A Secret Image Sharing Method using Integer Multiwavelet Transform

13
Hindawi Publishing Corporation EURASIP Journal on Advances in Signal Processing Volume 2007, Article ID 63281, 13 pages doi:10.1155/2007/63281 Research Article A Secret Image Sharing Method Using Integer Wavelet Transform Chin-Pan Huang 1 and Ching-Chung Li 2 1 Department of Computer and Communication Engineering, Ming Chuan University, Taoyuan 333, Taiwan 2 Department of Electrical and Computer Engineering, University of Pittsburgh, Pittsburgh, PA 15261, USA Received 28 August 2006; Revised 13 February 2007; Accepted 25 June 2007 Recommended by B¨ ulent Sankur A new image sharing method, based on the reversible integer-to-integer (ITI) wavelet transform and Shamir’s (r , m) threshold scheme is presented, that provides highly compact shadows for real-time progressive transmission. This method, working in the wavelet domain, processes the transform coecients in each subband, divides each of the resulting combination coecients into m shadows, and allows recovery of the complete secret image by using any r or more shadows (r m). We take advantages of properties of the wavelet transform multiresolution representation, such as coecient magnitude decay and excellent energy com- paction, to design combination procedures for the transform coecients and processing sequences in wavelet subbands such that small shadows for real-time progressive transmission are obtained. Experimental results demonstrate that the proposed method yields small shadow images and has the capabilities of real-time progressive transmission and perfect reconstruction of secret im- ages. Copyright © 2007 C.-P. Huang and C.-C. Li. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. 1. INTRODUCTION With the rapid development of computer and communi- cation networks, Internet has been established worldwide that brings numerous applications such as commercial ser- vices, telemedicine, and military document transmissions. Due to the nature of the network, Internet is an open sys- tem; to transmit secret application data securely is an issue of great concern. Security could be introduced in many dier- ent ways, for example, by image hiding and watermarking. However, the common weak point of them is that a secret image is protected in a single information carrier, and once the carrier is damaged or destroyed the secret is lost. If many duplicates are used to overcome this deficiency, the danger of security exposure will also increase [1, 2]. A secret image sharing method provides a viable solution. To process the re- ceived data eciently is another problem. As transmission proceeds, the receiver may gradually access images with in- creased visual quality. If the received data is of no interest, the transmission can be terminated immediately to increase e- cacy. Therefore, the functionality of progressive reconstruc- tion is very essential to be built in the scheme. The goal is to develop an ecient secret image sharing method with pro- gressive transmission capability. Shamir [1] and Blakley [3] first proposed a concept of secret sharing called the (r , m) threshold scheme. In their scheme, a secret is shared by m shadows and any r shadows, where r m can be used to reveal the secret while with less than r shadows the information about the secret cannot be obtained. Thien and Lin [2] developed a secret image sharing method based on Shamir’s (r , m) threshold scheme. Their method permutes a secret image first to decorrelate pixels and then incorporates the (r , m) threshold scheme to pro- cess the image pixel wise or pattern wise in the spatial do- main sequentially; hence, it may not be suitable for real-time progressive transmission. Each generated shadow is 1/r the size of the original image for their lossy scheme and is over 1/r for their lossless version [2]. Recently, Chen and Lin [4] developed a method of progressive image transmission for the secret image sharing [2]. Their method considers the di- vision of an image into nonoverlapped sectors and applies a bit-plane scanning to rearrange the gray value information of each sector with several thresholds in controlling the recon- struction quality level to achieve the capability of progressive transmission. It tends to yield large shadow images due to its requirement of satisfactory functioning for every cho- sen threshold, thus reducing the eciency of storage and

Transcript of A Secret Image Sharing Method using Integer Multiwavelet Transform

Hindawi Publishing CorporationEURASIP Journal on Advances in Signal ProcessingVolume 2007, Article ID 63281, 13 pagesdoi:10.1155/2007/63281

Research ArticleA Secret Image Sharing Method Using IntegerWavelet Transform

Chin-Pan Huang1 and Ching-Chung Li2

1 Department of Computer and Communication Engineering, Ming Chuan University, Taoyuan 333, Taiwan2 Department of Electrical and Computer Engineering, University of Pittsburgh, Pittsburgh, PA 15261, USA

Received 28 August 2006; Revised 13 February 2007; Accepted 25 June 2007

Recommended by Bulent Sankur

A new image sharing method, based on the reversible integer-to-integer (ITI) wavelet transform and Shamir’s (r,m) thresholdscheme is presented, that provides highly compact shadows for real-time progressive transmission. This method, working in thewavelet domain, processes the transform coefficients in each subband, divides each of the resulting combination coefficients intom shadows, and allows recovery of the complete secret image by using any r or more shadows (r ≤ m). We take advantages ofproperties of the wavelet transform multiresolution representation, such as coefficient magnitude decay and excellent energy com-paction, to design combination procedures for the transform coefficients and processing sequences in wavelet subbands such thatsmall shadows for real-time progressive transmission are obtained. Experimental results demonstrate that the proposed methodyields small shadow images and has the capabilities of real-time progressive transmission and perfect reconstruction of secret im-ages.

Copyright © 2007 C.-P. Huang and C.-C. Li. This is an open access article distributed under the Creative Commons AttributionLicense, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properlycited.

1. INTRODUCTION

With the rapid development of computer and communi-cation networks, Internet has been established worldwidethat brings numerous applications such as commercial ser-vices, telemedicine, and military document transmissions.Due to the nature of the network, Internet is an open sys-tem; to transmit secret application data securely is an issue ofgreat concern. Security could be introduced in many differ-ent ways, for example, by image hiding and watermarking.However, the common weak point of them is that a secretimage is protected in a single information carrier, and oncethe carrier is damaged or destroyed the secret is lost. If manyduplicates are used to overcome this deficiency, the dangerof security exposure will also increase [1, 2]. A secret imagesharing method provides a viable solution. To process the re-ceived data efficiently is another problem. As transmissionproceeds, the receiver may gradually access images with in-creased visual quality. If the received data is of no interest, thetransmission can be terminated immediately to increase effi-cacy. Therefore, the functionality of progressive reconstruc-tion is very essential to be built in the scheme. The goal is todevelop an efficient secret image sharing method with pro-gressive transmission capability.

