Skip to main content

A Scalable Secret Image Sharing Method Based on Discrete Wavelet Transform

  • Conference paper
Bio-Inspired Computational Intelligence and Applications (LSMS 2007)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 4688))

Included in the following conference series:

Abstract

This paper presents a scalable secure scheme for sharing and hiding secret image. The given secret image is firstly divided into numerous non-overlapping blocks, and then transformed each block into wavelet frequency by one-level discrete wavelet transform. Second, quantization the wavelet coefficients into 256 gray level. Third, a bit-plane scanning method rearranges the gray value information of the quantized image. Four, share the rearranged image into n shadows by using multiple thresholds. Five, conceal each shadow image in R, G and B channels of the cover image, which doesn’t attract Attracters’ attention. Six, the more shadows the better quality of the retrieved secret image. The experimental results show that the retrieved secret image presents higher visual quality and the stego-images present better invisibility than traditional methods.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Blakley, G.R.: Safeguarding cryptographic keys. In: Proceedings AFIPS 1979. National Computer Conference, New York, USA, vol. 48, pp. 313–317 (June 1979)

    Google Scholar 

  2. Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)

    Article  MATH  MathSciNet  Google Scholar 

  3. Thien, C.C., Lin, J.C.: Secret image sharing. Computer, Graphics 26, 765–770 (2002)

    Article  Google Scholar 

  4. Wu, Y.S., Thien, C.C., Lin, J.C.: Sharing and hiding secret images with size constraint. Pattern Recognition 37(7), 1377–1385 (2004)

    Article  Google Scholar 

  5. Chen, S.K., Lin, J.C.: Fault-tolerant and progressive transmission of images. Pattern Recognition 38, 2466–2471 (2005)

    Article  MathSciNet  Google Scholar 

  6. Wu, D.C., Tsai, W.H.: Spatial-domain image hiding using image differencing. IEE Proceedings: Vision, Image & Signal Processing 147(1), 29–37 (2000)

    Article  Google Scholar 

  7. Chang, C.C., Lin, M.H., Hu, Y.C.: A fast and secure image hiding scheme based on LSB substitution. Int. J. Pattern Recognition Artif. Intel. 16(4), 399–416 (2002)

    Article  Google Scholar 

  8. Wang, R.-Z., Lin, C.-F., Lin, J.-C.: Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recognition 34(3), 671–683 (2001)

    Article  MATH  MathSciNet  Google Scholar 

  9. Wang, R.-Z., Lin, C.-F., Lin, J.-C.: Hiding data in images by optimal moderately significant-bit replacement. IEEElectron. Lett. 36(25), 2069–2070 (2000)

    Article  Google Scholar 

  10. Thien, C.C., Lin, J.C.: A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function. Pattern Recognition 36, 2876–2881 (2003)

    Article  Google Scholar 

  11. Chang, C.C., Chiang, C.L., Hsiao, J.Y.: A DCT-domain System for Hiding Fractal Compressed Images. In: Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 1550-455X/05(C), IEEE, Los Alamitos (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Kang Li Minrui Fei George William Irwin Shiwei Ma

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kong, J., Zhang, Y., Meng, X., Zheng, Y., Lu, Y. (2007). A Scalable Secret Image Sharing Method Based on Discrete Wavelet Transform. In: Li, K., Fei, M., Irwin, G.W., Ma, S. (eds) Bio-Inspired Computational Intelligence and Applications. LSMS 2007. Lecture Notes in Computer Science, vol 4688. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74769-7_78

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-74769-7_78

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-74768-0

  • Online ISBN: 978-3-540-74769-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics