Abstract
We have presented a new (k, n) threshold secret image sharing technique in this paper. The secret image is first encoded under the proposed structure that uses the extended LBP (ELBP) technique. The shares are then created from the encoded data. At the end, ELBP based data hiding (or steganography) strategy has been used to incorporate the shares in the image covers. This scheme ensures that no information will be leaked during the share generation/share transmission, and stego images have good quality.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Das, S.K., Dhara, B.C.: An image encryption technique using sine curve. In: 2017 Ninth International Conference on Advances in Pattern Recognition (ICAPR), IEEE, pp. 1–6 (2017)
Das, S.K., Dhara, B.C.: A new image encryption method using circle. In: 2017 8th International Conference on Computing, Communication and Networking Technologies (ICCCNT), IEEE, pp. 1–6 (2017)
Luo, H., Ge, B.: Image encryption based on henon chaotic system with nonlinear term. Multimedia Tools Appl. 1–30 (2019)
Das, S.K., Dhara, B.C.: An lsb based novel data hiding method using extended lbp. Multimedia Tools Appl. 77(12), 15321–15351 (2018)
Das, S.K., Dhara, B.C.: A new data hiding method using block pixel intensity range. In: Advanced Computational and Communication Paradigms, pp. 117–124. Springer (2018)
Ranjani, J.J.: Data hiding using pseudo magic squares for embedding high payload in digital images. Multimedia Tools Appl. 76(3), 3715–3729 (2017)
Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)
Blakley, G.R.: Safeguarding cryptographic keys. In: Managing Requirements Knowledge, International Workshop on, IEEE Computer Society, pp. 313–313 (1979)
Naor, M., Shamir, A.: Visual cryptography. In: Advances in Cryptology–EUROCRYPT’94, pp. 1–12, Springer (1995)
Patil, A.Y., Alexander, J.J., Satpute, S.B., Katti, J., Sali, T.: Security of grayscale images by vss with novel method of bit-plane slicing. In: 2016 Conference on Emerging Devices and Smart Systems (ICEDSS), IEEE, pp. 53–57 (2016)
Sharma, P.K., Singh, H.M.: Visual cryptography scheme for gray scale images based on intensity division. Int. J. Curr. Eng. Technol. 4(1), 211–215 (2014)
Prashanth, S., Sathyanarayana, S.: Visual cryptography for color images with meaningful shares using image fusion technique. In: Proceedings of International Conference on VLSI, Communication, Advanced Devices, Signals and Systems and Networking (VCASAN-2013), Springer, pp. 293–300 (2013)
Yang, C.N., Sun, L.Z., Cai, S.R.: Extended color visual cryptography for black and white secret image. Theor. Comput. Sci. 609, 143–161 (2016)
Thien, C.C., Lin, J.C.: Secret image sharing. Comput. Graphics 26(5), 765–770 (2002)
Wu, K.S.: A secret image sharing scheme for light images. EURASIP J. Adv. Signal Process. 2013(1), 1–5 (2013)
Chien, M.C., Hwang, J.I.G.: Secret image sharing using (t, n) threshold scheme with lossless recovery. In: Image and Signal Processing (CISP), 2012 5th International Congress on, IEEE, pp. 1325–1329 (2012)
Guo, C., Yuan, Q., Lu, K., Li, M., Fu, Z.: (t, n) threshold secret image sharing scheme with adversary structure. Multimedia Tools Appl. 76(20), 21193–21210 (2017)
Kanso, A., Ghebleh, M.: An efficient (t, n)-threshold secret image sharing scheme. Multimedia Tools Appl. 76(15), 16369–16388 (2017)
Li, P., Yang, C.N., Wu, C.C., Kong, Q., Ma, Y.: Essential secret image sharing scheme with different importance of shadows. J. Vis. Commun. Image Representation 24(7), 1106–1114 (2013)
