectrum 2006; 39(2): Chang CC, Chou YC, Kieu TD. An information hiding scheme using sudoku. Proceedings of the Third International Conference on Innovative Computing Information and Control, Dalian, 2008; Chang CC, Chen YH, Wang ZH, Li MC. A data embedding scheme based on a magic matrix and wet paper codes. Proceeding of International Conference on Computational Intelligence and Natural Computing 2009; 2: Security Comm. Networks 2016; 9: John Wiley & Sons, Ltd.

Comparative Histogram Analysis of LSB-based Image Steganography

Comparative Histogram Analysis of LSB-based Image Steganography Comparative Histogram Analysis of LSB-based Image Steganography KI-HYUN JUNG Department of Cyber Security Kyungil University 50 Gamasil-gil, Hayang-eup, Gyeongsan-si, Gyeongbuk 38428 REPUBLIC OF KOREA

More information

Reversible data hiding based on histogram modification using S-type and Hilbert curve scanning

Reversible data hiding based on histogram modification using S-type and Hilbert curve scanning Advances in Engineering Research (AER), volume 116 International Conference on Communication and Electronic Information Engineering (CEIE 016) Reversible data hiding based on histogram modification using

More information

A Reversible Data Hiding Scheme Based on Prediction Difference

A Reversible Data Hiding Scheme Based on Prediction Difference 2017 2 nd International Conference on Computer Science and Technology (CST 2017) ISBN: 978-1-60595-461-5 A Reversible Data Hiding Scheme Based on Prediction Difference Ze-rui SUN 1,a*, Guo-en XIA 1,2,

More information

Image Steganography using Sudoku Puzzle for Secured Data Transmission

Image Steganography using Sudoku Puzzle for Secured Data Transmission Image Steganography using Sudoku Puzzle for Secured Data Transmission Sanmitra Ijeri, Shivananda Pujeri, Shrikant B, Usha B A, Asst.Prof.Departemen t of CSE R.V College Of ABSTRACT Image Steganography

More information

Progressive sharing of multiple images with sensitivity-controlled decoding

Progressive sharing of multiple images with sensitivity-controlled decoding Chang et al. EURASIP Journal on Advances in Signal Processing (2015) 2015:11 DOI 10.1186/s13634-015-0196-z RESEARCH Progressive sharing of multiple images with sensitivity-controlled decoding Sheng-Yu

More information

Exploration of Least Significant Bit Based Watermarking and Its Robustness against Salt and Pepper Noise

Exploration of Least Significant Bit Based Watermarking and Its Robustness against Salt and Pepper Noise Exploration of Least Significant Bit Based Watermarking and Its Robustness against Salt and Pepper Noise Kamaldeep Joshi, Rajkumar Yadav, Sachin Allwadhi Abstract Image steganography is the best aspect

More information

A Novel (2,n) Secret Image Sharing Scheme

A Novel (2,n) Secret Image Sharing Scheme Available online at www.sciencedirect.com Procedia Technology 4 (2012 ) 619 623 C3IT-2012 A Novel (2,n) Secret Image Sharing Scheme Tapasi Bhattacharjee a, Jyoti Prakash Singh b, Amitava Nag c a Departmet

More information

Meta-data based secret image sharing application for different sized biomedical

Meta-data based secret image sharing application for different sized biomedical Biomedical Research 2018; Special Issue: S394-S398 ISSN 0970-938X www.biomedres.info Meta-data based secret image sharing application for different sized biomedical images. Arunkumar S 1*, Subramaniyaswamy

More information

HYBRID MATRIX CODING AND ERROR-CORRECTION CODING SCHEME FOR REVERSIBLE DATA HIDING IN BINARY VQ INDEX CODESTREAM

HYBRID MATRIX CODING AND ERROR-CORRECTION CODING SCHEME FOR REVERSIBLE DATA HIDING IN BINARY VQ INDEX CODESTREAM International Journal of Innovative Computing, Information and Control ICIC International c 2013 ISSN 1349-4198 Volume 9, Number 6, June 2013 pp. 2521 2531 HYBRID MATRIX CODING AND ERROR-CORRECTION CODING

More information

Reviewing Multiple Secret Image Sharing Scheme based on Matrix Multiplication

Reviewing Multiple Secret Image Sharing Scheme based on Matrix Multiplication Reviewing Multiple Secret Image Sharing Scheme based on Matrix Multiplication Fereshte Sheikh Sang Tajan Massoud Hadian Dehkordi Abdolrasoul Mirghadri Faculty and Research Center of Communication and Information

More information

Local prediction based reversible watermarking framework for digital videos

Local prediction based reversible watermarking framework for digital videos Local prediction based reversible watermarking framework for digital videos J.Priyanka (M.tech.) 1 K.Chaintanya (Asst.proff,M.tech(Ph.D)) 2 M.Tech, Computer science and engineering, Acharya Nagarjuna University,

More information

International Journal of Advance Research in Computer Science and Management Studies

International Journal of Advance Research in Computer Science and Management Studies Volume 3, Issue 2, February 2015 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online

