![]() |
BMP | AMBTC | DCT | DWT |
CR | 1 | 4 | 10-40 | 4-40 |
CS | Fastest | Fast | Slower | Slowest |
RSB | Wide | Narrow | Narrower | Narrowest |
IQ | Best | Good | Quite Good | Better |
After the introduction of drastic containment measures aimed at stopping the epidemic contagion from SARS-CoV2, many governments have adopted a strategy based on a periodic relaxation of such measures in the face of a severe economic crisis caused by lockdowns. Assessing the impact of such openings in relation to the risk of a resumption of the spread of the disease is an extremely difficult problem due to the many unknowns concerning the actual number of people infected, the actual reproduction number and infection fatality rate of the disease. In this work, starting from a SEIRD compartmental model with a social structure based on the age of individuals and stochastic inputs that account for data uncertainty, the effects of containment measures are introduced via an optimal control problem dependent on specific social activities, such as home, work, school, etc. Through a short time horizon approximation, we derive models with multiple feedback controls depending on social activities that allow us to assess the impact of selective relaxation of containment measures in the presence of uncertain data. After analyzing the effects of the various controls, results from different scenarios concerning the first wave of the epidemic in some major countries, including Germany, France, Italy, Spain, the United Kingdom and the United States, are presented and discussed. Specific contact patterns in the home, work, school and other locations have been considered for each country. Numerical simulations show that a careful strategy of progressive relaxation of containment measures, such as that adopted by some governments, may be able to keep the epidemic under control by restarting various productive activities.
Citation: Giacomo Albi, Lorenzo Pareschi, Mattia Zanella. Modelling lockdown measures in epidemic outbreaks using selective socio-economic containment with uncertainty[J]. Mathematical Biosciences and Engineering, 2021, 18(6): 7161-7190. doi: 10.3934/mbe.2021355
[1] | Joachim von Below, José A. Lubary . Stability implies constancy for fully autonomous reaction-diffusion-equations on finite metric graphs. Networks and Heterogeneous Media, 2018, 13(4): 691-717. doi: 10.3934/nhm.2018031 |
[2] | Riccardo Adami, Ivan Gallo, David Spitzkopf . Ground states for the NLS on non-compact graphs with an attractive potential. Networks and Heterogeneous Media, 2025, 20(1): 324-344. doi: 10.3934/nhm.2025015 |
[3] | Matthias Erbar, Dominik Forkert, Jan Maas, Delio Mugnolo . Gradient flow formulation of diffusion equations in the Wasserstein space over a Metric graph. Networks and Heterogeneous Media, 2022, 17(5): 687-717. doi: 10.3934/nhm.2022023 |
[4] | Mirela Domijan, Markus Kirkilionis . Graph theory and qualitative analysis of reaction networks. Networks and Heterogeneous Media, 2008, 3(2): 295-322. doi: 10.3934/nhm.2008.3.295 |
[5] | Robert Carlson . Dirichlet to Neumann maps for infinite quantum graphs. Networks and Heterogeneous Media, 2012, 7(3): 483-501. doi: 10.3934/nhm.2012.7.483 |
[6] | Robert Carlson . Myopic models of population dynamics on infinite networks. Networks and Heterogeneous Media, 2014, 9(3): 477-499. doi: 10.3934/nhm.2014.9.477 |
[7] | Andrea Corli, Lorenzo di Ruvo, Luisa Malaguti, Massimiliano D. Rosini . Traveling waves for degenerate diffusive equations on networks. Networks and Heterogeneous Media, 2017, 12(3): 339-370. doi: 10.3934/nhm.2017015 |
[8] | Riccardo Bonetto, Hildeberto Jardón Kojakhmetov . Nonlinear diffusion on networks: Perturbations and consensus dynamics. Networks and Heterogeneous Media, 2024, 19(3): 1344-1380. doi: 10.3934/nhm.2024058 |
[9] | Dilip Sarkar, Shridhar Kumar, Pratibhamoy Das, Higinio Ramos . Higher-order convergence analysis for interior and boundary layers in a semi-linear reaction-diffusion system networked by a $ k $-star graph with non-smooth source terms. Networks and Heterogeneous Media, 2024, 19(3): 1085-1115. doi: 10.3934/nhm.2024048 |
[10] | Aslam Khan, Abdul Ghafoor, Emel Khan, Kamal Shah, Thabet Abdeljawad . Solving scalar reaction diffusion equations with cubic non-linearity having time-dependent coefficients by the wavelet method of lines. Networks and Heterogeneous Media, 2024, 19(2): 634-654. doi: 10.3934/nhm.2024028 |
After the introduction of drastic containment measures aimed at stopping the epidemic contagion from SARS-CoV2, many governments have adopted a strategy based on a periodic relaxation of such measures in the face of a severe economic crisis caused by lockdowns. Assessing the impact of such openings in relation to the risk of a resumption of the spread of the disease is an extremely difficult problem due to the many unknowns concerning the actual number of people infected, the actual reproduction number and infection fatality rate of the disease. In this work, starting from a SEIRD compartmental model with a social structure based on the age of individuals and stochastic inputs that account for data uncertainty, the effects of containment measures are introduced via an optimal control problem dependent on specific social activities, such as home, work, school, etc. Through a short time horizon approximation, we derive models with multiple feedback controls depending on social activities that allow us to assess the impact of selective relaxation of containment measures in the presence of uncertain data. After analyzing the effects of the various controls, results from different scenarios concerning the first wave of the epidemic in some major countries, including Germany, France, Italy, Spain, the United Kingdom and the United States, are presented and discussed. Specific contact patterns in the home, work, school and other locations have been considered for each country. Numerical simulations show that a careful strategy of progressive relaxation of containment measures, such as that adopted by some governments, may be able to keep the epidemic under control by restarting various productive activities.