Shamir [1] and Blakley [3] first proposed a concept ofsecret sharing called the (r,m) threshold scheme. In theirscheme, a secret is shared by m shadows and any r shadows,where r ≤ m can be used to reveal the secret while with lessthan r shadows the information about the secret cannot beobtained. Thien and Lin [2] developed a secret image sharingmethod based on Shamir’s (r,m) threshold scheme. Theirmethod permutes a secret image first to decorrelate pixelsand then incorporates the (r,m) threshold scheme to pro-cess the image pixel wise or pattern wise in the spatial do-main sequentially; hence, it may not be suitable for real-timeprogressive transmission. Each generated shadow is 1/r thesize of the original image for their lossy scheme and is over1/r for their lossless version [2]. Recently, Chen and Lin [4]developed a method of progressive image transmission forthe secret image sharing [2]. Their method considers the di-vision of an image into nonoverlapped sectors and applies abit-plane scanning to rearrange the gray value information ofeach sector with several thresholds in controlling the recon-struction quality level to achieve the capability of progressivetransmission. It tends to yield large shadow images due toits requirement of satisfactory functioning for every cho-sen threshold, thus reducing the efficiency of storage and

2 EURASIP Journal on Advances in Signal Processing

transmission. Since it works on a sector basis, the progressionis localized to each sector; and it suffers from the blocking ef-fects when images at low bit rate are recovered. Wang and Su[5] developed a secret image sharing method based on theGalois field. It has the advantage of producing small shadowimages but does not have the progressive transmission capa-bility. In comparison to these existing methods, the proposedmethod, working in the wavelet domain, has the advantage ofboth having small shadow images and progressive transmis-sion capability at the same time. This is achieved by usingthe reversible integer-to-integer (ITI) wavelet transform andShamir’s (r,m) threshold scheme.

An integer-to-integer reversible wavelet transform mapsan integer-valued image to integer-valued transform coef-ficients and provides the exact (lossless) reconstruction ofthe original image [6–9]. Its multiresolution representationis the same as usual, but can be fast computed with onlyinteger addition and bit-shift operations. Most of the sig-nal energy is concentrated in the low frequency bands andthe transform coefficients therein are expected to be bettermagnitude-ordered as we move downward in the multires-olution pyramid in the same spatial orientation [6, 7, 10].These properties are very important for the development ofan image sharing method with real time progressive trans-mission. Instead of using permutation to decorrelate pixelsprior to applying the (r,m) threshold scheme as in [2], wefirst apply ITI wavelet transform and then process transformcoefficients in a preprocessing stage to decorrelate pixels (co-efficients) and increase security. The preprocessing stage isperformed on subband basis and the resulting coefficients ineach subband are processed in a zigzag sequence from thesmooth subband to detail subbands. The most important in-formation of the smooth subband will be processed first andthen the detail bands so that the progressive transmissioncan be obtained. In SPIHT [10], the progressive transmis-sion is achieved by checking several times the transform co-efficients. In the proposed method, the progressive transmis-sion is enabled by ordering the importance of the subbandinformation and checking the coefficients only one time tospeed up the processing. The proposed method, based on theITI wavelet transform, provides small shadows, lossless secretimage reconstruction, and more importantly the capabilityof real time progressive transmission. In this method, a se-cret image will be transmitted by m distinct channels (shad-ows), any r shadows received in r channels (where r ≤ m)can be used to reveal the secret image while up to any r − 1channels intercepted by an adversary cannot reveal any se-cret. Also, it can tolerate up to m− r contaminated channelswithout affecting the lossless reconstruction of the secret im-age from the other r channels. A note should be made herethat this method is significantly different from the multipledescription coding (MDC) [11, 12]. Although both meth-ods generate multiple subimages and utilize the informationtherein for image transmission over networks, our methodaddresses the issue of security protection of confidential im-ages for transmission, while MDC does not consider the se-curity question but emphasizes on multiple representationsof an image for use in noisy channel transmission allowing

image reconstruction to continue even a packet is lost orseverely contaminated.

The rest of the paper is organized as follows. The (r,m)threshold scheme is reviewed in Section 2. The proposedimage sharing algorithm is described in Section 3. The ex-perimental results are shown in Section 4. Security analy-sis is given in Section 5. Applications of the method are de-scribed in Section 6. Finally, the conclusions are summarizedin Section 7.

2. PREVIOUS WORKS

According to Shamir’s (r,m) threshold scheme [1], the se-cret D is divided into m shadows (D1,D2, . . . ,Dm) and anyr or more shadows can be used to reconstruct it. To split Dinto m pieces, a prime p, which is bigger than both D and m,is randomly selected and an (r − 1)th degree polynomial ischosen,

q(x) = (a0 + a1x + · · · + ar−1xr−1) mod p, (1)

in (1), a0 = D, and {a1, a2, . . . , ar−1} are random numbersselected from numbers 0 ∼ (p − 1). The pieces are obtainedby evaluating

D1 = q(1), . . . ,Di = q(i), . . . ,Dm = q(m). (2)

Note that Di is a shadow. Given any r pairs from these m pairs{(i,Di); i = 1, 2, . . . ,m}, the coefficients a0, a1, a2, . . . , ar−1

can be solved using Lagrange’s interpolation, and hence thesecret data D can be revealed. In Thien and Lin’s work, theytook a0, a1, a2, . . . , ar−1 as the gray levels of r pixels in a secretimage to generate m shadows.

An ITI reversible wavelet transform [6, 7] with a highcomputation speed and excellent energy compaction mapsan integer-valued image to integer-valued smooth (scaling)coefficients and detail (wavelet) coefficients and provides theexact (lossless) reconstruction. It can be fast computed withonly integer addition and bit-shift operations. The smoothcoefficients have the same range of values as that of the inputimage and the detail coefficients have smaller absolute inte-ger values than those of the input image.