More information

REVERSIBLE data hiding, or lossless data hiding, hides

REVERSIBLE data hiding, or lossless data hiding, hides IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 16, NO. 10, OCTOBER 2006 1301 A Reversible Data Hiding Scheme Based on Side Match Vector Quantization Chin-Chen Chang, Fellow, IEEE,

More information

Journal of mathematics and computer science 11 (2014),

Journal of mathematics and computer science 11 (2014), Journal of mathematics and computer science 11 (2014), 137-146 Application of Unsharp Mask in Augmenting the Quality of Extracted Watermark in Spatial Domain Watermarking Saeed Amirgholipour 1 *,Ahmad

More information

A Lossless Large-Volume Data Hiding Method Based on Histogram Shifting Using an Optimal Hierarchical Block Division Scheme *

A Lossless Large-Volume Data Hiding Method Based on Histogram Shifting Using an Optimal Hierarchical Block Division Scheme * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 27, 1265-1282 (2011) A Lossless Large-Volume Data Hiding Method Based on Histogram Shifting Using an Optimal Hierarchical Block Division Scheme * CHE-WEI

More information

Watermarking patient data in encrypted medical images

Watermarking patient data in encrypted medical images Sādhanā Vol. 37, Part 6, December 2012, pp. 723 729. c Indian Academy of Sciences Watermarking patient data in encrypted medical images 1. Introduction A LAVANYA and V NATARAJAN Department of Instrumentation

More information

Histogram Modification Based Reversible Data Hiding Using Neighbouring Pixel Differences

Histogram Modification Based Reversible Data Hiding Using Neighbouring Pixel Differences Histogram Modification Based Reversible Data Hiding Using Neighbouring Pixel Differences Ankita Meenpal*, Shital S Mali. Department of Elex. & Telecomm. RAIT, Nerul, Navi Mumbai, Mumbai, University, India

More information

An Enhanced Least Significant Bit Steganography Technique

An Enhanced Least Significant Bit Steganography Technique An Enhanced Least Significant Bit Steganography Technique Mohit Abstract - Message transmission through internet as medium, is becoming increasingly popular. Hence issues like information security are

More information

Color PNG Image Authentication Scheme Based on Rehashing and Secret Sharing Method

Color PNG Image Authentication Scheme Based on Rehashing and Secret Sharing Method Journal of Information Hiding and Multimedia Signal Processing c 015 ISSN 073-41 Ubiquitous International Volume 6, Number 3, May 015 Color PNG Image Authentication Scheme Based on Rehashing and Secret

More information

Multi Secret Sharing Scheme for Encrypting Two Secret Images into Two Shares

Multi Secret Sharing Scheme for Encrypting Two Secret Images into Two Shares 2011 International Conference on Information and Electronics Engineering IPCSIT vol.6 (2011) (2011) IACSIT Press, Singapore Multi Secret Sharing Scheme for Encrypting Two Secret Images into Two Shares

More information

Secure Image Steganography using N-Queen Puzzle and its Comparison with LSB Technique

Secure Image Steganography using N-Queen Puzzle and its Comparison with LSB Technique Secure Steganography using N-Queen Puzzle and its Comparison with LSB Technique Akashdeep Singh Sandeep Kaur Dhanda Rupinder Kaur Abstract- Steganography is the art of concealing the existence of information

More information

Commutative reversible data hiding and encryption

Commutative reversible data hiding and encryption SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks 3; 6:396 43 Published online March 3 in Wiley Online Library (wileyonlinelibrary.com)..74 RESEARCH ARTICLE Xinpeng Zhang* School of Communication

More information

International Conference on Advances in Engineering & Technology 2014 (ICAET-2014) 48 Page

International Conference on Advances in Engineering & Technology 2014 (ICAET-2014) 48 Page Analysis of Visual Cryptography Schemes Using Adaptive Space Filling Curve Ordered Dithering V.Chinnapudevi 1, Dr.M.Narsing Yadav 2 1.Associate Professor, Dept of ECE, Brindavan Institute of Technology

More information

A Rumination of Error Diffusions in Color Extended Visual Cryptography P.Pardhasaradhi #1, P.Seetharamaiah *2

A Rumination of Error Diffusions in Color Extended Visual Cryptography P.Pardhasaradhi #1, P.Seetharamaiah *2 A Rumination of Error Diffusions in Color Extended Visual Cryptography P.Pardhasaradhi #1, P.Seetharamaiah *2 # Department of CSE, Bapatla Engineering College, Bapatla, AP, India *Department of CS&SE,

More information

Hiding Image in Image by Five Modulus Method for Image Steganography

Hiding Image in Image by Five Modulus Method for Image Steganography Hiding Image in Image by Five Modulus Method for Image Steganography Firas A. Jassim Abstract This paper is to create a practical steganographic implementation to hide color image (stego) inside another

More information

Chapter 3 LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING COMPRESSED ENCRYPTED DATA USING VARIOUS FILE FORMATS