At present, compared with massive multimedia information, the computer storage resources and network bandwidth provided by hardware technology are limited after all, which makes the storage and transmission of information a thorny problem. It is unrealistic to solve this problem by simply increasing memory capacity, channel bandwidth and processing speed of computer. Effective image compression is the basis of all kinds of dynamic image compression and transmission. Image compression can reduce the amount of data by lowering the redundancy and irrelevance of formatted image data.
Most of the images in the network are stored and transmitted in the form of compression. Compression is the process of representing data in a compact form rather than in its original or incompact form [1]. Lossy compression is much more easy to achieve, and because of the limitations of human vision it can get better compression ratios compared with loseless compression. Compressed images have the advantages of simple calculation and low distortion rate. The most common methods of compression transforms include AMBTC [2], Discrete Cosine Transform (DCT) [3] and Discrete Wavelet Transform (DWT) [4].
AMBTC is an improvement of Block Truncation Coding (BTC) technology. Compared with BTC, the compression process of AMBTC is faster [5]. And the image quality after AMBTC compression is relatively better. Compared with other compression techniques, AMBTC has the advantages of fast coding speed, low computational cost and real-time implementation. Furthermore, it is insensitive to channel error and can obtain satisfactory image quality, so it is widely used. The comparison of bitmap (BMP) image and compression methods based on AMBTC, DCT, and DWT are shown in the Table 1, where Compression Method (CM), Evaluating Indicator (EI), Compression Ratio (CR), Compression Speed (CS), Storage Bandwidth (RSB), and Image Quality (IQ) are included in the table.
![]() |
BMP | AMBTC | DCT | DWT |
CR | 1 | 4 | 10-40 | 4-40 |
CS | Fastest | Fast | Slower | Slowest |
RSB | Wide | Narrow | Narrower | Narrowest |
IQ | Best | Good | Quite Good | Better |
AMBTC is a lossy data compression algorithm for gray images. Because of its simple physical implementation and quick encoding and decoding ability, AMBTC was once widely used in broadcasting and television. It has been introduced into color image compression, namely color unit compression. Although the latest research using Progressive and Iterative Approximation for Least Square (LSPIA) fitting has been able to achieve lossless video compression [6], video compression based on AMBTC is still of great significance. In the military industry field, especially in the field of aviation and aerospace, many factors need to be considered, such as CR, CS, RSB and IQ. In order to reduce energy consumption and improve processing speed, spacecraft should choose compression algorithm with narrow bandwidth, fast computational speed and satisfactory image quality. In addition, binary images require narrow bandwidth, but the image quality is not desirable. On the contrary, color images have the satisfactory quality but require wide bandwidth. Due to the excellent characteristics of image compression based on AMBTC, it can quickly pass back important images. The research on the key technologies of AMBTC image secret sharing is expected to promote the development of fast secret image transmission in the fields of edge computing, aerospace and Unmanned Aerial Vehicle (UAV).
As the visual basis of human perception of the world, image is an important means to obtain, express and transfer information. Through the analysis of images, automated carp species identification [7], palmprint identification [8], energy management [9], prediction of rainfall time series [10] and so on can be realized. With the wide application and rapid development of network and multimedia technology, digital images become easy to obtain, transmit and modify. The security of digital images has attracted more and more attention of scientists and engineers [11]. Images can be transmitted by computers, mobile phones or other communication devices. Therefore, in the process of storage and transmission, they may be stolen. Consequently, image encryption is particularly important [12]. Nonlinear technology of multiple images encryption scheme has become a hot topic, and the encryption scheme based on Latin squares can reduce the time complexity and improve the performance of image encryption [13].
In 1979, Shamir [14] and Blakley [15] proposed the concept of secret sharing for the first time. The (k,n) threshold secret sharing sheme means that a secret is divided into n pieces, when collecting any k or more shares can recover the secret. However, we cannot decrypt when less than k stego images are obtained, and no information about the secret will be revealed.