3. THE PROPOSED IMAGE SHARING METHOD

In the proposed method described below, we take a0,a1, a2, . . . , ar−1 as values of r processed transform coefficientsto generate m shadows. A secret image is ITI wavelet trans-formed down to a selected scale level to form its multires-olution hierarchical representation. A preprocessing stagefor wavelet transform coefficients in individual subbands isdeveloped based on the strong intra-band correlation andsmall absolute values of the coefficients in the detail sub-bands. Thus, we expect to have small values of differencesbetween neighboring coefficients in the smooth subband andsmall coefficients in the detail subbands. These are used inthe preprocessing stage in the respective subbands to pro-duce combination coefficients for use in the (r,m) thresholdscheme. The sequence of the preprocessing stage starts from

C.-P. Huang and C.-C. Li 3

X Prepro-cessingstage

Sharing

1

2...

m

RevealPostpro-cessingstage

X

Figure 1: The block diagram of the proposed method.

the smooth subband and follows a zigzag path to the detailsubbands in a hierarchical tree [10] such that the progressivetransmission may be readily achieved. The block diagram ofthe proposed method is shown in Figure 1, where X denotescoefficients of the wavelet multiresolution representation ofan image and X the reconstructed wavelet transform coeffi-cients.

3.1. The preprocessing stage

The wavelet transform coefficients in each subband are ap-propriately combined so as to decorrelate coefficients, priorto applying the (r,m) threshold scheme for enhancing secu-rity. Since the numbers (in images with 8-bit intensity lev-els) suitable for the (r,m) threshold scheme are from 0 to255 [2], we need to take care of this requirement in the co-efficient combination procedure. The combination processis designed by concatenating neighboring transform coeffi-cients (or coefficients differences in the smooth subband)into one byte in case they are small enough or else scalingtheir values into the appropriate range. Then the size of theresulting combination coefficients is reduced and its range isadjusted.

Consider the smooth subband with scaling coefficientsS = {su,v} and coefficient differences DS = {dsu,v}. At loca-tion (u, v), the coefficient difference is defined by

dsu,v =

⎧⎪⎪⎨

⎪⎪⎩

su,v, if u = 0, v = 0,

su,v − s(u−1),v, if u �= 0, v = 0,

su,v − su,(v−1), otherwise.

(3)

A sequence of combination numbers Ccom = {ccom} are gen-erated, referring to differences DS, in the following steps.

(1) Divide the array of differences DS into nonoverlappingblocks, each block contains 2 × 2 neighboring differ-ences.

(2) Process each block from left to right and top to bot-tom.

(3) In each block, the coefficient differences are combinedas follows: (i) if the values of four differences are all notless than −2 and not greater than 1, then these fourdifferences are processed together by adding 2 to eachdifference and concatenating them into a new byteccom. Note that the concatenation is done by bitshiftand bitor operators. (ii) If the values of the successivetwo differences (in either upper row or lower row of ablock) are both not less than −4 and not greater than

Type number

Type bits

Combinationnumber

Differences

30 180

00

216

01

7

11

20

10

30

10

38

11

64

01

22

00

202

0

1

−2

−1

−20

−4

30

3

−3

38

2

−64

−1

1

0

−2

Figure 2: An illustration of the preprocessing stage.

3, then these two differences are processed together byadding 4 to each difference and concatenating theminto a new byte ccom. (iii) If the values of four differ-ences do not satisfy the condition (i) or (ii), then eachcoefficient difference is processed separately to form anew byte ccom by multiplying itself with its sign.

(4) The new byte ccom generated in step (3) is assignedsequentially in a sequence of combination numbersCcom = {ccom}. Note that the value of ccom is between 0and 255.

(5) Use two bits to record the type of a new byte in step (3)as follows: 00 and 01 for concatenation of four and twodifferences, respectively; 10 and 11 for a positive and anegative valued byte, respectively. Every four consec-utive such type bits are concatenated to form a bytecalled tcom. Note that the value of tcom is between 0 and255.

(6) The byte tcom generated in step (5) is recorded sequen-tially in a sequence of type numbers Tcom = {tcom}.

For illustration of the wavelet transform coefficient pre-processing stage, let us consider an array of transform coeffi-cients of size 2 × 8 (or coefficient differences in the case of asmooth subband) as shown in Figure 2. The first block meetsthe condition (i) so that the four differences {1,−1, 0,−2}in the block are each added by 2 to give {3, 1, 2, 0}. Thesefour numbers {3, 1, 2, 0} are processed together by concate-nation using bitshift and bitor operators as follows. The fourdata in their binary representation are bitshift first to give{11000000, 00010000, 00001000, 00000000} and followed bybitor to get ccom = (11011000)2 = 216. Two bits 00 are givenas the type value to record this block. The next block meetsthe condition (ii) for the upper row and condition (iii) forthe lower row. The two differences in the upper row satisfiescondition (ii) so that each of the two differences in the block{−4, 3} is added by 4 to give {0, 7}. Then {0, 7} is processedby concatenation using bitshift and bitor operators. The twodata are bitshift first to get {00000000, 00000111} with bi-nary representation and followed by bitor to get ccom =(00000111)2 = 7. Two bits 01 are given as the type valueto record the upper row of the block. The two differences{−20, 30} in the lower row satisfies condition (iii) so that

4 EURASIP Journal on Advances in Signal Processing

they are processed separately to get 20 and 30. The two bits 11and 10 are given as type values to record these two differencesrespectively in the lower row of the block. The other blocksare processed in the same way. The type number tcom is ob-tained by concatenating every four consecutive 2-bit type bitsas indicated in Figure 2.

The similar combination process is used for coefficientsin detail subbands, referring to wavelet coefficients S. The in-verse combination can be easily done by following the reversesteps in the postprocessing stage.

