Sharing secret images using keyed information hiding technique

Chiang-Lung Liu, Kai-Ping Wang, Der-Chyuan Lou

Research output: Contribution to journalJournal Article peer-review

Abstract

Sharing secret through the Internet is very popular nowadays. Traditional meaningless sharing images may attract attackers' attentions. If an attacker can collect enough shares, he/she can overlap the intercepted images and reveal the secret. In this paper, we propose a new secret image sharing method to improve this situation. The secret image is first transformed into two meaningful sharing images depending on a cover image and a predefined secret codebook. The secret image can be reconstructed by using the secret codebook. Experimental results show that two meaningful sharing images can be effectively created using the proposed sharing images creation process and the original secret image can be reconstructed according to the proposed secret image reconstruction process.
Original languageAmerican English
Pages (from-to)11-19
JournalChung Cheng Ling Hsueh Pao/Journal of Chung Cheng Institute of Technology
Volume41
Issue number2
StatePublished - 2012

Keywords

  • Codebooks
  • Creation process
  • Image reconstruction
  • Information hiding
  • Reconstruction process
  • Secret code-book
  • Secret image sharing
  • Secret images
  • Secret sharing

Fingerprint

Dive into the research topics of 'Sharing secret images using keyed information hiding technique'. Together they form a unique fingerprint.

Cite this