In 1994, Naor and Shamir [16] proposed the VSS scheme, the key advantage of which is stacking-to-see. According to the basic principle of implementation, VSS can be roughly divided into codebook-based VSS [17] and Random Grid (RG)-based VSS (RGVSS) [18,19]. The encryption of binary secret image based on RG was first proposed by Kafri and Keren [20]. Subsequently, compared with codebook-based VSS, RGVSS has attracted much more attention owing to its superiority in no pixel expansion, easy to implement and no codebook design. However, VSS generally cannot achieve the lossless recovery of secret image, so the follow-up research is devoted to improving the recovery quality of secret image [21,22,24,25]. And even the threshold was extended later [23]. The latest research [26] has been able to achieve satisfactory quality and imperceptibility.
The VSS has the following advantages:
● It has the characteristic of loss tolerance. Even if some shadow images are lost, the secret image can be recovered successfully.
● Prevent the abuse of power caused by excessive concentration.
● The attacker must obtain enough shadow images to recover the secret image, which ensures the security and integrity.
● Without increasing the risk, the reliability of the system is increased.
At present, there are less research on secret sharing of compressed images, although most of the images transmitted on the network are compressed. Yang and Wu considered secret sharing of AMBTC images [5,27,28,29], which plays an important role in the compressed domain for secret sharing applications. Their schemes extend Ou and Sun's scheme [30] from (2,n) threshold to (k,n) threshold. Furthermore, the scheme proposed by Yang and Wu realizes authentication and reversibility, in which reversibility means that the cover images can also be recovered. Reversible cover images play an important role in law enforcement and medical diagnosis [31]. Nevertheless, the schemes they proposed exist the problems of pixel expansion and stego images looking the same to the naked eye, which is not convenient to manage.
In general, the major challenges are as follows:
● At present, a large number of images need to be transmitted. Especially in the scene which requires high-speed of image transmission, it is particularly important to compress the image before transmission.
● Images can be transmitted by computers, mobile phones or other communication devices. Therefore, in the process of storage and transmission, images may be easily stolen.
● The current secret sharing scheme of AMBTC compressed image has the problems of pixel expansion and the stego images are the same visually, which is inconvenient to manage them.
The main contributions of the AMBTC-based RGVSS scheme with meaningful shadows proposed in this paper are as follows:
● AMBTC compression is used before secret image sharing to reduce the amount of information to be transmitted and shared.
● Even if the attacker get several stego images, he doesn't know any information about the secret image. Thus the security of the secret image is guaranteed.
● The quality of both the recovered secret image and the recovered cover images is satisfactory. The stego images are meaningful and there is no pixel expansion, which is convenient for the management of stego images and is conducive to saving storage space.
The rest of the paper is organized as follows. Section 2 briefly introduces the basic concept of AMBTC, and presents the compression and decompression process of it. Meanwhile, section 2 also simply introduces the VSS. In section 3, our scheme is given in more details, and the theoretical analysis of the proposed scheme is provided. The experimental results and the analysis of the experimental data are demonstrated in section 4. Finally, concluding remarks are given in section 5.
AMBTC is a lossy data compression algorithm for gray image. Because of its simple physical implementation and fast processing, it was once widely used in broadcasting and television [33]. It has been introduced into color image compression, namely color unit compression [32]. In the field of military industry, especially in the field of aviation and aerospace, many factors need to be considered, such as bandwidth, computing time, complexity and image quality. In order to reduce energy consumption and improve processing speed, we should choose a compression algorithm with narrow bandwidth, low computational complexity and high image quality applying to the field of aviation and aerospace. Compared with DCT and DWT, the image quality of AMBTC is relatively poor, but the computational complexity is much lower. Weighing multiple indicators, the performance of AMBTC compression algorithm is better than other compression algorithms. In 1997, the United States used it for image compression of Mars Pathfinder.
AMBTC is a fast image compression algorithm that processes pictures in units of blocks. In each block, the original mean value and standard deviation are kept while the gray levels are reduced to achieve the purpose of compression. If the 4×4 block is used as the basic unit and 8-bit integers are used for transmission or storage, this algorithm can achieve a 4:1 compression ratio. If larger blocks are used, higher compression ratio can be obtained, but the image quality will be reduced accordingly. And after AMBTC compression, the image storage format is BMP.
In this paper, AMBTC compression is used to reduce the information need to be hidden in the process of secret sharing of gray image. Traditional VSS scheme needs to share gray image, while the scheme in this paper only needs to share binary image of the same size.
BTC is a block based lossy compression technology for gray image in most cases, which uses quantization levels to reduce the number of gray pixels to be stored in each block. When the AMBTC technology is used to compress the image, each image is divided into non overlapping blocks with t×t pixels, the value of t is usually taken as 4. In the i-th block of the image, the average pixel value of this block is calculated as
Vi=t×t∑j=1xi,jt×t | (2.1) |
The generation standard of bitmap is as follows: if xi,j≤Vi, the corresponding position in bitmap is marked as "0"; otherwise, the corresponding position in bitmap is marked as "1". Note that q is the number of "1" in the bitmap, and the formulas for calculating the two quantization levels are shown in Eq (2.3) and Eq (2.2) respectively.
Hi=∑xi,j≥Vixi,jq | (2.2) |
Li=∑xi,j≤Vixi,jt×t−q | (2.3) |
Then the i-th block is compressed into two quantization levels and the bitmap.