3.2. The sharing phase

The sequence of type numbers Tcom and the sequence ofcombination numbers Ccom are each divided into nonover-lapping sharing blocks each containing a sequence of r num-ber. For each sharing block b, a (r − 1)th degree polynomialis used as in [2] except here the prime number p = 257,

qb(x) = (a0 + a1x + · · · + ar−1xr−1)mod 257, (4)

where a0, a1, a2, . . . , ar−1 are r numbers of the sharing block.Evaluate

D1 = qb(1), . . . ,Di = qb(i), . . . ,Dm = qb(m). (5)

The m output numbers qb(1), . . . , qb(i), . . . , qb(m) of thissharing block b are placed sequentially in the m shadow co-efficients. In this case, the possible values of the output are0 ≤ qb(i) ≤ 256, i = 1, . . . ,m. The problem is that the valueof a byte coefficient is in the range from 0 to 255 while in out-put numbers there may be 256. If the output values are 255and 256, this problem can be dealt with by storing 255 withan extra bit of 0 or 1 (for output value of 255 or 256, resp.)stored in the following byte. In order to provide for progres-sive transmission and to establish a traceable set of coefficientcombination numbers Ccom, the type numbers Tcom and thebyte for the extra bit are stored as an overhead. Note that rtype combination numbers tcom are associated with the cor-responding 4r coefficient combination numbers, ccom. Theprime number p is selected to be 257, using the same ratio-nale as that in [1, 2], which is the smallest prime numbergreater than the largest number 255 possible after the pre-processing stage. For a relatively large value of p consideredhere, a practical choice of r and m will be r < m � p. Forsecurity of sharing, we would like to have r to be more thanjust a couple, but be limited in connection with limiting m toreduce the computation involved and to avoid the use of toomany channels. The r and m are chosen based on the appli-cation on hand. For example, in the (r = 4,m = 6) thresh-old scheme, let us consider a system consisting of one dealerand six participants, the dealer distributes a secret image intom = 6 shares and each participant holds one share. Later, ifr = 4 shares are received, the secret image can be revealed.If less than 4 shares are received, then no information aboutthe secret image can be revealed.

The sharing process is described below:

(1) from the preprocessing stage, we get combinationnumbers Ccom and type numbers Tcom;

Combinationnumber

Type number

216 7 20 30 38 64 22 202

30 180 r = 2, m = 4

qb(x) = (a0 + a1x + · · · + ar−1xr−1) mod 257,

a0 a1 qb(1) qb(2) qb(3) qb(4)

30 180

216 7

20 30

38 64

22 202

210

223

50

102

224

133

230

80

166

169

56

237

110

220

114

235

244

140

37

59

Figure 3: An illustration of the sharing phase.

210 = (a0 + a1) mod 257133 = (a0 + 2a1) mod 257

a0 = 30, a1 = 180

Any r = 2 out of m = 4 shadows can reveal a0, a1

qb(1) qb(2) qb(3) qb(4) a0 a1

210

223

50

102

224

133

230

80

166

169

56

237

110

220

114

235

244

140

37

59

30 180

216 7

20 30

38 64

22 202

Figure 4: An illustration of the reveal phase.

(2) pick r consecutive numbers from Tcom and 4r consec-utive numbers from Ccom to form five sharing blockseach containing r numbers;

(3) apply the sharing equations (4) and (5) to the pickedsharing block to generate m output shares for the mshadows. If the output values are less than 255, storethe generated output shares in the shadows. If an out-put value is 255 or 256, then store the coefficient 255 inthe shadow coefficients and an extra bit 0 for 255 and1 for 256 is stored in a list that follows;

(4) go to step (2) until all combination numbers are pro-cessed.

An illustration of the sharing phase is shown in Figure 3using the type numbers and the combination numbers ob-tained from the illustration in Figure 2. Without loss of gen-erality, consider r = 2 and m = 4, that is, consider two num-bers as polynomial coefficients in the sharing equation (4)and four output numbers qb(1), qb(2), qb(4), qb(5) as out-put shares for four shadows. Take a0 = 30 and a1 = 180, theshares are qb(1) = (30 + 180) mod 257 = 210, qb(2) = 133,qb(3) = 56, and qb(4) = 235. The other shares are evalu-ated in the same way using the other coefficients as shown inFigure 3.

C.-P. Huang and C.-C. Li 5

3.3. The reveal phase

The coefficient combination numbers can be revealed by anyr out of m shadows via the following steps.

(1) Take one pixel (element) from each of the r shadowsto form a shadow block sequentially from left to rightand top to bottom.

(2) Use these r shares and apply Lagrange’s interpolationto solve for the values of a0, a1, a2, . . . , ar−1 in (4).

(3) Steps (1) and (2) are processed for every 5 shadowblocks with one type combination block and 4 coef-ficient combination blocks. In case any value of qb(i) is255 in these 5 blocks, the following 6th shadow blockis examined for the corresponding extra bit (0 or 1) tobe added back.

(4) Repeat steps (1) to (3) until all pixels of the r shadowsare processed. The whole set of coefficient combina-tion numbers is reconstructed.

An illustration of the reveal phase is shown in Figure 4using the shares obtained from the illustration given inFigure 3 for r = 2 and m = 4. The combination numbercan be revealed by any 2 out of 4 shadows. For example, taketwo shares qb(1), qb(2) and apply Lagrange’s interpolation tosolve for two values a0 and a1 from (6):

(a0 + a1

)mod 257 = 210,

(a0 + 2a1

)mod 257 = 133.

(6)

It gives a0 = 30 and a1 = 180 as expected. The other coeffi-cient combination numbers can be revealed in the same wayas shown in Figure 4.

