Improved Secret Image Sharing Scheme in Embedding Capacity without Underflow and Overflow
نویسندگان
چکیده
Computational secret image sharing (CSIS) is an effective way to protect a secret image during its transmission and storage, and thus it has attracted lots of attentions since its appearance. Nowadays, it has become a hot topic for researchers to improve the embedding capacity and eliminate the underflow and overflow situations, which is embarrassing and difficult to deal with. The scheme, which has the highest embedding capacity among the existing schemes, has the underflow and overflow problems. Although the underflow and overflow situations have been well dealt with by different methods, the embedding capacities of these methods are reduced more or less. Motivated by these concerns, we propose a novel scheme, in which we take the differential coding, Huffman coding, and data converting to compress the secret image before embedding it to further improve the embedding capacity, and the pixel mapping matrix embedding method with a newly designed matrix is used to embed secret image data into the cover image to avoid the underflow and overflow situations. Experiment results show that our scheme can improve the embedding capacity further and eliminate the underflow and overflow situations at the same time.
منابع مشابه
Reversible Data Hiding Based on Geometric Structure of Pixel Groups
Many reversible data hiding schemes have been developed in recent decades. Traditional schemes typically must deal with the problem of overflow and underflow, or transmission of hiding parameters. The new reversible data hiding scheme proposed in this paper is based on a combination of pixel groups’ geometric structure and secret sharing mechanism. Experimental results confirm that the proposed...
متن کاملA Novel Reversible Data Hiding Technique with
In this paper, a new reversible image hiding scheme based on histogram shifting for grayscale images is proposed. As is known, the payload storage of histogram-based reversible data hiding is impacted by the overhead information of the pixel positions that have to be embedded in a cover image. To solve this problem, the cover image is divided into two parts, namely the Most Significant Part (MS...
متن کاملHybrid GEMD Data Hiding
The rising popularity of Internet provides convenience while also raising the risk of disclosure from the viewpoint of information security. In particular, steganography is a common way to safeguard information because it can be used to embed the secret data into the meaningful message and the attacker cannot find it out. In order to increase embedding capacity and maintain others desirable ste...
متن کاملSteganography Scheme Based on Reed-Muller Code with Improving Payload and Ability to Retrieval of Destroyed Data for Digital Images
In this paper, a new steganography scheme with high embedding payload and good visual quality is presented. Before embedding process, secret information is encoded as block using Reed-Muller error correction code. After data encoding and embedding into the low-order bits of host image, modulus function is used to increase visual quality of stego image. Since the proposed method is able to embed...
متن کاملA Location-Map Free Reversible Watermarking With Capacity Control
Reversible watermarking techniques enable the extraction of the embedding bits from a watermarked image in a lossless way. It exploits the high spatial correlation among neighboring pixels. Application in reversible watermarking includes military and medical images. However, images occurs overflow or underflow problems during the imbedding process. Since pixels value may be out of range between...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
دوره 2015 شماره
صفحات -
تاریخ انتشار 2015