In the decompression phase, if the quantization levels and bitmaps are obtained at the same time, the corresponding blocks can be restored by replacing "0" in the bitmap with low quantization levels Li and "1" with high quantization levels Hi.
VSS [34] can be recovered without any relevant cryptographic knowledge, and the recovery process is simple. According to the basic principle of implementation, VSS can be roughly divided into codebook-based VSS and RG-based VSS. The scheme based on RG has the advantages of simple implementation and no pixel expansion, so the current research is mostly based on the implementation of it [35]. However, VSS generally cannot achieve the lossless recovery of secret images, so the follow-up research is devoted to improving the recovery quality of secret image [21,22,24,25]. The original visual secret sharing was proposed by Naor and Shamir in 1994 [16]. In threshold VSS, binary secret image is encrypted into random shadow images. When decrypting, more than k shadow images are superimposed, and the secret can be seen through vision. Its core idea is to decrypt through Human Vision System (HVS), without any encryption and decryption knowledge and computing equipment.
At present, VSS is mainly applied to binary image. Considering that the bitmap of AMBTC image can be regarded as a binary image, the bitmap information of the secret image can be hidden through the bitmap of different cover images to realize secret sharing.
Due to the excellent characteristics of AMBTC images, important images can be quickly passed back. Research on the key technology of AMBTC secret image sharing is expected to promote the development of important secret image fast transmission in the fields of edge computing, aerospace and drones.
However, all the schemes proposed in [5,27,28,29] with the pixel expansion, which will cause great pressure on storage and transmission. At the same time, the stego images of the four schemes are similar to the naked eye, and it is inconvenient to manage shadow images. In addition, the quality of the stego images varies when distributed to the participants, which may arouse the suspicion of attackers.
The goal of the proposed scheme is to solve the problems of pixel expansion and inconvenient shadow images management. First of all, the proposed scheme adopts VSS scheme based on RG, which does not produce pixel expansion at all. Secondly, for the (k,n) threshold sharing scheme, n cover images are used to generate n visually different stego images.
The proposed scheme includes three phases: (1) compression phase, (2) sharing phase, (3) recovery phase. Figure 1 demonstrates the framework of the proposed scheme. In addition, the notations used in this paper are introduced in Table 2.
Notations | Decriptions |
k | The minimum number of shadow images (bitmaps) need to be obtained in recovery phase. |
t | The number of stego shadow images actually obtained by the dealer in recovery phase. |
n | The number of cover images used in sharing phase and the total number of shadow images. |
t×t | The block size used in AMBTC compression. |
i | The i-th block of the image. |
SCi | Substitute the shadow images with L and H. |
M×N | The size of the bmp image. |
Vi | The average pixel value of the current block. |
Hi | In the current block, the high quantization level, in other words, the pixels higher than the average pixel value are averaged. |
Li | In the current block, the low quantization level, in other words, the pixel lower than the average pixel value are averaged. |
H | The set of Hi, and we save it with images. |
L | The set of Li, and we save it with images.. |
BMi,j | The value of the bitmap in the position of i,j. |
BM | The entire bitmap of the image. |
In compression phase, the secret image and the cover images are compressed by AMBTC algorithm to generate high and low quantization levels and bitmaps, as stated in 2.1.1. We will give a detailed description of the compression process in Algorithm 1.
Algorithm 1: The compression algorithm of secret image and cover images. |
Input: An original BMP image of size M×N. |
Output:BM, H and L. |
Step 1:Divide the picture into 4×4 blocks. |
Step 2:For each block (i,j)∈{(i,j)|1≤i≤M4,1≤j≤N4}, repeat Steps 3-4 (the commonly used image size is an integral multiple of four). |
Step 3: Calculate Vi of each block, take the average value of the pixel value less than Vi and the average value of the pixel value greater than Vi as L and H respectively. |
Step 4:The position of the pixel value less than Vi is recorded as "0", and greater than Vi is recorded as "1" in the bitmap. |
Step 5:Output BM, H and L. |
In this paper, shadow images refer to the binary images generated by embedding the information of secret image bitmap into the bitmaps of cover images, while stego images refer to the images generated by substituting the quantization levels of the cover image into the shadow images, denoted by SCi.
In compression phase, a secret image and n cover images are compressed into the bitmaps and quantization levels through the same compression process.
In sharing phase, for each pixel of the secret image bitmap, randomly choose k images from n cover images, and judge whether the XOR result of k images' BMi,j is equal to that of secret image BMi,j. If equal, change nothing. Otherwise, randomly choose one of the k cover images, and flip BMi,j of this image.
In recovery phase, as long as any k (0<k≤n) or more participants share their stego images, the bitmap of the recovered image is obtained when XOR decryption is applied. By replacing "0" and "1" in the bitmap with Hi and Li, we can get the decrypted image.