4. EXPERIMENTAL RESULTS

Four images (Lena, Jet, Monkey, and Peppers), each has512 × 512 pixels with 8 bits per pixel, were used in theexperiment. The ITI wavelet derived from Daubechies’ 5/3biorthogonal wavelet, 6-level decomposition, and the (r,m)threshold scheme with r = 4 and m = 6 were used. The smallshadow sizes produced by the proposed method are shownin Figure 5(a) in comparison to those obtained by Thien andLin’s (TL’s) method [2], Chen and Lin’s (CL’s) method [4]and Wang and Su’s (WS’s) method [5], respectively. The pro-posed method has smaller shadow images when comparingwith TL’s and CL’s methods in all cases. Our method with-out coding (WO) has larger shadow images than those ofWS’s method that has been coded prior to inputting to thesharing phase. In order to have a fair comparison, the pro-posed method was also encoded either with Huffman coding(WHu) or with arithmetic coding (WAr) [13] before the datainput to the sharing phase as the WS’s method did. The re-sults indicate that our method encoded with Huffman cod-ing (WHu) has slightly smaller shadow images than those ofWS’s method, and the proposed method encoded with arith-metic coding (WAr) has significantly smaller shadow imagesthan those of WS’s method. The progressive transmissionand reconstruction performances are compared to those ob-tained by Chen and Lin’s (CL’s) method [4]. The three cases

of CL’s method described in [4] are as follows: case (1), withthree thresholds (k = 3) and settings r1 = 3, r2 = 4, andr3 = 5 for m = 6, case (2), with five thresholds (k = 5)and settings r1 = 3, r2 = 4, r3 = 5, r4 = 5, and r5 = 5for m = 6, and case (3), with five thresholds (k = 5) andsettings r1 = 3, r2 = 3, r3 = 3, r4 = 4, and r5 = 5 form = 6. As shown in Figure 5(b), the experimental resultsof the proposed method are compared favorably to thoseof CL’s method. The proposed method needs less bytes ofshadow images than the original image data to achieve loss-less reconstruction of the original image, while CL’s methodrequires more bytes of shadow images than the original im-age data (512 × 512 bytes). In Figures 5(c) and 5(d), the ex-perimental results on reconstructed image quality (PSNR) offour test images at different bit rates are shown, the PSNRof the reconstructed images by the proposed method witharithmetic coding is compared with those obtained by CL’smethod for all three cases. Our method gave higher quality(PSNR) reconstructed images. The performance of the pro-posed method on Peppers image is shown in Figure 6 forvisual illustration. Figure 6(a) is the original Peppers imageand Figure 6(b) shows the lossless reconstruction using fourof the six shadows shown in Figure 6(e). The result of thepreprocessing stage is shown in Figure 6(c). The histogramsof the original image and of the result of the preprocesseddata are shown in Figure 6(d) left part and right part, re-spectively. The latter appears more evenly distributed acrossa broad range in the middle, and the visual observations in-dicate that the data after the preprocessing stage are signif-icantly decorrelated. At the bit rate of 2.0 bpp, our recon-structed image is shown in Figure 7(a) in comparison to thereconstruction obtained by applying CL’s method as shownin Figure 7(b). As expected, the proposed method has bettervisual quality of the reconstructed image at the lower bit rate.In another experiment on map images, as will be discussedin Section 6, the progressive reconstruction of the proposedmethod is shown in Figures 12 and 13.

In order to have an idea about the transmission perfor-mance of the proposed method when channel interference(noise or mis-synchronization) occurs, we illustrate the per-formance of the method using r = 4 and m = 6. If the noisyor misalignmented channels are no more than (m− r) chan-nels while r channels are received free from noise, the im-age can be perfectly reconstructed without being affected bythe interference. For interference occurred in the r channels,let us consider an ordinary communication system for bi-nary pulse amplitude modulation (PAM) baseband signalswith a controllable additive white Gaussian noise [14] ormisalignment steps (bits). The transmission characteristic ofthis communication system [14] with bit-error rate (BER)versus signal-to-noise ratio (SNR, Eb/N0, dB) is shown inFigure 8(a), where Eb is energy per bit andN0 is noise spectraldensity. Such a controlled additive white Gaussian noise wasadded in every channel and the shadow images were trans-mitted over the channels bit by bit. The number of error bitswas measured at every controlled noise level to obtain bit-error rates for four test images during their shadow trans-mission. We used the received shadow data to reconstruct

6 EURASIP Journal on Advances in Signal Processing

Lena Jet Monkey Peppers

Images

0

2

4

6

8

10

Byt

es

×104

Proposed WOProposed WHuProposed WArCL’s case (1)

CL’s case (2)CL’s case (3)TL’sWS’s

(a)

Lena Jet Monkey Peppers

Images

0

0.5

1

1.5

2

2.5

3

3.5

4

Byt

es

×105

Proposed WOProposed WHuProposed WAr

CL’s case (1)CL’s case (2)CL’s case (3)

(b)

1 1.5 2 2.5 3 3.5 4 4.5 5 5.5 6 6.5 7 7.5 8

Bit rate (bits/pixel)

10

20

30

40

50

60

PSN

R(d

B)

Proposed WArCL’s case (1)

CL’s case (2)CL’s case (3)

Lena

Jet

(c)

1 1.5 2 2.5 3 3.5 4 4.5 5 5.5 6 6.5 7 7.5 8

Bit rate (bits/pixel)

10

20

30

40

50

60

PSN

R(d

B)

Proposed WArCL’s case (1)

CL’s case (2)CL’s case (3)

MonkeyPeppers

(d)

Figure 5: Performance of shadow size and reconstruction quality of the proposed method on four test images (Lena, Jet, Monkey, andPeppers): (a) shadow size comparison (Bytes), (b) number of bytes used for lossless reconstruction, (c) quality (PSNR, dB) of reconstructedimages (Lena, Jet) at different bit rate, and (d) quality (PSNR, dB) of reconstructed images (Monkey, Peppers) at different bit rate.

