Selective scalable secret image sharing with adaptive pixel-embedding technique Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp. 27107-27121, Oct. 2018. Authors: Jung-San Lee, Ying-Chin Chen, Hong-Chi Su Speaker:Yun-Hao Hsieh Date:2018/7/11
Outline Introduction Preliminaries Proposed mechanism Experimental results and analysis Conclusions
Introduction(1/2) – (t, n) threshold (3, 5) (4, 5)
Introduction(2/2) – Secret image sharing Cover image Result of shadows 3 shadows (3, 5) 4 shadows 5 shadows
Preliminaries(1/5) – Scalable secret image sharing Cover image Result of shadows (3, 5) 3 shadows 4 shadows (3, 5) (4, 5) (5, 5) 5 shadows
Preliminaries(2/5) – Selective scalable secret image sharing Cover image Result of shadows (3, 5) 3 shadows 4 shadows (3, 5) (4, 5) (5, 5) 5 shadows
Preliminaries(3/5) – Meaningful shadow Secret image Cover image good PSNR good SSIM
Preliminaries(4/5) – No pixel expansion Cover image Secret image Preserve system performance
Preliminaries(5/5) – Verification Cover image Result of shadows 3 shadows LSB Integrity 4 shadows 5 shadows
Proposed mechanism(1/5) - Sharing (3, 5) 1000 Pixel 600 Pixel 200 Pixel
Proposed mechanism(2/5) - Sharing (3, 5) (4, 5) (5, 5) 290 Pixel 600 Pixel 200 Pixel 200 Pixel (10,15,20) (1, 45) (2, 120) (3, 235) (5, 83) (4, 139)
Proposed mechanism(3/5) - Embedding 290 Pixel 2500 Pixel
Proposed mechanism(4/5) – Decrypting and verification (3, 5) 290 Pixel 2500 Pixel
Proposed mechanism(5/5) – Decrypting and verification (3, 5) 3 shadows 4 shadows (1, 45) (2, 120) (3, 235) 5 shadows
Experimental results and analysis(1/3) (3, 5) [7] Lee JS, Chen YR (2017) Selective scalable secret image sharing with verification. Multimedia Tools Application 76(1):1–11 [15] Yang CN, Chu YY (2011) A general (k, n) scalable secret image sharing scheme with the smooth scalability. J Systems and Software 84(10):1726–1733 [16] Yang CN, Huang SM (2010) Constructions and properties of k out of n scalable secret image sharing. Optics Communications 283(9):1750–1762
Experimental results and analysis(2/3) PSNR SSIM [7] Lee JS, Chen YR (2017) Selective scalable secret image sharing with verification. Multimedia Tools Application 76(1):1–11 [9] Lin CC, Tsai WH (2004) Secret image sharing with steganography and authentication. J Systems and Software 73(3): 405–414 [17] Yang CN, Chen TS, Yu KH, Wang CC (2007) Improvements of image sharing with steganography and authentication. J Systems and Software 80(7):1070–1076
Experimental results and analysis(3/3)
Conclusions Smooth scalability Selectivity Higher PSNR and SSIM
Thanks For listing