In sharing phase, the (k,n) threshold is realized by using n cover images, and any k of them embeded secret information can decrypt the secret image. The proposed scheme mainly realizes the sharing of bitmaps. For the sharing of each pixel value, randomly select k cover images. If the XOR result of their BMi,j is equal to the value of BMi,j of the secret image, no operation is performed; otherwise, one of the k images is randomly selected, and the BMi,j of it is reversed. Finally, H and L of each cover image generated in the compression process is substituted into the shadow images. Therefore, n stego images are generated, as described in Algorithm 2.
Algorithm 2: Bitmaps sharing algorithm. |
Input: BM of the secret image and BMs of n cover images. |
Output: SCi(i=1,2,⋯,n). |
Step 1:For each pixel of the secret image bitmap, repeat Steps 2-4. |
Step 2:Randomly select k of n cover images, and calculate the XOR result of their BMi,j. |
Step 3:If the result is equal to the BMi,j of the secret image, return to step 1. Otherwise, go to step 4. |
Step 4:Randomly select one of the k images in step 2, and flip its BMi,j. |
Step 5:Substitute H and L of each cover image generated in the compression process into the shadow images obtained in Step 4. |
Step 6:Output SCi(i=1,2,⋯,n). |
In recovery phase, the dealer obtains at least k stego images and takes the XOR result of the stego images' BM as the bitmap of the recovered image. Taking the shadow images as the bitmaps of the cover images and substituting H and L generated in the compression phase into them, the cover images can be recovered. The decrypted image can be obtained by replacing "0" with the low quantization level of the secret image obtained in the compression phase and "1" with the high quantization level, which is detailed in Algorithm 3.
Algorithm 3: Recovery algorithm of the secret image and cover images. |
Input: t(k≤t≤n) stego images, H and L of secret image and cover images. |
Output: The recovered image and n recovered cover images. |
Step 1:Take the XOR result of the t stego images' BM as the bitmap of the recovered image. |
Step 2:Take t shadow images as the bitmaps of the recovered cover images. |
Step 3: For t+1 bitmaps, replace the bitmaps with the corresponding H and L generated in the compression phase. |
Step 4:The gray srcret image and t cover images are recovered. |
Herein, analysis on the performance of the proposed scheme from visual quality and security is given as below. The contrast used in this paper refers to the evaluation of the similarity between the recovered image and the secret image and the clarity of human eye recognition, rather than the contrast of the image in traditional image processing.
Definition 1 (Contrast) The visual quality of the recovered image is evaluated by contrast, which determines the degree of recognition of the recovered image by human eyes. Compared with the secret image, the contrast α is defined as
α=P0−P11+P1=P(S′[AS0]=0)−P(S′[AS1]=0)1+P(S′[AS1]=0). | (3.1) |
Where P1(P0) denotes the probability that the black (white) area corresponding to the secret image be white in the recovered image. P0 is the probability that the white area decode correctly, and P1 is the probability that the black area decode incorrectly. The bigger α, the higher visual quality.
Theorem 1. (Correctness and security) The proposed scheme is an effective construction of VSS, and it meets the requirements of correctness and security.
Proof. The security of the proposed scheme is guaranteed by (k,n) threshold VSS scheme based on RG. Less than k secret images disclose no information of secret image bitmap. At the same time, bitmaps can be recovered losslessly when threshold is (k,k), and the slight degradation of image quality is only related to the compression itself. Therefore, the correctness of the scheme is realized.
The bitmaps of n cover images are uncorrelated, that is, pixels in the same position can be regarded as random values. Therefore, the contrast of the recovered image can refer to [35].
As proved in Chen and Tsao's scheme [35], the contrast of XOR results of w collected stego images is α=(2×(wk))/((2w+1)×(nk)−(wk)).
When 0≤w < k, α=0. Consequently, no secret image information will be divulged.
When k≤w≤n, α≥0. The numerator 2×(wk) is always greater than zero. Given n≥w, we have (2w+1)×(nk)=(2w+1)×(n(n−1)⋯(n−k+1))/(1×2×⋯×k)≥(wk)=(w(w−1)⋯(w−k+1))/(1×2×⋯×k). Therefore, the denominator (2w+1)×(nk)−(wk) is greater than zero, so is the contrast α, implying the secret information on the recovered result is recognizable.
We will present the experimental results and analyses to show the effectiveness and advantages of our scheme in this section. The secret image and the cover images used in this scheme are all uncompressed grayscale images with 512×512 pixels. In order to compare with the scheme proposed by Wu et al. [29] conveniently, we use the same cover images as their scheme, which are demonstrated in Figure 2(a)-2(h). And all the images used in our scheme are downloaded from USC-SIPI and CVG-UGR image databases.