the four images and computed peak signal-to-noise ratios(PSNR, dB) corresponding to each bit-error rate for thesefour images, the results are shown by curves in Figure 8(b).For visual evaluation, the reconstructed Peppers image ofPSNR 16.04 dB at the bit-error rate of 8 × 10−2, the recon-structed image of PSNR 25.10 dB at the bit error rate of2.4 × 10−3, and the reconstructed image of PSNR 35.10 dBat the bit error rate of 2 × 10−4 are shown in Figures 8(c),8(d), and 8(e), respectively. The mis-synchronization prob-lem was evaluated by the BER and misalignment steps (bits).The average BER versus misalignment steps (bits) of the fourtest images is shown in Figure 8(f). The average over thisrange is 0.4283. For visual evaluation, the reconstructed Pep-

pers image with PSNR of 5.67 dB at 1-bit misalignment fromthe starting point is shown in Figure 8(g). It indicates thatthe method is very sensitive to mis-synchronization from thebeginning. Since the proposed method has the progressivetransmission capability, it should provide some reasonablevisual quality if the misalignment occurs in the middle ofthe transmission. Three reconstructed Peppers images withPSNR of 11.88 dB, 24.16 dB, and 30.15 dB are shown in Fig-ures 8(h), 8(i), and 8(j), when 1-bit misalignment occurredafter 5 percent of the shadow data was transmitted, when8-bis misalignment occurred after 20 percent of the datawas transmitted, and when 10-bits misalignment occurredafter 50 percent of the data was transmitted, respectively.

C.-P. Huang and C.-C. Li 7

(a) (b)

(c)

50 100 150 200 250 50 100 150 200 2500

500

1000

1500

2000

2500

3000

3500

0

500

1000

1500

2000

2500

3000

3500Original After combination

(d)

(e)

Figure 6: Illustration of the results of various processing phases of the Peppers image: (a) the original Peppers image, (b) the reconstructedimage using four out of six shadows in (e), (c) the result of the preprocessing stage, (d) histogram of the original image and histogram of thecombination coefficient image resulted from the preprocessing, and (e) shadows generated by the proposed method with r = 4 and m = 6.

These results indicate that the shadow data from the pro-posed method can be transmitted over the channel of low-to-moderate noise level (e.g., bit-error rate smaller than 10−3).It also indicates that the method may perform well if any mis-synchronization occurs after the first portion of the data hasbeen transmitted. Its performance under interference will beenhanced when the channel coding is used in the transmis-sion system as discussed in [15–17].

5. SECURITY ANALYSIS

A security analysis of the proposed method has been per-formed similar to what was done in [2] to ascertain that themethod has the security property that “any r−1 or less shad-ows cannot provide sufficient information to reveal the secretimage.” Note that our method utilizes ITI wavelet transformrepresentation of the image and combines the wavelet coeffi-cients prior to the sharing process. Without loss of generality,

8 EURASIP Journal on Advances in Signal Processing

(a) (b)

Figure 7: Reconstructed image at the bit rate of 2.0 bpp, (a) using our method with PSNR of 32.61 dB and (b) using CL’s method with PSNRof 20.08 dB.

let us inspect how coefficient combination numbers and typecombination numbers (or coefficients a0, . . . , ar−1) can berevealed. From (4), to reveal the r coefficients of the poly-nomial qb(x), we need r equations. If we only have (r − 1)shadow images from which we get qb(1), qb(2), . . . , qb(r− 1),we can only set up (r − 1) equations

qb(1) = (a0 + a1 + · · · + ar−1)

mod 257,

qb(2) = (a0 + 2a1 + · · · + 2r−1ar−1)

mod 257,

...

qb(r − 1)=(a0 +(r − 1)a1 +· · ·+(r − 1)r−1ar−1)

mod 257,(7)

there are 257 possible solutions in solving for r unknown co-efficients using only the above r − 1 equations, and hencethe probability of guessing the correct solution is 1/257 if theshadow images have uniformly distributed intensity levels.There are t polynomials for an image with t sharing blocks,and hence the probability of obtaining the correct imageis (1/257)t . For example, for a 512 × 512 secret image, ifr = 2, there are about 100 000 polynomials to be involved.The probability of guessing the right pixel values of shadowimages in the proposed scheme is (1/257)100,000 which is ex-tremely small. An intruder has only this near zero probabil-ity to get the correct coefficient combination numbers, notto mention the difficulty to reconstruct the original image.The reconstructed image of the example on Peppers (withr = 2, m = 4) is shown in Figure 9, using one valid shadowimage and one randomly estimated shadow image. This re-sult indicates that there is practically no correlation betweenthe secret image (the original Peppers) and the reconstructedimage using less than r valid shadow images.

Since the above security analysis of the sharing method isbased on the assumption of uniformly distributed intensitylevels of shadow images, it needs an experimental justifica-tion. Let us consider the normalized histogram of a shadowimage with intensity levels {xi, i = 0, 1, . . . ,n} versus the

numbers of occurrences of xi normalized by the total num-ber of occurrences, { f (xi) versus xi, i = 0, 1, . . . ,n}. f (xi) isthus the probability of occurrences of xi. Let f be the meanvalue of the normalized histogram

f = 1n + 1

i=n∑

i=0

f (xi) (8)

and let σ be the estimated standard deviation

σ =

√√√√√

1n

i=0∑

i=0

(f (xi)− f

)2. (9)

For a uniform distribution, f (xi) should be equal to f for allxi. The degree of distribution uniformity may be measured interms of the ratio of standard deviation to mean (σ/ f ). Thesmaller the σ/ f , the closer the histogram is to a uniform dis-tribution. The same four test images were used in the experi-mental evaluation. The average value of the ratio of standarddeviation to mean for m shadow image histograms of eachtest image using the proposed method is shown in Figure 10in comparison to those obtained by Thien and Lin’s (TL’s)method [2] and Chen and Lin’s (CL’s) method [4]. The pro-posed method has significantly smaller average values of σ/ fin the experimental study. This supports the hypothesis thathistograms of the shadow images are almost uniformly dis-tributed and the probability of guessing the right combina-tion coefficients in the proposed scheme will be extremelysmall, so that our method is very secure. For visual compar-ison, histograms of the shadow images of Jet image obtainedby using the proposed method, TL’s method and CL’s methodare shown in Figures 11(a), 11(b), and 11(c), respectively. InFigures 11(a) and 11(b), the parameters used were r = 4 andm = 6, and in Figure 11(c), the case (1) was investigated.Note that for a fair comparison the permutation process wasnot applied to any method in this experiment. This verifiesthe adequacy of the security analysis discussed above.

