Limits...
Improved Secret Image Sharing Scheme in Embedding Capacity without Underflow and Overflow.

Pang L, Miao D, Li H, Wang Q - ScientificWorldJournal (2015)

Bottom Line: Although the underflow and overflow situations have been well dealt with by different methods, the embedding capacities of these methods are reduced more or less.Motivated by these concerns, we propose a novel scheme, in which we take the differential coding, Huffman coding, and data converting to compress the secret image before embedding it to further improve the embedding capacity, and the pixel mapping matrix embedding method with a newly designed matrix is used to embed secret image data into the cover image to avoid the underflow and overflow situations.Experiment results show that our scheme can improve the embedding capacity further and eliminate the underflow and overflow situations at the same time.

View Article: PubMed Central - PubMed

Affiliation: School of Life Science and Technology, Xidian University, Xi'an 710071, China ; Department of Computer Science, Wayne State University, Detroit, MI 48202, USA.

ABSTRACT
Computational secret image sharing (CSIS) is an effective way to protect a secret image during its transmission and storage, and thus it has attracted lots of attentions since its appearance. Nowadays, it has become a hot topic for researchers to improve the embedding capacity and eliminate the underflow and overflow situations, which is embarrassing and difficult to deal with. The scheme, which has the highest embedding capacity among the existing schemes, has the underflow and overflow problems. Although the underflow and overflow situations have been well dealt with by different methods, the embedding capacities of these methods are reduced more or less. Motivated by these concerns, we propose a novel scheme, in which we take the differential coding, Huffman coding, and data converting to compress the secret image before embedding it to further improve the embedding capacity, and the pixel mapping matrix embedding method with a newly designed matrix is used to embed secret image data into the cover image to avoid the underflow and overflow situations. Experiment results show that our scheme can improve the embedding capacity further and eliminate the underflow and overflow situations at the same time.

No MeSH data available.


Related in: MedlinePlus

Recovered images.
© Copyright Policy - open-access
Related In: Results  -  Collection


getmorefigures.php?uid=PMC4553325&req=5

fig11: Recovered images.

Mentions: From Figure 10, it is difficult for people to distinguish the cover image from stego images by eyes. Thus, the proposed scheme can cover up stego images from poachers. It means that the secret image could be effectively embedded into the cover image without easily attracting the attacker's attention. Figure 11 shows the recovered secret and the recovered cover image when using any three of four stego images in Figure 10, which are shown in Figures 11(a) and 11(b), respectively. It can be seen that the secret image and the cover image are loss-less revealed.


Improved Secret Image Sharing Scheme in Embedding Capacity without Underflow and Overflow.

Pang L, Miao D, Li H, Wang Q - ScientificWorldJournal (2015)

Recovered images.
© Copyright Policy - open-access
Related In: Results  -  Collection

Show All Figures
getmorefigures.php?uid=PMC4553325&req=5

fig11: Recovered images.
Mentions: From Figure 10, it is difficult for people to distinguish the cover image from stego images by eyes. Thus, the proposed scheme can cover up stego images from poachers. It means that the secret image could be effectively embedded into the cover image without easily attracting the attacker's attention. Figure 11 shows the recovered secret and the recovered cover image when using any three of four stego images in Figure 10, which are shown in Figures 11(a) and 11(b), respectively. It can be seen that the secret image and the cover image are loss-less revealed.

Bottom Line: Although the underflow and overflow situations have been well dealt with by different methods, the embedding capacities of these methods are reduced more or less.Motivated by these concerns, we propose a novel scheme, in which we take the differential coding, Huffman coding, and data converting to compress the secret image before embedding it to further improve the embedding capacity, and the pixel mapping matrix embedding method with a newly designed matrix is used to embed secret image data into the cover image to avoid the underflow and overflow situations.Experiment results show that our scheme can improve the embedding capacity further and eliminate the underflow and overflow situations at the same time.

View Article: PubMed Central - PubMed

Affiliation: School of Life Science and Technology, Xidian University, Xi'an 710071, China ; Department of Computer Science, Wayne State University, Detroit, MI 48202, USA.

ABSTRACT
Computational secret image sharing (CSIS) is an effective way to protect a secret image during its transmission and storage, and thus it has attracted lots of attentions since its appearance. Nowadays, it has become a hot topic for researchers to improve the embedding capacity and eliminate the underflow and overflow situations, which is embarrassing and difficult to deal with. The scheme, which has the highest embedding capacity among the existing schemes, has the underflow and overflow problems. Although the underflow and overflow situations have been well dealt with by different methods, the embedding capacities of these methods are reduced more or less. Motivated by these concerns, we propose a novel scheme, in which we take the differential coding, Huffman coding, and data converting to compress the secret image before embedding it to further improve the embedding capacity, and the pixel mapping matrix embedding method with a newly designed matrix is used to embed secret image data into the cover image to avoid the underflow and overflow situations. Experiment results show that our scheme can improve the embedding capacity further and eliminate the underflow and overflow situations at the same time.

No MeSH data available.


Related in: MedlinePlus