An example of a (2,5) threshold is shown in Figure 3. Among them, Figure 3(a) shows the secret image, Figure 3(b)-3(f) show the five stego images, and Figure 3(g)-3(h) show the reconstructed images using 2 stego image with XOR recovery. Figure 3(b)-3(f) are generated by embedding the bitmap of secret image into the bitmaps of Figure 2(a)-2(e) using the VSS scheme. Simultaneously, we use the same evaluation indexes as the compared scheme to assess the quality of the stego images in Figure 3, which are illustrated in Table 4. The Peak Signal to Noise Ratio (PSNR) of original uncompressed cover images compared with AMBTC cover images is represented by PSNRA−O, the PSNR of original uncompressed images compared with AMBTC stego image is represented by PSNRS−O, and the PSNR of AMBTC cover image compared with AMBTC stego image is represented by PSNRS−A. In Wu et al. [29], PSNRA−O is approximately 29.4 dB and PSNRS−O is approximately 24.6 dB. The value of PSNR decreases by 4.8 dB because of the sharing process, while in our scheme only decreases by about 1.1 dB on average. Therefore, the visual quality of the stego images is much better in our scheme.
PSNR is used to evaluate the visual quality of stego images as well. The higher PSNR is, the better the image quality is. The PSNR of the stego images for (2, 2) threshold are shown in Table 3. We use Figure 2(a)-2(b), 2(c)-2(d), 2(e)-2(f) and 2(g)-2(h) as the cover images respectively. The PSNRS−A values of all the stego images are greater than 34 dB, which means that the proposed scheme can get better visual quality of stego images.
Cover images in Figure 2 | PSNRS−A(dB) of stego image 1 | PSNRS−A(dB) of stego image 2 |
(a) (b) | 35.0359 | 34.4229 |
(c) (d) | 34.7117 | 39.6069 |
(e) (f) | 36.8109 | 35.4058 |
(g) (h) | 34.8926 | 33.6556 |
Stego image | PSNRA−O | PSNRS−O | PSNRS−A | |||
Our method | Wu et al. [29] | Our method | Wu et al. [29] | Our method | Wu et al. [29] | |
1 | 32.8368 | 29.3867 | 32.2722 | 24.6240 | 39.0208 | 26.4169 |
2 | 34.5202 | 29.3867 | 33.4245 | 24.6231 | 38.3990 | 26.4100 |
3 | 35.2864 | 29.3867 | 34.0183 | 24.6551 | 38.6779 | 26.4324 |
4 | 41.1087 | 29.3867 | 39.4648 | 24.6125 | 43.6731 | 26.4180 |
5 | 35.9097 | 29.3867 | 35.0476 | 24.6051 | 40.8447 | 26.4001 |
Schemes | Key technique | ER | Stego image format | Pixel expansion | Reversible | Functionality |
Ref. [27] | VSS, AMBTC | 0.5 | AMBTC compressed | 16 times | Yes | SIS, steganography |
Ref. [5] | VSS, AMBTC | − | AMBTC compressed | 16 times | Yes, partial. | Stacking-to-see decryption |
Ref. [28] | PSIS, HMAC, AMBTC | 0.25 | AMBTC compressed | 2 times | Yes | SIS, authentication, steganography |
Ref. [29] | PSIS, HMAC, AMBTC | 0.25 | AMBTC compressed | 8 times | Yes, partial. | SIS, authentication, steganography |
Our | VSS, AMBTC | 0.5 | AMBTC compressed | No | Yes | SIS, steganography |
In order to compare with the scheme proposed by Wu et al. [29], we analyze the experiments of (2, 2) threshold and (2,5) threshold in detail above. Herein, we adopt PSNR and SSIM to evaluate the visual quality of the recovered secret image. In our scheme, (k,n) threshold are used to do the test of the proposed scheme, among which k and n both range from 2 to 8.
We have tested the influence of n on the quality of the recovered secret image when k is a constant, and the influence of k on the quality of the recovered secret image when n is a constant, as shown in Figure 4(a)-4(c).
We have tested that when k is constant, the impact of n changes on recovered secret image quality and when n is constant, the impact of k changes on recovered secret image, which is demonstrared in Figure 4(a)-4(c). Among them, Figure 4(a) shows when k is constant, the visual quality of the recovered secret image decreases as n increases. Figure 4(b) shows when n is constant, the visual quality of the recovered secret image increases as k increases. The content shown in Figure 4(c) is consistent with the experimental result of Figure 4(a) and 4(b).
In this subsection, we compare the proposed method with other related schemes, and the content is shown in Table 5. The reason why we choose the listed schemes is that they are all secret sharing schemes of AMBTC compression, and for several of them the key technology is VSS.
The same evaluation index ER(Embedding rate) is adopted to evaluate the embedding ability, which is calculated by Eq (4.1). It is obvious that ER is expected to be as large as possible. Compared with other methods, the proposed scheme has no pixel expansion, and after the sharing process, it can generate different stego images which is convenient for the management of these images. The scheme proposed by Yang and Wu et al. [27] requires the users to manage multiple shadows. With the increase of k and n, it is a more and more annoying disadvantage.
Owing to the fact that we employ the VSS, the pleasant advantage of our scheme is that the algorithm for the whole process is relatively simple and does not require a lot of calculations. Meanwhile, when the threshold is (k,k), the bitmap of secret image can be recovered losslessly, and the slight degradation of image quality is only related to the compression algorithm itself. In other cases, the decrypted image and the cover images can be recovered with satisfactory image quality. Meanwhile, the proposed scheme has no authentication capability, which will be the future work of our scheme.
