AMBTC-based visual secret sharing with different meaningful shadows
Secret sharing based on Absolute Moment Block Truncation Coding (AMBTC) has been widely studied. However, the management of stego images is inconvenient as they seem indistinguishable. Moreover, there exists a problem of pixel expansion, which requires more storage space and higher transmission band...
Guardado en:
Autores principales: | , , , , |
---|---|
Formato: | article |
Lenguaje: | EN |
Publicado: |
AIMS Press
2021
|
Materias: | |
Acceso en línea: | https://doaj.org/article/0d4bc55516304c22a7a25c47a7e3ae06 |
Etiquetas: |
Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
|
id |
oai:doaj.org-article:0d4bc55516304c22a7a25c47a7e3ae06 |
---|---|
record_format |
dspace |
spelling |
oai:doaj.org-article:0d4bc55516304c22a7a25c47a7e3ae062021-11-09T01:59:03ZAMBTC-based visual secret sharing with different meaningful shadows10.3934/mbe.20212661551-0018https://doaj.org/article/0d4bc55516304c22a7a25c47a7e3ae062021-06-01T00:00:00Zhttps://www.aimspress.com/article/doi/10.3934/mbe.2021266?viewType=HTMLhttps://doaj.org/toc/1551-0018Secret sharing based on Absolute Moment Block Truncation Coding (AMBTC) has been widely studied. However, the management of stego images is inconvenient as they seem indistinguishable. Moreover, there exists a problem of pixel expansion, which requires more storage space and higher transmission bandwidth. To conveniently manage the stego images, we use multiple cover images to make the stego images seem to be visually different from with each other. Futhermore, the stego images are different, which will not cause the attacker's suspicion and increase the security of the scheme. And traditional Visual Secret Sharing (VSS) is fused to eliminate pixel expansion. After images are compressed by AMBTC algorithm, the quantization levels and the bitmap corresponding to each block are obtained. At the same time, when the threshold is (k,k), bitmaps can be recovered losslessly, and the slight degradation of image quality is only caused by the compression itself. When the threshold is another value, the recovered image and the cover images can be recovered with satisfactory image quality. The experimental results and analyses show the effectiveness and advantages of our scheme.Shudong WangYuliang Lu Xuehu YanLonglong Li Yongqiang Yu AIMS Pressarticleabsolute moment block truncation codingvisual secret sharingimage compressionno pixel expansionmeaningful shadowsBiotechnologyTP248.13-248.65MathematicsQA1-939ENMathematical Biosciences and Engineering, Vol 18, Iss 5, Pp 5236-5251 (2021) |
institution |
DOAJ |
collection |
DOAJ |
language |
EN |
topic |
absolute moment block truncation coding visual secret sharing image compression no pixel expansion meaningful shadows Biotechnology TP248.13-248.65 Mathematics QA1-939 |
spellingShingle |
absolute moment block truncation coding visual secret sharing image compression no pixel expansion meaningful shadows Biotechnology TP248.13-248.65 Mathematics QA1-939 Shudong Wang Yuliang Lu Xuehu Yan Longlong Li Yongqiang Yu AMBTC-based visual secret sharing with different meaningful shadows |
description |
Secret sharing based on Absolute Moment Block Truncation Coding (AMBTC) has been widely studied. However, the management of stego images is inconvenient as they seem indistinguishable. Moreover, there exists a problem of pixel expansion, which requires more storage space and higher transmission bandwidth. To conveniently manage the stego images, we use multiple cover images to make the stego images seem to be visually different from with each other. Futhermore, the stego images are different, which will not cause the attacker's suspicion and increase the security of the scheme. And traditional Visual Secret Sharing (VSS) is fused to eliminate pixel expansion. After images are compressed by AMBTC algorithm, the quantization levels and the bitmap corresponding to each block are obtained. At the same time, when the threshold is (k,k), bitmaps can be recovered losslessly, and the slight degradation of image quality is only caused by the compression itself. When the threshold is another value, the recovered image and the cover images can be recovered with satisfactory image quality. The experimental results and analyses show the effectiveness and advantages of our scheme. |
format |
article |
author |
Shudong Wang Yuliang Lu Xuehu Yan Longlong Li Yongqiang Yu |
author_facet |
Shudong Wang Yuliang Lu Xuehu Yan Longlong Li Yongqiang Yu |
author_sort |
Shudong Wang |
title |
AMBTC-based visual secret sharing with different meaningful shadows |
title_short |
AMBTC-based visual secret sharing with different meaningful shadows |
title_full |
AMBTC-based visual secret sharing with different meaningful shadows |
title_fullStr |
AMBTC-based visual secret sharing with different meaningful shadows |
title_full_unstemmed |
AMBTC-based visual secret sharing with different meaningful shadows |
title_sort |
ambtc-based visual secret sharing with different meaningful shadows |
publisher |
AIMS Press |
publishDate |
2021 |
url |
https://doaj.org/article/0d4bc55516304c22a7a25c47a7e3ae06 |
work_keys_str_mv |
AT shudongwang ambtcbasedvisualsecretsharingwithdifferentmeaningfulshadows AT yulianglu ambtcbasedvisualsecretsharingwithdifferentmeaningfulshadows AT xuehuyan ambtcbasedvisualsecretsharingwithdifferentmeaningfulshadows AT longlongli ambtcbasedvisualsecretsharingwithdifferentmeaningfulshadows AT yongqiangyu ambtcbasedvisualsecretsharingwithdifferentmeaningfulshadows |
_version_ |
1718441359453454336 |