C.-P. Huang and C.-C. Li 9

0 1 2 3 4 5 6 7 8

SNR, Eb/N0 (dB)

10−4

10−3

10−2

10−1

BE

R

(a)

15 20 25 30 35

PSNR (dB)

10−4

10−3

10−2

10−1

BE

R

LenaJet

MonkeyPeppers

(b)

(c) (d)

(e)

2 4 6 8 10 12 14 16

Step (bits)

0.425

0.426

0.427

0.428

0.429

0.43

0.431

0.432

BE

R

(f)

(g) (h) (i) (j)

Figure 8: Performance of the proposed method under interference with channel noise or mis-synchronization: (a) performance of anordinary communication system, (b) quality of the reconstructed images (PSNR, dB) at different bit-error rate, (c) reconstructed Peppersimage with PSNR of 16.04 dB at bit-error rate of 8 × 10−2, (d) reconstructed Peppers image with PSNR of 25.10 dB at bit-error rate of2.4 × 10−3, (e) reconstructed Peppers image with PSNR of 35.14 dB at bit-error rate of 2.0 × 10−4, (f) average bit-error rate at differentmisalignment steps, (g) reconstructed Peppers image with PSNR of 5.67 dB for 1 bit misalignment from the beginning, (h) reconstructedPeppers image with PSNR of 11.88 dB for 1-bit misalignment after 5 percent of the shadow data was transmitted, (i) reconstructed Peppersimage with PSNR of 24.16 dB for 8-bit misalignment after 20 percent of the data was transmitted, and (j) reconstructed Peppers image withPSNR of 30.15 dB for 10-bit misalignment after 50 percent of the data was transmitted.

10 EURASIP Journal on Advances in Signal Processing

Figure 9: The reconstructed Peppers image by using r − 1 validshadow images in the case of (r = 2, m = 4).

Lena Jet Monkey Peppers

Images

0

1

2

3

4

Rat

ioof

stan

dar

dd

evia

tion

tom

ean

×10−4

ProposedTL’sCL’s case (1)

CL’s case (2)CL’s case (3)

Figure 10: Average value of the ratio of standard deviation to meanof histograms of six shadow images for test images Lena, Jet, Mon-key and Peppers.

6. APPLICATIONS

We consider to apply the proposed method to secret im-age telebrowsing (e.g., military maps) to illustrate one of thepractical applications of the proposed method. Firstly, ap-ply integer wavelet transform and Shamir’s (r,m) thresholdscheme to divide each military image into several shadowsand distribute them to several different sites. It assures thatthe secret images are protected securely. Since the quantitiesof military maps used in a war are tremendous and the pro-posed method produces small shadows, it has the advantageof saving storage space. Secondly, apply the reveal procedureto progressively reconstruct the related military maps. Sincethe proposed method has progressive transmission capabil-ity, during the reconstruction soldiers (viewers) may quicklyskip irrelevant maps and can find the desired maps efficiently.Two military images from [18] are used to demonstrate thisapplication of the proposed method. If the desired map is notMap1 in Figure 12, a soldier may skip the image at the glance

50 150 250 50 150 250 50 150 2500

200

400

600

0

200

400

600

0

200

400

600

50 150 250 50 150 250 50 150 2500

200

400

600

0

200

400

600

0

200

400

600

(a)

50 150 250 50 150 250 50 150 2500

200

400

600

0

200

400

600

0

200

400

600

50 150 250 50 150 250 50 150 2500

200

400

600

0

200

400

600

0

200

400

600

(b)

50 150 250 50 150 250 50 150 2500

200

400

600

0

200

400

600

0

200

400

600

50 150 250 50 150 250 50 150 2500

200

400

600

0

200

400

600

0

200

400

600

(c)

Figure 11: Shadow image histograms of the Jet image: (a) usingthe proposed method, (b) using TL’s method, and (c) using CL’smethod of case (1).

C.-P. Huang and C.-C. Li 11

(a) (b)

(c) (d)

(e) (f)

Figure 12: Progressive reconstruction of Military Map1 using any 4 out of 6 shadows and with the following percentages of coefficients, andthe resulting PSNR: (a) 1%, 21.38 dB, (b) 5%, 23.72 dB, (c) 15%, 25.73 dB, (d) 25%, 28.27 dB, (e) 50%, 32.15 dB, (f) 100%, lossless.

of the reconstructed image of the lowest possible resolution,that is, in Figure 12(a). The soldier will look for the target im-age Map2 in Figure 13, and will keep progressive reconstruc-tion to the required quality even to the perfect reconstructionshould the received shadow images be not corrupted by anychannel noise.

7. CONCLUSIONS

In this paper, a new method based on the reversible ITIwavelet transform to share a secret image has been pre-sented. By taking advantages of transform coefficient mag-nitude decay and excellent energy compaction in wavelet

12 EURASIP Journal on Advances in Signal Processing

(a) (b)

(c) (d)

(e) (f)

Figure 13: Progressive reconstruction of Military Map2 using any 4 out of 6 shadows and with the following percentages of coefficients, andthe resulting PSNR: (a) 1%, 22.19 dB, (b) 5%, 23.48 dB, (c) 15%, 24.85 dB, (d) 25%, 28.09 dB, (e) 50%, 31.21 dB, (f) 100%, lossless.

multiresolution representation, coefficient combination pro-cedures and processing sequences are developed for use inapplying the (r,m) threshold scheme to generate shadows forimage sharing. It results in small shadow images, perfect re-construction, and the capability for progressive transmission.The effectiveness of the proposed method is demonstratedby experimental results on test images. In comparison to themethods in [2, 4, 5], the proposed method has advantages of

providing both progressive transmission and small shadowimages simultaneously. The security analysis result indicatesthat the method has the desired security property that “anyr − 1 or less shadows cannot provide sufficient informationto reveal the secret image.” When considering the securityquality in terms of distribution uniformity of histograms ofshadow images, the proposed method is more secure (nearlyuniform) than the existing methods in [2, 4].