ER=number of shared bitsnumber of bits in stego image | (4.1) |
The experimental results show that the quality of the stego images and the recovered secret image are better than the scheme proposed by Wu et al. [29]. And the value of ER is acceptable compared with other secret sharing schemes of AMBTC. Our scheme has total supremacy in the time cost, pixel expansion and meaningful shadows generation.
However, our scheme has no authentication capability. Moreover, we only do the secret image sharing of the AMBTC compressed image bitmap, and the quantization levels need to be saved by the dealer, which may cause security problems. In the future work, we will consider sharing the bitmap and quantization levels at the same time, as well as providing authentication function.
In this paper, an AMBTC-based visual secret image sharing scheme with meaningful shadows is proposed. Firstly, the secret image and n cover images are compressed into bitmaps and quantization levels. Then, in the sharing phase, the information of the secret image bitmap is hidden in the bitmaps of cover images. Finally, by obtaining enough shadow images, the secret image bitmap is recovered by XOR operation. There is no pixel expansion and the shadow images are meaningful, which are the biggest advantages of the paper. The experimental results and theoretical analysis prove the effectiveness of the proposed scheme, and the visual quality and security of the scheme are satisfactory.
However, only the bitmap of AMBTC compressed image is shared according to the principle of VSS, and the quantization levels need to be saved by the dealer, which may lead to security problems. Moreover, our scheme has no authentication capability. In the future, we will consider the sharing of the bitmap and quantization levels at the same time. Besides, we plan to provide authentication function in the future.
This work is supported by the Program of the National University of Defense Technology and the National Natural Science Foundation of China (Number: 61602491).
The authors declared that they have no conflict of interest, nor any commercial or associative interest conflict in relation to the submitted work.
[1] |
G. Dimarco, L. Pareschi, G. Toscani, M. Zanella, Wealth distribution under the spread of infectious diseases, Phys. Rev. E, 102 (2020), 022303. doi: 10.1103/PhysRevE.102.022303
![]() |
[2] | C. Favero, A. Ichino, A. Rustichini, Restarting the Economy While Saving Lives Under COVID-19, CEPR Discussion Paper No. DP14664, 2020, Available from: https://ssrn.com/abstract = 3580626. |
[3] |
M. Gatto, E. Bertuzzo, L. Mari, S. Miccoli, L. Carraro, R. Casagrandi, et al., Spread and dynamics of the COVID-19 epidemic in Italy: Effects of emergency containment measures, PNAS, 117 (2020), 10484–10491. doi: 10.1073/pnas.2004978117
![]() |
[4] |
S. Khajanchi, K. Sarkar, Forecasting the daily and cumulative number of cases for the COVID-19 pandemic in India, Chaos, 30 (2020), 071101. doi: 10.1063/5.0016240
![]() |
[5] |
S. Khajanchi, S. Bera, T. K. Roy, Mathematical analysis of the global dynamics of a HTLV-I infection model, considering the role of cytotoxic T-lymphocytes, Math. Comput. Simul., 180 (2021), 354–378. doi: 10.1016/j.matcom.2020.09.009
![]() |
[6] |
Q. Lin, S. Zhao, D. Gao, Y. Lou, S. Yang, S. S. Musa, et al., A conceptual model for the coronavirus disease 2019 (COVID-19) outbreak in Wuhan, China with individual reaction and governmental action, Int. J. Infect. Dis., 93 (2020), 211–216. doi: 10.1016/j.ijid.2020.02.058
![]() |
[7] |
P. Samui, J. Mondal, S. Khajanchi, A mathematical model for COVID-19 transmission dynamics with a case study of India, Chaos Solit. Fractals., 140 (2020), 110173. doi: 10.1016/j.chaos.2020.110173
![]() |
[8] |
B. Tang, X. Wang, Q. Li, N. L. Bragazzi, S. Tang, Y. Xiao, et al., Estimation of the Transmission Risk of the 2019-nCoV and Its Implication for Public Health Interventions, J. Clin. Med., 9 (2020), 462. doi: 10.3390/jcm9020462
![]() |
[9] |
B. Buonomo, R. Della Marca, Effects of information-induced behavioural changes during the COVID-19 lockdowns: the case of Italy, R. Soc. Open Sci., 7 (2020), 201635. doi: 10.1098/rsos.201635
![]() |
[10] | R. K. Rai, S. Khajanchi, P. K. Tiwari, E. Venturino, A. K. Misra, Impact of social media advertisements on the transmission dynamics of COVID-19 pandemic in India, J. Appl. Math. Comput., (2021), 1-26. |
