Image inpainting-based behavior image secret sharing

作者: Xuehu Yan , , Xuan Zhou , Yuliang Lu , Jingju Liu

DOI: 10.3934/MBE.2020166

关键词:

摘要: The polynomial-based image secret sharing (ISS) scheme encodes a into n shadows assigned to participants. with high resolution is decoded by Lagrange interpolation when collecting any k or more shadows. Thus, ISS used in applications such as distributive storage the cloud, digital watermarking, block chain, and access control. Meaningful are significant because meaningful decrease suspicion of encryption increase efficiency shadow management. Generally, previously schemes were achieved through embedding cover images using information hiding techniques suffer from large pixel expansion complex decoding procedure. Digital processing, inpainting (texture synthesis), standard technique multimedia applications. It will be highly if can performed processing normal technique. encoding method an entails use mathematical function that sensitive slight change output; therefore, development for performing procedure simultaneously achieving behavior key challenge. In this paper, we exploit (BISS) realize inpainting-based BISS (k, n) threshold. Using screening operations, encoded pixels obtain similar input images. addition, losslessly Experiments given confirm scheme.

参考文章(24)
Jonathan Weir, WeiQi Yan, A comprehensive study of visual cryptography Transactions on data hiding and multimedia security V. ,vol. 5, pp. 70- 105 ,(2010) , 10.1007/978-3-642-14298-7_5
Xuehu Yan, Xin Liu, Ching-Nung Yang, An enhanced threshold visual secret sharing based on random grids Journal of Real-time Image Processing. ,vol. 14, pp. 61- 73 ,(2018) , 10.1007/S11554-015-0540-4
Ching-Nung Yang, Chuei-Bang Ciou, Image secret sharing method with two-decoding-options: Lossless recovery and previewing capability Image and Vision Computing. ,vol. 28, pp. 1600- 1610 ,(2010) , 10.1016/J.IMAVIS.2010.04.003
Zhi Zhou, G.R. Arce, G. Di Crescenzo, Halftone visual cryptography IEEE Transactions on Image Processing. ,vol. 15, pp. 2441- 2453 ,(2006) , 10.1109/TIP.2006.875249
Xuehu Yan, Shen Wang, Xiamu Niu, Ching-Nung Yang, Halftone visual cryptography with minimum auxiliary black pixels and uniform image quality Digital Signal Processing. ,vol. 38, pp. 53- 65 ,(2015) , 10.1016/J.DSP.2014.12.002
Peng Li, Pei-Jun Ma, Xiao-Hong Su, Ching-Nung Yang, Improvements of a two-in-one image secret sharing scheme based on gray mixing model Journal of Visual Communication and Image Representation. ,vol. 23, pp. 441- 453 ,(2012) , 10.1016/J.JVCIR.2012.01.003
A. Criminisi, P. Perez, K. Toyama, Region filling and object removal by exemplar-based image inpainting IEEE Transactions on Image Processing. ,vol. 13, pp. 1200- 1212 ,(2004) , 10.1109/TIP.2004.833105
Z. Wang, A.C. Bovik, H.R. Sheikh, E.P. Simoncelli, Image quality assessment: from error visibility to structural similarity IEEE Transactions on Image Processing. ,vol. 13, pp. 600- 612 ,(2004) , 10.1109/TIP.2003.819861
Feng Liu, Chuankun Wu, Embedded Extended Visual Cryptography Schemes IEEE Transactions on Information Forensics and Security. ,vol. 6, pp. 307- 322 ,(2011) , 10.1109/TIFS.2011.2116782
Zhongmin Wang, G.R. Arce, G. Di Crescenzo, Halftone Visual Cryptography Via Error Diffusion IEEE Transactions on Information Forensics and Security. ,vol. 4, pp. 383- 396 ,(2009) , 10.1109/TIFS.2009.2024721