Chapter 3 LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING COMPRESSED ENCRYPTED DATA USING VARIOUS FILE FORMATS 44 Chapter 3 LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING COMPRESSED ENCRYPTED DATA USING VARIOUS FILE FORMATS 45 CHAPTER 3 Chapter 3: LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING

More information

Webpage: Volume 4, Issue VI, June 2016 ISSN

Webpage:   Volume 4, Issue VI, June 2016 ISSN 4-P Secret Sharing Scheme Deepa Bajaj 1, Navneet Verma 2 1 Master s in Technology (Dept. of CSE), 2 Assistant Professr (Dept. of CSE) 1 er.deepabajaj@gmail.com, 2 navneetcse@geeta.edu.in Geeta Engineering

More information

Data Hiding Algorithm for Images Using Discrete Wavelet Transform and Arnold Transform

Data Hiding Algorithm for Images Using Discrete Wavelet Transform and Arnold Transform J Inf Process Syst, Vol.13, No.5, pp.1331~1344, October 2017 https://doi.org/10.3745/jips.03.0042 ISSN 1976-913X (Print) ISSN 2092-805X (Electronic) Data Hiding Algorithm for Images Using Discrete Wavelet

More information

Efficient Scheme for Secret Hiding in QR Code by Improving Exploiting Modification Direction

Efficient Scheme for Secret Hiding in QR Code by Improving Exploiting Modification Direction KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS VOL. 12, NO. 5, May. 2018 2348 Copyright c 2018 KSII Efficient Scheme for Secret Hiding in QR Code by Improving Exploiting Modification Direction Peng-Cheng

More information

Analysis of Secure Text Embedding using Steganography

Analysis of Secure Text Embedding using Steganography Analysis of Secure Text Embedding using Steganography Rupinder Kaur Department of Computer Science and Engineering BBSBEC, Fatehgarh Sahib, Punjab, India Deepak Aggarwal Department of Computer Science

More information

VISUAL CRYPTOGRAPHY for COLOR IMAGES USING ERROR DIFFUSION AND PIXEL SYNCHRONIZATION

VISUAL CRYPTOGRAPHY for COLOR IMAGES USING ERROR DIFFUSION AND PIXEL SYNCHRONIZATION VISUAL CRYPTOGRAPHY for COLOR IMAGES USING ERROR DIFFUSION AND PIXEL SYNCHRONIZATION Pankaja Patil Department of Computer Science and Engineering Gogte Institute of Technology, Belgaum, Karnataka Bharati

More information

Digital Image Watermarking using MSLDIP (Modified Substitute Last Digit in Pixel)

Digital Image Watermarking using MSLDIP (Modified Substitute Last Digit in Pixel) Digital Watermarking using MSLDIP (Modified Substitute Last Digit in Pixel) Abdelmgeid A. Ali Ahmed A. Radwan Ahmed H. Ismail ABSTRACT The improvements in Internet technologies and growing requests on

More information

Visual Cryptography Scheme for Gray Scale Images based on Intensity Division

Visual Cryptography Scheme for Gray Scale Images based on Intensity Division Research Article International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347-5161 2014 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Pradeep

More information

Steganography using LSB bit Substitution for data hiding

Steganography using LSB bit Substitution for data hiding ISSN: 2277 943 Volume 2, Issue 1, October 213 Steganography using LSB bit Substitution for data hiding Himanshu Gupta, Asst.Prof. Ritesh Kumar, Dr.Soni Changlani Department of Electronics and Communication

More information

A Visual Cryptography Based Watermark Technology for Individual and Group Images

A Visual Cryptography Based Watermark Technology for Individual and Group Images A Visual Cryptography Based Watermark Technology for Individual and Group Images Azzam SLEIT (Previously, Azzam IBRAHIM) King Abdullah II School for Information Technology, University of Jordan, Amman,

More information

Authentication of grayscale document images using shamir secret sharing scheme.

Authentication of grayscale document images using shamir secret sharing scheme. IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 2, Ver. VII (Mar-Apr. 2014), PP 75-79 Authentication of grayscale document images using shamir secret

More information

High-Capacity Reversible Data Hiding in Encrypted Images using MSB Prediction

High-Capacity Reversible Data Hiding in Encrypted Images using MSB Prediction High-Capacity Reversible Data Hiding in Encrypted Images using MSB Prediction Pauline Puteaux and William Puech; LIRMM Laboratory UMR 5506 CNRS, University of Montpellier; Montpellier, France Abstract

More information

ScienceDirect. A Novel DWT based Image Securing Method using Steganography

ScienceDirect. A Novel DWT based Image Securing Method using Steganography Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 46 (2015 ) 612 618 International Conference on Information and Communication Technologies (ICICT 2014) A Novel DWT based

More information

Enhance Image using Dynamic Histogram and Data Hiding Technique

Enhance Image using Dynamic Histogram and Data Hiding Technique _ Enhance Image using Dynamic Histogram and Data Hiding Technique 1 D.Bharadwaja, 2 Y.V.N.Tulasi 1 Department of CSE, Gudlavalleru Engineering College, Email: bharadwaja599@gmail.com 2 Department of CSE,

