首页 | 本学科首页   官方微博 | 高级检索  
     


Sharing and hiding secret images with size constraint
Authors:Yu-Shan Wu [Author Vitae]Author Vitae]  Ja-Chen Lin [Author Vitae]
Affiliation:Department of Computer and Information Science, National Chiao Tung University, 1001, Ta Hsueh Road, Hsinchu 300, Taiwan, ROC
Abstract:This paper presents a method for sharing and hiding secret images. The method is modified from the (t,n) threshold scheme. (Comput.Graph. 26(5)(2002)765) The given secret image is shared and n shadow images are thus generated. Each shadow image is hidden in an ordinary image so as not to attract an attacker's attention. Any t of the n hidden shadows can be used to recover the secret image. The size of each stego image (in which a shadow image is hidden) is about 1/t of that of the secret image, avoiding the need for much storage space and transmission time (in the sense that the total size of t stego images is about the size of the secret image). Experimental results indicate that the qualities of both the recovered secret image and the stego images that contain the hidden shadows are acceptable. The photographers who work in enemy areas can use this system to transmit photographs.
Keywords:Sharing secret images  Quantization  Image hiding  Shadow  Size limitation
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号