Liu, L., Lu, Y., Yan, X., Ding, W., Xuan, Q.: A lossless polynomial-based secret image sharing scheme utilizing the filtering operation. In: International Conference on Security with Intelligent Computing and Big-data Services, Springer, pp. 129–139(2018)
Ding, W., Liu, K., Yan, X., Wang, H., Liu, L., Gong, Q.: An image secret sharing method based on matrix theory. Symmetry 10(10), 530 (2018)
Wang, R.Z., Su, C.H.: Secret image sharing with smaller shadow images. Pattern Recogn. Lett. 27(6), 551–555 (2006)
Chang, C.C., Sun, C.Y.: Polynomial-based secret sharing scheme based on the absolute moment block truncation coding technique. In: Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2014 Tenth International Conference on, IEEE, pp. 485–488 (2014)
Ou, D., Sun, W.: Reversible ambtc-based secret sharing scheme with abilities of two decryptions. J. Vis. Commun. Image Represen. 25(5), 1222–1239 (2014)
Liu, L., Wang, A., Chang, C.C., Li, Z.: A novel real-time and progressive secret image sharing with flexible shadows based on compressive sensing. Signal Process. Image Commun. 29(1), 128–134 (2014)
Nag, A., Biswas, S., Sarkar, D., Sarka, P.P.: Secret image sharing scheme based on a boolean operation. Cybern. Inf. Technol. 14(2), 98–113 (2014)
Ou, D., Ye, L., Sun, W.: User-friendly secret image sharing scheme with verification ability based on block truncation coding and error diffusion. J. Vis. Commun. Image Represen. 29, 46–60 (2015)
Chan, C.K., Cheng, L.M.: Hiding data in images by simple lsb substitution. Pattern Recogn. 37(3), 469–474 (2004)
Das, S.K., Dhara, B.C.: An image secret sharing method based on block based image coding. In: Comunication Systems and Network Technologies, 2015. CSNT’15 International Conference on, IEEE, pp. 648–652 (2015)
Das, S.K., Dhara, B.C.: A new secret image sharing with arithmetic coding. In, : IEEE International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN). IEEE vol. 2015, pp. 395–399 (2015)
Wang, R.Z., Lin, C.F., Lin, J.C.: Image hiding by optimal lsb substitution and genetic algorithm. Pattern Recogn. 34(3), 671–683 (2001)
Kalita, M., Tuithung, T., Majumder, S.: An adaptive color image steganography method using adjacent pixel value differencing and lsb substitution technique. Cryptologia 43(5), 414–437 (2019)
Nurdiyanto, H., Rahim, R.: Enhanced pixel value differencing steganography with government standard algorithm. In: 2017 3rd International Conference on Science in Information Technology (ICSITech), IEEE, pp. 366–371 (2017)
Swain, G.: Adaptive pixel value differencing steganography using both vertical and horizontal edges. Multimedia Tools Appl. 75(21), 13541–13556 (2016)
Wu, D.C., Tsai, W.H.: A steganographic method for images by pixel-value differencing. Pattern Recogn. Lett. 24(9), 1613–1626 (2003)
Das, S.K., Dhara, B.C.: Arithmetic coding based secret image sharing with inverted pattern lsb substitution for share hiding to achieve better quality stego images. Int. J. Comput. Appl. 38(2–3), 134–143 (2016)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Kumar Das, S., Chandra Dhara, B. (2021). Extended LBP Based Secret Image Sharing with Steganography. In: Senjyu, T., Mahalle, P.N., Perumal, T., Joshi, A. (eds) Information and Communication Technology for Intelligent Systems. ICTIS 2020. Smart Innovation, Systems and Technologies, vol 195. Springer, Singapore. https://doi.org/10.1007/978-981-15-7078-0_12
Download citation
DOI: https://doi.org/10.1007/978-981-15-7078-0_12
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-7077-3
Online ISBN: 978-981-15-7078-0
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)