More information

REVERSIBLE MEDICAL IMAGE WATERMARKING TECHNIQUE USING HISTOGRAM SHIFTING

REVERSIBLE MEDICAL IMAGE WATERMARKING TECHNIQUE USING HISTOGRAM SHIFTING REVERSIBLE MEDICAL IMAGE WATERMARKING TECHNIQUE USING HISTOGRAM SHIFTING S.Mounika 1, M.L. Mittal 2 1 Department of ECE, MRCET, Hyderabad, India 2 Professor Department of ECE, MRCET, Hyderabad, India ABSTRACT

More information

Fixed Unmitigated Image Cryptography Schemes

Fixed Unmitigated Image Cryptography Schemes IJCST Vo l. 3, Is s u e 3, Ju l y - Se p t 2012 ISSN : 0976-8491 (Online) ISSN : 2229-4333 (Print) Fixed Unmitigated Image Cryptography Schemes 1 V. Redya Jadav, 2 Jonnalagadda Sravani 1,2 Dept. of CSE,

More information

AN EXTENDED VISUAL CRYPTOGRAPHY SCHEME WITHOUT PIXEL EXPANSION FOR HALFTONE IMAGES. N. Askari, H.M. Heys, and C.R. Moloney

AN EXTENDED VISUAL CRYPTOGRAPHY SCHEME WITHOUT PIXEL EXPANSION FOR HALFTONE IMAGES. N. Askari, H.M. Heys, and C.R. Moloney 26TH ANNUAL IEEE CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING YEAR 2013 AN EXTENDED VISUAL CRYPTOGRAPHY SCHEME WITHOUT PIXEL EXPANSION FOR HALFTONE IMAGES N. Askari, H.M. Heys, and C.R. Moloney

More information

Visual Secret Sharing Based Digital Image Watermarking

Visual Secret Sharing Based Digital Image Watermarking www.ijcsi.org 312 Visual Secret Sharing Based Digital Image Watermarking B. Surekha 1, Dr. G. N. Swamy 2 1 Associate Professor, Department of ECE, TRR College of Engineering, Hyderabad, Andhra Pradesh,

More information

A Steganography Algorithm for Hiding Secret Message inside Image using Random Key

A Steganography Algorithm for Hiding Secret Message inside Image using Random Key A Steganography Algorithm for Hiding Secret Message inside Image using Random Key Balvinder Singh Sahil Kataria Tarun Kumar Narpat Singh Shekhawat Abstract "Steganography is a Greek origin word which means

More information

A Cost-Effective Private-Key Cryptosystem for Color Image Encryption

A Cost-Effective Private-Key Cryptosystem for Color Image Encryption A Cost-Effective Private-Key Cryptosystem for Color Image Encryption Rastislav Lukac and Konstantinos N. Plataniotis The Edward S. Rogers Sr. Dept. of Electrical and Computer Engineering, University of

More information

Sunil Karforma Associate Professor Dept. of Computer Science The University of Burdwan Burdwan, West Bengal, India

Sunil Karforma Associate Professor Dept. of Computer Science The University of Burdwan Burdwan, West Bengal, India Volume 4, Issue 8, August 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Analysis of Least-Significant-Bit

More information

An Optimal Pixel-level Self-repairing Authentication. Method for Grayscale Images under a Minimax. Criterion of Distortion Reduction*

An Optimal Pixel-level Self-repairing Authentication. Method for Grayscale Images under a Minimax. Criterion of Distortion Reduction* An Optimal Pixel-level Self-repairing Authentication Method for Grayscale Images under a Minimax Criterion of Distortion Reduction* Che-Wei Lee 1 and Wen-Hsiang Tsai 1, 2, 1 Department of Computer Science

More information

Secret Sharing Image Between End Users by using Cryptography Technique

Secret Sharing Image Between End Users by using Cryptography Technique Secret Sharing Image Between End Users by using Cryptography Technique SRINIVASA RAJESH KUMAR D. M.Tech Scholar Department of CSE, B V C Engineering college, Odalarevu P.MARESWARAMMA Associate Professor

More information

An Integrated Image Steganography System. with Improved Image Quality

An Integrated Image Steganography System. with Improved Image Quality Applied Mathematical Sciences, Vol. 7, 2013, no. 71, 3545-3553 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ams.2013.34236 An Integrated Image Steganography System with Improved Image Quality

More information

A Novel Image Steganography Based on Contourlet Transform and Hill Cipher

A Novel Image Steganography Based on Contourlet Transform and Hill Cipher Journal of Information Hiding and Multimedia Signal Processing c 2015 ISSN 2073-4212 Ubiquitous International Volume 6, Number 5, September 2015 A Novel Image Steganography Based on Contourlet Transform

More information

Watermarking-based Image Authentication with Recovery Capability using Halftoning and IWT

Watermarking-based Image Authentication with Recovery Capability using Halftoning and IWT Watermarking-based Image Authentication with Recovery Capability using Halftoning and IWT Luis Rosales-Roldan, Manuel Cedillo-Hernández, Mariko Nakano-Miyatake, Héctor Pérez-Meana Postgraduate Section,

More information

VARIABLE-RATE STEGANOGRAPHY USING RGB STEGO- IMAGES

VARIABLE-RATE STEGANOGRAPHY USING RGB STEGO- IMAGES VARIABLE-RATE STEGANOGRAPHY USING RGB STEGO- IMAGES Ayman M. Abdalla, PhD Dept. of Multimedia Systems, Al-Zaytoonah University, Amman, Jordan Abstract A new algorithm is presented for hiding information

More information

IEEE Signal Processing Letters: SPL Distance-Reciprocal Distortion Measure for Binary Document Images

IEEE Signal Processing Letters: SPL Distance-Reciprocal Distortion Measure for Binary Document Images IEEE SIGNAL PROCESSING LETTERS, VOL. X, NO. Y, Z 2003 1 IEEE Signal Processing Letters: SPL-00466-2002 1) Paper Title Distance-Reciprocal Distortion Measure for Binary Document Images 2) Authors Haiping

More information

Embedding and Extracting Two Separate Images Signal in Salt & Pepper Noises in Digital Images based on Watermarking

Embedding and Extracting Two Separate Images Signal in Salt & Pepper Noises in Digital Images based on Watermarking 3rd International Conference on Pattern Recognition and Image Analysis (IPRIA 2017) April 19-20, 2017 Embedding and Extracting Two Separate Images Signal in Salt & Pepper Noises in Digital Images based

More information

An Overview of Visual Cryptography Schemes for Encryption of Images

An Overview of Visual Cryptography Schemes for Encryption of Images An Overview of Visual Cryptography Schemes for Encryption of Images Moumita Pramanik 1, Kalpana Sharma 2 1 Sikkim Manipal Institute of Technology, Majitar, India, Email: moumita.pramanik@gmail.com 2 Sikkim

More information

Introduction to More Advanced Steganography. John Ortiz. Crucial Security Inc. San Antonio

Introduction to More Advanced Steganography. John Ortiz. Crucial Security Inc. San Antonio Introduction to More Advanced Steganography John Ortiz Crucial Security Inc. San Antonio John.Ortiz@Harris.com 210 977-6615 11/17/2011 Advanced Steganography 1 Can YOU See the Difference? Which one of

More information

Pattern Recognition 41 (2008) Contents lists available at ScienceDirect. Pattern Recognition

Pattern Recognition 41 (2008) Contents lists available at ScienceDirect. Pattern Recognition Pattern Recognition 41 (2008) 3497 -- 3506 Contents lists available at ScienceDirect Pattern Recognition journal homepage: www.elsevier.com/locate/pr Dual watermark for image tamper detection and recovery

More information

Abstract. 1 Introduction. 2 The Proposed Scheme. The 29th Workshop on Combinatorial Mathematics and Computation Theory

Abstract. 1 Introduction. 2 The Proposed Scheme. The 29th Workshop on Combinatorial Mathematics and Computation Theory The 29th Workshop on Combinatorial Mathematics and Computation Theory Visual Cryptography for Gray-level Image by Random Grids * Hui-Yu Hsu and Justie Su-Tzu Juan 1 Department of Computer Science and Information

More information

Blind Single-Image Super Resolution Reconstruction with Defocus Blur

Blind Single-Image Super Resolution Reconstruction with Defocus Blur Sensors & Transducers 2014 by IFSA Publishing, S. L. http://www.sensorsportal.com Blind Single-Image Super Resolution Reconstruction with Defocus Blur Fengqing Qin, Lihong Zhu, Lilan Cao, Wanan Yang Institute

More information

Sterilization of Stego-images through Histogram Normalization

Sterilization of Stego-images through Histogram Normalization Sterilization of Stego-images through Histogram Normalization Goutam Paul 1 and Imon Mukherjee 2 1 Dept. of Computer Science & Engineering, Jadavpur University, Kolkata 700 032, India. Email: goutam.paul@ieee.org

More information

Digital Watermarking Using Homogeneity in Image

Digital Watermarking Using Homogeneity in Image Digital Watermarking Using Homogeneity in Image S. K. Mitra, M. K. Kundu, C. A. Murthy, B. B. Bhattacharya and T. Acharya Dhirubhai Ambani Institute of Information and Communication Technology Gandhinagar

More information

Keywords Secret data, Host data, DWT, LSB substitution.

