{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,28]],"date-time":"2024-06-28T22:49:57Z","timestamp":1719614997843},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2015,2,14]],"date-time":"2015-02-14T00:00:00Z","timestamp":1423872000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["EURASIP J. Adv. Signal Process."],"published-print":{"date-parts":[[2015,12]]},"abstract":"<jats:title>Abstract<\/jats:title>\n          <jats:p>Secure sharing of digital images is becoming an important issue. Consequently, many schemes for ensuring image sharing security have been proposed. However, existing approaches focus on the sharing of a single image, rather than multiple images. We propose three kinds of sharing methods that progressively reveal <jats:italic>n<\/jats:italic> given secret images according to the sensitivity level of each image. Method 1 divides each secret image into <jats:italic>n<\/jats:italic> parts and then combines and hides the parts of the images to get <jats:italic>n<\/jats:italic> steganographic (stego) JPEG codes of equal importance. Method 2 is similar; however, it allocates different stego JPEG codes of different \u2018weights\u2019 to indicate their strength. Method 3 first applies traditional threshold-sharing to the <jats:italic>n<\/jats:italic> secret images, then progressively shares <jats:italic>k<\/jats:italic> keys, and finally combines the two sharing results to get <jats:italic>n<\/jats:italic> stego JPEG codes. In the recovery phase, various parameters are compared to a pre-specified low\/middle\/high (L\/M\/H) threshold and, according to the respective method, determine whether or not secret images are reconstructed and the quality of the images reconstructed. The results of experiments conducted verify the efficacy of our methods.<\/jats:p>","DOI":"10.1186\/s13634-015-0196-z","type":"journal-article","created":{"date-parts":[[2015,2,17]],"date-time":"2015-02-17T09:34:14Z","timestamp":1424165654000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Progressive sharing of multiple images with sensitivity-controlled decoding"],"prefix":"10.1186","volume":"2015","author":[{"given":"Sheng-Yu","family":"Chang","sequence":"first","affiliation":[]},{"given":"Suiang-Shyan","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Tzu-Min","family":"Yeh","sequence":"additional","affiliation":[]},{"given":"Lee Shu-Teng","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Ja-Chen","family":"Lin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,2,14]]},"reference":[{"issue":"11","key":"196_CR1","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"A Shamir, How to share a secret. Commun. ACM 22(11), 612\u2013613 (1979)","journal-title":"Commun. ACM"},{"key":"196_CR2","first-page":"313","volume-title":"Proceedings of AFIPS 1979 National Computer Conference, New Jersey, USA, vol. 48","author":"GR Blakley","year":"1979","unstructured":"GR Blakley, Safeguarding cryptographic keys, in Proceedings of AFIPS 1979 National Computer Conference, New Jersey, USA, vol. 48, 1979, pp. 313\u2013317"},{"issue":"12","key":"196_CR3","doi-asserted-by":"publisher","first-page":"2466","DOI":"10.1016\/j.patcog.2005.04.002","volume":"38","author":"SK Chen","year":"2005","unstructured":"SK Chen, JC Lin, Fault-tolerant and progressive transmission of images. Pattern Recogn. 38(12), 2466\u20132471 (2005)","journal-title":"Pattern Recogn."},{"issue":"4","key":"196_CR4","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1016\/j.image.2006.12.012","volume":"22","author":"RZ Wang","year":"2007","unstructured":"RZ Wang, SJ Shyu, Scalable secret image sharing. Signal Process. Image Comm. 22(4), 363\u2013373 (2007)","journal-title":"Signal Process. Image Comm."},{"issue":"4","key":"196_CR5","doi-asserted-by":"publisher","first-page":"047006","DOI":"10.1117\/1.2911719","volume":"47","author":"KH Hung","year":"2008","unstructured":"KH Hung, YJ Chang, JC Lin, Progressive sharing of an image. Opt. Eng. 47(4), 047006 (2008)","journal-title":"Opt. Eng."},{"issue":"1","key":"196_CR6","doi-asserted-by":"publisher","first-page":"013003","DOI":"10.1117\/1.3295710","volume":"19","author":"LST Chen","year":"2010","unstructured":"LST Chen, JC Lin, Multithreshold progressive image sharing with compact shadows. J. Electron. Imag. 19(1), 013003 (2010)","journal-title":"J. Electron. Imag."