C.-P. Huang and C.-C. Li 13

ACKNOWLEDGMENTS

The authors would like to thank the anonymous reviewersfor their valuable comments and suggestions on the earlierversion of the manuscript. This research is supported in partby the National Science Council, ROC under the grant NSC95-2221-E-130-019.

REFERENCES

[1] A. Shamir, “How to share a secret,” Communications of theACM, vol. 22, no. 11, pp. 612–613, 1979.

[2] C.-C. Thien and J.-C. Lin, “Secret image sharing,” Computersand Graphics, vol. 26, no. 5, pp. 765–770, 2002.

[3] G. R. Blakley, “Safeguarding cryptographic keys,” in Proceed-ings of AFIPS National Computer Conference, vol. 48, pp. 313–317, New York, NY, USA, June 1979.

[4] S.-K. Chen and J.-C. Lin, “Fault-tolerant and progressivetransmission of images,” Pattern Recognition, vol. 38, no. 12,pp. 2466–2471, 2005.

[5] R.-Z. Wang and C.-H. Su, “Secret image sharing with smallershadow images,” Pattern Recognition Letters, vol. 27, no. 6, pp.551–555, 2006.

[6] H. Kim and C. C. Li, “Lossless and lossy image compressionusing biorthogonal wavelet transforms with multiplierless op-erations,” IEEE Transactions on Circuits and Systems II, vol. 45,no. 8, pp. 1113–1118, 1998.

[7] A. Zandi, J. Allen, E. Schwartz, and M. Boliek, “CREW: com-pression with reversible embedded wavelets,” in Proceedings ofthe 5th Data Compression Conference, pp. 212–221, Snowbird,Utah, USA, March 1995.

[8] A. R. Calderbank, I. Daubechies, W. Sweldens, and B.-L. Yeo,“Wavelet transforms that map integers to integers,” Appliedand Computational Harmonic Analysis, vol. 5, no. 3, pp. 332–369, 1998.

[9] M. D. Adams and R. K. Ward, “Symmetric-extension-compatible reversible integer-to-integer wavelet transforms,”IEEE Transactions on Signal Processing, vol. 51, no. 10, pp.2624–2636, 2003.

[10] A. Said and W. A. Pearlman, “A new, fast, and efficient im-age codec based on set partitioning in hierarchical trees,”IEEE Transactions on Circuits and Systems for Video Technol-ogy, vol. 6, no. 3, pp. 243–250, 1996.

[11] V. A. Vaishampayan, “Design of multiple description scalarquantizers,” IEEE Transactions on Information Theory, vol. 39,no. 3, pp. 821–834, 1993.

[12] Y. Wang, A. R. Reibman, and S. Lin, “Multiple description cod-ing for video delivery,” Proceedings of the IEEE, vol. 93, no. 1,pp. 57–70, 2005.

[13] K. Sayood, Introduction to Data Compression, Morgan Kauf-mann, San Francisco, Calif, USA, 2nd edition, 2000.

[14] J. G. Proakis and M. Salehi, Communication Systems Engineer-ing, Prentice-Hall, Englewood Cliffs, NJ, USA, 2nd edition,2001.

[15] P. G. Sherwood and K. Zeger, “Progressive image coding fornoisy channels,” IEEE Signal Processing Letters, vol. 4, no. 7,pp. 189–191, 1997.

[16] V. Chande and N. Farvardin, “Progressive transmission of im-ages over memoryless noisy channels,” IEEE Journal on Se-lected Areas in Communications, vol. 18, no. 6, pp. 850–860,2000.

[17] N. V. Boulgouris, N. Thomos, and M. G. Strintzis, “Trans-mission of images over noisy channels using error-resilient

wavelet coding and forward error correction,” IEEE Transac-tions on Circuits and Systems for Video Technology, vol. 13,no. 12, pp. 1170–1181, 2003.

[18] The Library of Congress website, http://memory.loc.gov/ammem/gmdhtml/milhome.html.

Chin-Pan Huang was born in 1959 in Tai-wan. He received the B.S. and M.S. degreesin electrical engineering from Chung ChengInstitute of Technology, Taiwan, in 1981 and1985, respectively. In 1996, he received thePh.D. degree in electrical engineering fromUniversity of Pittsburgh, Pa, USA. From1996 to 2002, he was an Associate Scientistof the Electronic System Division in ChungShan Institute of Science and Technology.He then joined the Department of Computer and Communica-tion Engineering at Ming Chuan University in August 2002 andis currently an Assistant Professor there. His recent research inter-ests include digital signal/image processing, data compression, andpattern recognition. He is a Member of IEEE.

Ching-Chung Li received his B.S. de-gree from the National Taiwan Univer-sity, Taipei, in 1954, and his M.S. andPh.D. degrees from Northwestern Univer-sity, Evanston, ILL, in 1956 and 1961, re-spectively. He is presently a Professor ofElectrical Engineering and Computer Sci-ence at the University of Pittsburgh, Pitts-burgh, Pa. He was a Visiting Associate Pro-fessor of Electrical Engineering at the Uni-versity of California, Berkeley, in the Spring of 1964, and a VisitingPrincipal Scientist at the Biodynamics Laboratory, Alza Corpora-tion, Palo, Calif in the summer of 1970. On his sabbatical leaves,he was with the Laboratory for Information and Decision Systems,Massachusetts Institute of Technology in the Fall of 1988, and withCarnegie Mellon University at the Robotics Institute in the springof 1998 and at the Advanced Multimedia Processing Laboratory inthe spring of 2006. His research interests are in pattern recogni-tion, image processing, biocybernetics, and applications of wavelettransforms. He is a Fellow of IEEE and a Fellow of IAPR.