Keywords Secret data, Host data, DWT, LSB substitution. Volume 5, Issue 3, March 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance Evaluation

More information

Improved RGB -LSB Steganography Using Secret Key Ankita Gangwar 1, Vishal shrivastava 2

Improved RGB -LSB Steganography Using Secret Key Ankita Gangwar 1, Vishal shrivastava 2 Improved RGB -LSB Steganography Using Secret Key Ankita Gangwar 1, Vishal shrivastava 2 Computer science Department 1, Computer science department 2 Research scholar 1, professor 2 Mewar University, India

More information

Evaluation of Visual Cryptography Halftoning Algorithms

Evaluation of Visual Cryptography Halftoning Algorithms Evaluation of Visual Cryptography Halftoning Algorithms Shital B Patel 1, Dr. Vinod L Desai 2 1 Research Scholar, RK University, Kasturbadham, Rajkot, India. 2 Assistant Professor, Department of Computer

More information

A New Compression Method for Encrypted Images

A New Compression Method for Encrypted Images Technology, Volume-2, Issue-2, March-April, 2014, pp. 15-19 IASTER 2014, www.iaster.com Online: 2347-5099, Print: 2348-0009 ABSTRACT A New Compression Method for Encrypted Images S. Manimurugan, Naveen

More information

A STENO HIDING USING CAMOUFLAGE BASED VISUAL CRYPTOGRAPHY SCHEME

A STENO HIDING USING CAMOUFLAGE BASED VISUAL CRYPTOGRAPHY SCHEME International Journal of Power Control Signal and Computation (IJPCSC) Vol. 2 No. 1 ISSN : 0976-268X A STENO HIDING USING CAMOUFLAGE BASED VISUAL CRYPTOGRAPHY SCHEME 1 P. Arunagiri, 2 B.Rajeswary, 3 S.Arunmozhi

More information

A Review On Modern Secure Mosaic Video Generation For Secure Video Transmission

A Review On Modern Secure Mosaic Video Generation For Secure Video Transmission A Review On Modern Secure Mosaic Video Generation For Secure Video Transmission Mr.Swapnil Patil, Prof.A.A Deshmukh DEPARTMENT OF ENTC ENGINEERING G. H. Raisoni Institute of Engineering and Technology

More information

A Novel Technique in Visual Cryptography

A Novel Technique in Visual Cryptography International Journal of Engineering Inventions e-issn: 2278-7461, p-issn: 2319-6491 Volume 3, Issue 10 [May. 2014] PP: 57-61 A Novel Technique in Visual Cryptography B. Ravi Kumar 1, P.Srikanth 2 1,2

More information

Passport Authentication Using PNG Image with Data Repair Capability

Passport Authentication Using PNG Image with Data Repair Capability Passport Authentication Using PNG Image with Data Repair Capability Aswathi Muralidharan, Maria Johnson, Roshna Raj, Deepika M P Abstract The system Passport Authentication Using PNG Image with Data Repair

More information

A SECURE IMAGE STEGANOGRAPHY USING LEAST SIGNIFICANT BIT TECHNIQUE

A SECURE IMAGE STEGANOGRAPHY USING LEAST SIGNIFICANT BIT TECHNIQUE Int. J. Engg. Res. & Sci. & Tech. 2014 Amit and Jyoti Pruthi, 2014 Research Paper A SECURE IMAGE STEGANOGRAPHY USING LEAST SIGNIFICANT BIT TECHNIQUE Amit 1 * and Jyoti Pruthi 1 *Corresponding Author: Amit

More information

Various Visual Secret Sharing Schemes- A Review

Various Visual Secret Sharing Schemes- A Review Various Visual Secret Sharing Schemes- A Review Mrunali T. Gedam Department of Computer Science and Engineering Tulsiramji Gaikwad-Patil College of Engineering and Technology, Nagpur, India Vinay S. Kapse

More information

Open Access Research of Dielectric Loss Measurement with Sparse Representation

Open Access Research of Dielectric Loss Measurement with Sparse Representation Send Orders for Reprints to reprints@benthamscience.ae 698 The Open Automation and Control Systems Journal, 2, 7, 698-73 Open Access Research of Dielectric Loss Measurement with Sparse Representation Zheng

More information

AN IMPROVED LSB METHOD OF STEGANOGRAPHY WITH JPEG COLORED IMAGE

AN IMPROVED LSB METHOD OF STEGANOGRAPHY WITH JPEG COLORED IMAGE (IJISE) 207, Vol. No. 5, Jan-Jun e-issn: 2454-6402, p-issn: 2454-82X AN IMPROVED LSB METHOD OF STEGANOGRAPHY WITH JPEG COLORED IMAGE Dr. Rajesh Kumar Pathak, 2 Neha Jain Professor &Director GNCT Greater

More information

An Implementation of LSB Steganography Using DWT Technique

An Implementation of LSB Steganography Using DWT Technique An Implementation of LSB Steganography Using DWT Technique G. Raj Kumar, M. Maruthi Prasada Reddy, T. Lalith Kumar Electronics & Communication Engineering #,JNTU A University Electronics & Communication

More information

LOSSLESS CRYPTO-DATA HIDING IN MEDICAL IMAGES WITHOUT INCREASING THE ORIGINAL IMAGE SIZE THE METHOD

LOSSLESS CRYPTO-DATA HIDING IN MEDICAL IMAGES WITHOUT INCREASING THE ORIGINAL IMAGE SIZE THE METHOD LOSSLESS CRYPTO-DATA HIDING IN MEDICAL IMAGES WITHOUT INCREASING THE ORIGINAL IMAGE SIZE J.M. Rodrigues, W. Puech and C. Fiorio Laboratoire d Informatique Robotique et Microlectronique de Montpellier LIRMM,