},{"issue":"4","key":"196_CR7","doi-asserted-by":"publisher","first-page":"1410","DOI":"10.1016\/j.patcog.2007.09.004","volume":"41","author":"WP Fang","year":"2008","unstructured":"WP Fang, Friendly progressive visual secret sharing. Pattern Recog. 41(4), 1410\u20131414 (2008)","journal-title":"Pattern Recog."},{"issue":"5","key":"196_CR8","doi-asserted-by":"publisher","first-page":"765","DOI":"10.1016\/S0097-8493(02)00131-0","volume":"26","author":"CC Thien","year":"2002","unstructured":"CC Thien, JC Lin, Secret image sharing. Comput. Graph. 26(5), 765\u2013770 (2002)","journal-title":"Comput. Graph."},{"issue":"3","key":"196_CR9","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1016\/S0164-1212(03)00239-5","volume":"73","author":"CC Lin","year":"2004","unstructured":"CC Lin, WH Tsai, Secret image sharing with steganography and authentication. J. Syst. Software 73(3), 405\u2013414 (2004)","journal-title":"J. Syst. Software"},{"issue":"8","key":"196_CR10","doi-asserted-by":"publisher","first-page":"2340","DOI":"10.1117\/1.1588661","volume":"42","author":"CC Lin","year":"2003","unstructured":"CC Lin, WH Tsai, Secret image sharing with capability of share data reduction. Opt. Eng. 42(8), 2340\u20132345 (2003)","journal-title":"Opt. Eng."},{"key":"196_CR11","doi-asserted-by":"publisher","first-page":"529879","DOI":"10.1155\/2008\/529879","volume":"2008","author":"FM Bui","year":"2008","unstructured":"FM Bui, D Hatzinakos, Biometric methods for secure communications in body sensor networks: resource-efficient key management and signal-level data scrambling. EURASIP J. Adv. Signal Process 2008, 529879 (2008)","journal-title":"EURASIP J. Adv. Signal Process"},{"issue":"2","key":"196_CR12","first-page":"27","volume":"7","author":"SS Lee","year":"2014","unstructured":"SS Lee, SF Hsu, JC Lin, Protection of PDF files: a sharing approach. Int. J. U-E- Serv Sci. Tech. 7(2), 27\u201340 (2014)","journal-title":"Int. J. U-E- Serv Sci. Tech."},{"key":"196_CR13","doi-asserted-by":"publisher","first-page":"782438","DOI":"10.1155\/2010\/782438","volume":"2010","author":"D Wang","year":"2010","unstructured":"D Wang, F Yi, On converting secret sharing scheme to visual secret sharing scheme. EURASIP J. Adv. Signal Process. 2010, 782438 (2010)","journal-title":"EURASIP J. Adv. Signal Process."},{"issue":"7","key":"196_CR14","doi-asserted-by":"publisher","first-page":"1197","DOI":"10.1016\/j.jss.2011.02.023","volume":"84","author":"TH Chen","year":"2011","unstructured":"TH Chen, KH Tsao, Threshold visual secret sharing by random grids. J. Syst. Software 84(7), 1197\u20131208 (2011)","journal-title":"J. Syst. Software"},{"issue":"1","key":"196_CR15","doi-asserted-by":"publisher","first-page":"489","DOI":"10.1016\/j.ins.2013.12.017","volume":"268","author":"AT Boloorchi","year":"2014","unstructured":"AT Boloorchi, MH Samadzadeh, T Chen, Symmetric threshold multipath (STM): an online symmetric key management scheme. Inform. Sci. 268(1), 489\u2013504 (2014)","journal-title":"Inform. Sci."},{"key":"196_CR16","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1186\/1687-6180-2013-49","volume":"2013","author":"KS Wu","year":"2013","unstructured":"KS Wu, A secret image sharing scheme for light images. EURASIP J. Adv. Signal Process. 2013, 49 (2013)","journal-title":"EURASIP J. Adv. Signal Process."},{"issue":"3","key":"196_CR17","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1142\/S0218001410007968","volume":"24","author":"LST Chen","year":"2010","unstructured":"LST Chen, SJ Lin, JC Lin, Reversible JPEG-based hiding method with high hiding-ratio. Int. J. Pattern Recogn. Artif. Intell. 24(3), 433\u2013456 (2010)","journal-title":"Int. J. Pattern Recogn. Artif. Intell."},{"issue":"3","key":"196_CR18","doi-asserted-by":"publisher","first-page":"919","DOI":"10.1016\/j.dsp.2012.12.014","volume":"23","author":"YY Tsai","year":"2013","unstructured":"YY Tsai, DS Tsai, CL Liu, Reversible data hiding scheme based on neighboring pixel differences. Digit. Signal Process. 23(3), 919\u2013927 (2013)","journal-title":"Digit. Signal Process."