AMBTC-based visual secret sharing with different meaningful shadows

Secret sharing based on Absolute Moment Block Truncation Coding (AMBTC) has been widely studied. However, the management of stego images is inconvenient as they seem indistinguishable. Moreover, there exists a problem of pixel expansion, which requires more storage space and higher transmission band...

Descripción completa

Guardado en:
Detalles Bibliográficos
Autores principales: Shudong Wang, Yuliang Lu, Xuehu Yan, Longlong Li, Yongqiang Yu
Formato: article
Lenguaje:EN
Publicado: AIMS Press 2021
Materias:
Acceso en línea:https://doaj.org/article/0d4bc55516304c22a7a25c47a7e3ae06
Etiquetas: Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
id oai:doaj.org-article:0d4bc55516304c22a7a25c47a7e3ae06
record_format dspace
spelling oai:doaj.org-article:0d4bc55516304c22a7a25c47a7e3ae062021-11-09T01:59:03ZAMBTC-based visual secret sharing with different meaningful shadows10.3934/mbe.20212661551-0018https://doaj.org/article/0d4bc55516304c22a7a25c47a7e3ae062021-06-01T00:00:00Zhttps://www.aimspress.com/article/doi/10.3934/mbe.2021266?viewType=HTMLhttps://doaj.org/toc/1551-0018Secret sharing based on Absolute Moment Block Truncation Coding (AMBTC) has been widely studied. However, the management of stego images is inconvenient as they seem indistinguishable. Moreover, there exists a problem of pixel expansion, which requires more storage space and higher transmission bandwidth. To conveniently manage the stego images, we use multiple cover images to make the stego images seem to be visually different from with each other. Futhermore, the stego images are different, which will not cause the attacker's suspicion and increase the security of the scheme. And traditional Visual Secret Sharing (VSS) is fused to eliminate pixel expansion. After images are compressed by AMBTC algorithm, the quantization levels and the bitmap corresponding to each block are obtained. At the same time, when the threshold is (k,k), bitmaps can be recovered losslessly, and the slight degradation of image quality is only caused by the compression itself. When the threshold is another value, the recovered image and the cover images can be recovered with satisfactory image quality. The experimental results and analyses show the effectiveness and advantages of our scheme.Shudong WangYuliang Lu Xuehu YanLonglong Li Yongqiang Yu AIMS Pressarticleabsolute moment block truncation codingvisual secret sharingimage compressionno pixel expansionmeaningful shadowsBiotechnologyTP248.13-248.65MathematicsQA1-939ENMathematical Biosciences and Engineering, Vol 18, Iss 5, Pp 5236-5251 (2021)
institution DOAJ
collection DOAJ
language EN
topic absolute moment block truncation coding
visual secret sharing
image compression
no pixel expansion
meaningful shadows
Biotechnology
TP248.13-248.65
Mathematics
QA1-939
spellingShingle absolute moment block truncation coding
visual secret sharing
image compression
no pixel expansion
meaningful shadows
Biotechnology
TP248.13-248.65
Mathematics
QA1-939
Shudong Wang
Yuliang Lu
Xuehu Yan
Longlong Li
Yongqiang Yu
AMBTC-based visual secret sharing with different meaningful shadows
description Secret sharing based on Absolute Moment Block Truncation Coding (AMBTC) has been widely studied. However, the management of stego images is inconvenient as they seem indistinguishable. Moreover, there exists a problem of pixel expansion, which requires more storage space and higher transmission bandwidth. To conveniently manage the stego images, we use multiple cover images to make the stego images seem to be visually different from with each other. Futhermore, the stego images are different, which will not cause the attacker's suspicion and increase the security of the scheme. And traditional Visual Secret Sharing (VSS) is fused to eliminate pixel expansion. After images are compressed by AMBTC algorithm, the quantization levels and the bitmap corresponding to each block are obtained. At the same time, when the threshold is (k,k), bitmaps can be recovered losslessly, and the slight degradation of image quality is only caused by the compression itself. When the threshold is another value, the recovered image and the cover images can be recovered with satisfactory image quality. The experimental results and analyses show the effectiveness and advantages of our scheme.
format article
author Shudong Wang
Yuliang Lu
Xuehu Yan
Longlong Li
Yongqiang Yu
author_facet Shudong Wang
Yuliang Lu
Xuehu Yan
Longlong Li
Yongqiang Yu
author_sort Shudong Wang
title AMBTC-based visual secret sharing with different meaningful shadows
title_short AMBTC-based visual secret sharing with different meaningful shadows
title_full AMBTC-based visual secret sharing with different meaningful shadows
title_fullStr AMBTC-based visual secret sharing with different meaningful shadows
title_full_unstemmed AMBTC-based visual secret sharing with different meaningful shadows
title_sort ambtc-based visual secret sharing with different meaningful shadows
publisher AIMS Press
publishDate 2021
url https://doaj.org/article/0d4bc55516304c22a7a25c47a7e3ae06
work_keys_str_mv AT shudongwang ambtcbasedvisualsecretsharingwithdifferentmeaningfulshadows
AT yulianglu ambtcbasedvisualsecretsharingwithdifferentmeaningfulshadows
AT xuehuyan ambtcbasedvisualsecretsharingwithdifferentmeaningfulshadows
AT longlongli ambtcbasedvisualsecretsharingwithdifferentmeaningfulshadows
AT yongqiangyu ambtcbasedvisualsecretsharingwithdifferentmeaningfulshadows
_version_ 1718441359453454336