More information

Using Palette and Minimum Spanning Tree for True-Color Image Steganography

Using Palette and Minimum Spanning Tree for True-Color Image Steganography Using Palette and Minimum Spanning Tree for True-Color Image Steganography SHOW-WEI CHIEN 1,, YUNG-FU CHEN 2,, PEI-WEI YEN 3, HSUAN-HUNG LIN 4,* 1 Department of Information Management, National Yunlin

More information

Digital Image Sharing and Removing the Transmission Risk Problem by Using the Diverse Image Media

Digital Image Sharing and Removing the Transmission Risk Problem by Using the Diverse Image Media 1 1 Digital Image Sharing and Removing the Transmission Risk Problem by Using the Diverse Image Media 1 Shradha S. Rathod, 2 Dr. D. V. Jadhav, 1 PG Student, 2 Principal, 1,2 TSSM s Bhivrabai Sawant College

More information

Digital Audio Watermarking With Discrete Wavelet Transform Using Fibonacci Numbers

Digital Audio Watermarking With Discrete Wavelet Transform Using Fibonacci Numbers Digital Audio Watermarking With Discrete Wavelet Transform Using Fibonacci Numbers P. Mohan Kumar 1, Dr. M. Sailaja 2 M. Tech scholar, Dept. of E.C.E, Jawaharlal Nehru Technological University Kakinada,

More information

DWT BASED AUDIO WATERMARKING USING ENERGY COMPARISON

DWT BASED AUDIO WATERMARKING USING ENERGY COMPARISON DWT BASED AUDIO WATERMARKING USING ENERGY COMPARISON K.Thamizhazhakan #1, S.Maheswari *2 # PG Scholar,Department of Electrical and Electronics Engineering, Kongu Engineering College,Erode-638052,India.

More information

Enhanced Efficient Halftoning Technique used in Embedded Extended Visual Cryptography Strategy for Effective Processing

Enhanced Efficient Halftoning Technique used in Embedded Extended Visual Cryptography Strategy for Effective Processing Enhanced Efficient Halftoning Technique used in Embedded Extended Visual Cryptography Strategy for Effective Processing M.Desiha Department of Computer Science and Engineering, Jansons Institute of Technology

More information

Survey on Size Invariant Visual Cryptography

Survey on Size Invariant Visual Cryptography Survey on Size Invariant Visual Cryptography Biswapati Jana 1,Gargi Hait 2,Shyamal Kumar Mondal 3 1 Assistant Professor, Department of Computer Science, Vidyasagar University, PaschimMedinipur, 2 Student,

More information

Application of Histogram Examination for Image Steganography

Application of Histogram Examination for Image Steganography J. Appl. Environ. Biol. Sci., 5(9S)97-104, 2015 2015, TextRoad Publication ISSN: 2090-4274 Journal of Applied Environmental and Biological Sciences www.textroad.com Application of Histogram Examination

More information

ISSN: (Online) Volume 2, Issue 3, March 2014 International Journal of Advance Research in Computer Science and Management Studies

ISSN: (Online) Volume 2, Issue 3, March 2014 International Journal of Advance Research in Computer Science and Management Studies ISSN: 2321-7782 (Online) Volume 2, Issue 3, March 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at: www.ijarcsms.com

More information

Contrast Enhancement using Improved Adaptive Gamma Correction With Weighting Distribution Technique

Contrast Enhancement using Improved Adaptive Gamma Correction With Weighting Distribution Technique Contrast Enhancement using Improved Adaptive Gamma Correction With Weighting Distribution Seema Rani Research Scholar Computer Engineering Department Yadavindra College of Engineering Talwandi sabo, Bathinda,

More information

Lossless Image Watermarking for HDR Images Using Tone Mapping

Lossless Image Watermarking for HDR Images Using Tone Mapping IJCSNS International Journal of Computer Science and Network Security, VOL.13 No.5, May 2013 113 Lossless Image Watermarking for HDR Images Using Tone Mapping A.Nagurammal 1, T.Meyyappan 2 1 M. Phil Scholar

More information

Emerging Applications of Reversible Data Hiding

Emerging Applications of Reversible Data Hiding 1 Emerging Applications of Reversible Data Hiding Dongdong Hou 1, Weiming Zhang 2, Jiayang Liu 3, Siyan Zhou 4, Dongdong Chen 5, Nenghai Yu 6 12356 School of Information Science and Technology, University

More information

Cryptanalysis of an Improved One-Way Hash Chain Self-Healing Group Key Distribution Scheme

Cryptanalysis of an Improved One-Way Hash Chain Self-Healing Group Key Distribution Scheme Cryptanalysis of an Improved One-Way Hash Chain Self-Healing Group Key Distribution Scheme Yandong Zheng 1, Hua Guo 1 1 State Key Laboratory of Software Development Environment, Beihang University Beiing

More information

Research on Pupil Segmentation and Localization in Micro Operation Hu BinLiang1, a, Chen GuoLiang2, b, Ma Hui2, c