},{"issue":"3","key":"196_CR19","first-page":"291","volume":"3","author":"S Mukherjee","year":"2014","unstructured":"S Mukherjee, AR Mahajan, Review on algorithms and techniques of reversible data hiding. Int. J. Res. Comput. Commun. Tech. 3(3), 291\u2013295 (2014)","journal-title":"Int. J. Res. Comput. Commun. Tech."},{"issue":"2","key":"196_CR20","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1109\/TIFS.2006.873602","volume":"1","author":"J Lukas","year":"2006","unstructured":"J Lukas, J Fridrich, M Goljan, Digital camera identification from sensor pattern noise. IEEE Trans. Inform. Forensic Secur. 1(2), 205\u2013214 (2006)","journal-title":"IEEE Trans. Inform. Forensic Secur."},{"key":"196_CR21","volume-title":"Watermarking With Wavelets: Simplicity Leads to Robustness","author":"E Brannock","year":"2008","unstructured":"E Brannock, M Weeks, R Harrison, Watermarking With Wavelets: Simplicity Leads to Robustness (Paper presented at the IEEE Southeastcon 2008, Huntsville, AL, 2008)"},{"key":"196_CR22","doi-asserted-by":"publisher","DOI":"10.1109\/SPL.2008.4547753","volume-title":"Automated Signature Insertion in Combinational Logic Patterns for HDL IP Core Protection","author":"E Castillo","year":"2008","unstructured":"E Castillo, L Parrilla, A Garcia, U Meyer-Baese, G Botella, A Lloris, Automated Signature Insertion in Combinational Logic Patterns for HDL IP Core Protection (Paper presented at the 4th southern conference on programmable logic, San Carlos de Bariloche, 2008)"},{"issue":"3","key":"196_CR23","first-page":"701","volume":"63","author":"M Meenakumari","year":"2014","unstructured":"M Meenakumari, G Athisha, Improving the protection of FPGA based sequential IP core designs using hierarchical watermarking technique. J. Theor. Appl. Inf. Technol. 63(3), 701\u2013708 (2014)","journal-title":"J. Theor. Appl. Inf. Technol."},{"issue":"3","key":"196_CR24","doi-asserted-by":"publisher","first-page":"1503","DOI":"10.1007\/s11042-012-1182-1","volume":"70","author":"I Orovi\u0107","year":"2014","unstructured":"I Orovi\u0107, M Orlandi\u0107, S Stankovi\u0107, An image watermarking based on the pdf modeling and quantization effects in the wavelet domain. Multimed. Tool. Appl. 70(3), 1503\u20131519 (2014)","journal-title":"Multimed. Tool. Appl."},{"issue":"4","key":"196_CR25","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1109\/TIP.2003.819861","volume":"13","author":"Z Wang","year":"2004","unstructured":"Z Wang, AC Bovik, HR Sheikh, EP Simoncelli, Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Process. 13(4), 600\u2013612 (2004)","journal-title":"IEEE Trans. Image Process."},{"key":"196_CR26","unstructured":"Chi-square Steganography Test Program [http:\/\/www.guillermito2.net\/stegano\/tools\/index.html]"},{"issue":"3","key":"196_CR27","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1109\/MSECP.2003.1203220","volume":"1","author":"N Provos","year":"2003","unstructured":"N Provos, P Honeyman, Hide and seek: an introduction to steganography. IEEE Secur. Priv. 1(3), 32\u201344 (2003)","journal-title":"IEEE Secur. Priv."}],"container-title":["EURASIP Journal on Advances in Signal Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13634-015-0196-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13634-015-0196-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13634-015-0196-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13634-015-0196-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,2]],"date-time":"2021-09-02T08:33:32Z","timestamp":1630571612000},"score":1,"resource":{"primary":{"URL":"https:\/\/asp-eurasipjournals.springeropen.com\/articles\/10.1186\/s13634-015-0196-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,2,14]]},"references-count":27,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2015,12]]}},"alternative-id":["196"],"URL":"https:\/\/doi.org\/10.1186\/s13634-015-0196-z","relation":{},"ISSN":["1687-6180"],"issn-type":[{"value":"1687-6180","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,2,14]]},"assertion":[{"value":"4 October 2014","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 January 2015","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 February 2015","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"11"}}