Compression image sharing using DCT- Wavelet transform and coding by Blackely method
DOI:
https://doi.org/10.25195/ijci.v43i1.74Keywords:
image sharingAbstract
The increased use of computer and internet had been related to the wide use of multimedia information. The requirement for
protecting this information has risen dramatically. To prevent the confidential information from being tampered with, one needs to
apply some cryptographic techniques. Most of cryptographic strategies have one similar weak point that is the information is centralized.
To overcome this drawback the secret sharing was introduced. It’s a technique to distribute a secret among a group of members, such
that every member owns a share of the secret; but only a particular combination of shares could reveal the secret. Individual shares
reveal nothing about the secret. The major challenge faces image secret sharing is the shadow size; that's the complete size of the lowest
needed of shares for revealing is greater than the original secret file. So the core of this work is to use different transform coding
strategies in order to get as much as possible the smallest share size. In this paper Compressive Sharing System for Images Using
Transform Coding and Blackely Method based on transform coding illustration are introduced. The introduced compressive secret
sharing scheme using an appropriate transform (Discrete cosine transform and Wavelet) are applied to de-correlate the image samples,
then feeding the output (i.e., compressed image data) to the diffusion scheme which is applied to remove any statistical redundancy or
bits of important attribute that will exist within the compressed stream and in the last the (k, n) threshold secret sharing scheme, where n
is the number of generated shares and k is the minimum needed shares for revealing. For making a certain high security level, each
produced share is passed through stream ciphering depends on an individual encryption key belongs to the shareholder.
Downloads
Downloads
Published
Issue
Section
License
IJCI applies the Creative Commons Attribution (CC BY) license to articles. The author of the submitted paper for publication by IJCI has the CC BY license. Under this Open Access license, the author gives an agreement to any author to reuse the article in whole or part for any purpose, even for commercial purposes. Anyone may copy, distribute, or reuse the content as long as the author and source are properly cited. This facility helps in re-use and ensures that journal content is available for the needs of research.
If the manuscript contains photos, images, figures, tables, audio files, videos, etc., that the author or the co-authors do not own, IJCI will require the author to provide the journal with proof that the owner of that content has given the author written permission to use it, and the owner has approved that the CC BY license being applied to content. IJCI provides a form that the author can use to ask for permission from the owner. If the author does not have owner permission, IJCI will ask the author to remove that content and/or replace it with other content that the author owns or has such permission to use.
Many authors assume that if they previously published a paper through another publisher, they have the right to reuse that content in their PLOS paper, but that is not necessarily the case – it depends on the license that covers the other paper. The author must ascertain the rights he/she has of a specific license (a license that enables the author to use the content). The author must obtain written permission from the publisher to use the content in the IJCI paper. The author should not include any content in her/his IJCI paper without having the right to use it, and always give proper attribution.
The accompanying submitted data should be stated with licensing policies, the policies should not be more restrictive than CC BY.
IJCI has the right to remove photos, captures, images, figures, tables, illustrations, audio, and video files, from a paper before or after publication, if these contents were included in the author's paper without permission from the owner of the content.