Research on Pupil Segmentation and Localization in Micro Operation Hu BinLiang1, a, Chen GuoLiang2, b, Ma Hui2, c 3rd International Conference on Machinery, Materials and Information Technology Applications (ICMMITA 2015) Research on Pupil Segmentation and Localization in Micro Operation Hu BinLiang1, a, Chen GuoLiang2,

More information

Performance Evaluation of Floyd Steinberg Halftoning and Jarvis Haltonong Algorithms in Visual Cryptography

Performance Evaluation of Floyd Steinberg Halftoning and Jarvis Haltonong Algorithms in Visual Cryptography Performance Evaluation of Floyd Steinberg Halftoning and Jarvis Haltonong Algorithms in Visual Cryptography Pratima M. Nikate Department of Electronics & Telecommunication Engineering, P.G.Student,NKOCET,

More information

A New Image Steganography Depending On Reference & LSB

A New Image Steganography Depending On Reference & LSB A New Image Steganography Depending On & LSB Saher Manaseer 1*, Asmaa Aljawawdeh 2 and Dua Alsoudi 3 1 King Abdullah II School for Information Technology, Computer Science Department, The University of

More information

Compendium of Reversible Data Hiding

Compendium of Reversible Data Hiding Compendium of Reversible Data Hiding S.Bhavani 1 and B.Ravi teja 2 Gudlavalleru Engineering College Abstract- In any communication, security is the most important issue in today s world. Lots of data security

More information

Demosaicing Algorithm for Color Filter Arrays Based on SVMs

Demosaicing Algorithm for Color Filter Arrays Based on SVMs www.ijcsi.org 212 Demosaicing Algorithm for Color Filter Arrays Based on SVMs Xiao-fen JIA, Bai-ting Zhao School of Electrical and Information Engineering, Anhui University of Science & Technology Huainan

More information

A Modified Image Template for FELICS Algorithm for Lossless Image Compression

A Modified Image Template for FELICS Algorithm for Lossless Image Compression Research Article International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347-5161 2014 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet A Modified

More information

Contrast Enhancement Based Reversible Image Data Hiding

Contrast Enhancement Based Reversible Image Data Hiding Contrast Enhancement Based Reversible Image Data Hiding Renji Elsa Jacob 1, Prof. Anita Purushotham 2 PG Student [SP], Dept. of ECE, Sri Vellappally Natesan College, Mavelikara, India 1 Assistant Professor,

More information

IMAGE TYPE WATER METER CHARACTER RECOGNITION BASED ON EMBEDDED DSP

IMAGE TYPE WATER METER CHARACTER RECOGNITION BASED ON EMBEDDED DSP IMAGE TYPE WATER METER CHARACTER RECOGNITION BASED ON EMBEDDED DSP LIU Ying 1,HAN Yan-bin 2 and ZHANG Yu-lin 3 1 School of Information Science and Engineering, University of Jinan, Jinan 250022, PR China

More information

A New Representation of Image Through Numbering Pixel Combinations

A New Representation of Image Through Numbering Pixel Combinations A New Representation of Image Through Numbering Pixel Combinations J. Said 1, R. Souissi, H. Hamam 1 1 Faculty of Engineering Moncton, NB Canada ISET-Sfax Tunisia Habib.Hamam@umoncton.ca ABSTRACT: A new

More information

ON PACKING LASER SCANNING MICROSCOPY IMAGES BY REVERSIBLE WATERMARKING: A CASE STUDY

ON PACKING LASER SCANNING MICROSCOPY IMAGES BY REVERSIBLE WATERMARKING: A CASE STUDY ON PACKING LASER SCANNING MICROSCOPY IMAGES BY REVERSIBLE WATERMARKING: A CASE STUDY Ioan-Catalin Dragoi 1 Stefan G. Stanciu 2 Dinu Coltuc 1 Denis E. Tranca 2 Radu Hristu 2 George A. Stanciu 2 1 Electrical

More information

Forward Modified Histogram Shifting based Reversible Watermarking with Reduced Pixel Shifting and High Embedding Capacity

Forward Modified Histogram Shifting based Reversible Watermarking with Reduced Pixel Shifting and High Embedding Capacity International Journal of Electronics and Communication Engineering. ISSN 0974-2166 Volume 5, Number 2 (2012), pp. 185-191 International Research Publication House http://www.irphouse.com Forward Modified

More information

Investigation of Various Image Steganography Techniques in Spatial Domain

Investigation of Various Image Steganography Techniques in Spatial Domain Volume 3, Issue 6, June-2016, pp. 347-351 ISSN (O): 2349-7084 International Journal of Computer Engineering In Research Trends Available online at: www.ijcert.org Investigation of Various Image Steganography

More information

A Proposed Technique For Hiding Data Into Video Files

A Proposed Technique For Hiding Data Into Video Files www.ijcsi.org 68 A Proposed Technique For Hiding Data Into Video Files Mohamed Elbayoumy 1, Mohammed Elmogy 2, Ahmed Abouelfetouh 3 and Rasha Elhadary 4 1 Information systems department, Faculty of computer

More information