[11] |
C. Castillo-Chavez, H. W. Hethcote, V. Andreasen, S. A. Levin, W. M. Liu, Epidemiological models with age structure, proportionate mixing, and cross-immunity, J. Math. Biol., 27 (1989), 233–258. doi: 10.1007/BF00275810
![]() |
[12] |
A. Franceschetti, A. Pugliese, Threshold behaviour of a SIR epidemic model with age structure and immigration, J. Math. Biol., 57 (2008), 1–27. doi: 10.1007/s00285-007-0143-1
![]() |
[13] | H. W. Hethcote, Modeling heterogeneous mixing in infectious disease dynamics, In Models for Infectious Human Diseases, (eds. V. Isham and G. F. H. Medley), Cambridge University Press, Cambridge, UK, (1996), pp. 215–238. |
[14] |
H. W. Hethcote, The mathematics of infectious diseases, SIAM Rev., 42 (2000), 599–653. doi: 10.1137/S0036144500371907
![]() |
[15] |
M. Iannelli, F. A. Milner, A. Pugliese, Analytical and numerical results for the age-structured S-I-S epidemic model with mixed inter-intracohort transmission, SIAM J. Math. Anal., 23 (1992), 662–688. doi: 10.1137/0523034
![]() |
[16] |
K. M. A. Kabir, J. Tanimoto, Evolutionary game theory modelling to represent the behavioural dynamics of economic shutdowns and shield immunity in the COVID-19 pandemic, R. Soc. Open Sci., 7 (2020), 201095. doi: 10.1098/rsos.201095
![]() |
[17] |
W. O. Kermack, A. G. McKendrick, A Contribution to the Mathematical Theory of Epidemics, Proc. Roy. Soc. Lond. A, 115 (1927), 700–721. doi: 10.1098/rspa.1927.0118
![]() |
[18] |
G. Albi, M. Herty, L. Pareschi, Kinetic description of optimal control problems and applications to opinion consensus, Commun. Math. Sci., 13 (2015), 1407–1429. doi: 10.4310/CMS.2015.v13.n6.a3
![]() |
[19] | G. Albi, L. Pareschi, Selective model-predictive control for flocking systems, Commun. Appl. Ind. Math., 9 (2018), 4–21. |
[20] | G. Albi, L. Pareschi, M. Zanella, Uncertainty quantification in control problems for flocking models, Math. Probl. Eng., 2015 (2015), ID 850124. |
[21] |
M. Bongini, M. Fornasier, D. Kalise, (Un)conditional consensus emergence under perturbed and decentralized feedback controls, Discrete Contin. Dyn. Syst., 35 (2015), 4071–4094. doi: 10.3934/dcds.2015.35.4071
![]() |
[22] | G. Dimarco, B. Perthame, G. Toscani, M. Zanella, Kinetic models for epidemic dynamics with social heterogeneity, J. Math. Biol., 83 (2021), 1–32. |
[23] | B. Düring, L. Pareschi, G. Toscani, Kinetic models for optimal control of wealth inequalities, Eur. Phys. J. B, 91 (2018), Article No. 265. |
[24] |
Z. Wang, C. T. Bauch, S. Bhattacharyya, A. d'Onofrio, P. Manfredi, M. Perc, et al., Statistical physics of vaccination, Phys. Rep., 664 (2016), 1–113. doi: 10.1016/j.physrep.2016.10.006
![]() |
[25] | K. Jagodnik, F. Ray, F. M. Giorgi, A. Lachmann, Correcting under-reported COVID-19 case numbers: estimating the true scale of the pandemic, (2020), in press. |
[26] | K. Mizumoto, K. Kagaya, A. Zarebski, G. Chowell, Estimating the asymptomatic proportion of coronavirus disease 2019 (COVID-19) cases on board the Diamond Princess cruise ship, Yokohama, Japan, 2020, Euro. Surveill., 25 (2020), 2000180. |
[27] |
S. Zhang, M. Diao, W. Yu, L. Pei, Z. Lin, D. Chen, Estimation of the reproductive number of novel coronavirus (COVID-19) and the probable outbreak size on the Diamond Princess cruise ship: A data-driven analysis, Int. J. Infect. Dis., 93 (2020), 201–204. doi: 10.1016/j.ijid.2020.02.033
![]() |
[28] |
G. Béraud, S. Kazmercziak, P. Beutels, D. Levy-Bruhl, X. Lenne, N. Mielcarek, et al., The French connection: The first large population-based contact survey in France relevant for the spread of infectious diseases, PLoS ONE, 10 (2015), e0133203. doi: 10.1371/journal.pone.0133203
![]() |
[29] |
J. Glasser, Z. Feng, A. Moylan, S. Del Valle, C. Castillo-Chavez, Mixing in age-structured population models of infectious diseases, Math. Bios., 235 (2012), 1–7. doi: 10.1016/j.mbs.2011.10.001
![]() |
[30] |
K. M. A. Kabir, T. Risa, J. Tanimoto, Prosocial behavior of wearing a mask during an epidemic: an evolutionary explanation, Scientific Reports, 11 (2021), 12621. doi: 10.1038/s41598-021-92094-2
![]() |
[31] |
J. Mossong, N. Hens, M. Jit, P. Beutels, K. Auranen, R. Mikolajczyk, et al., Social contacts and mixing patterns relevant to the spread of infectious diseases, PLoS Med., 5 (2008), e75. doi: 10.1371/journal.pmed.0050075
![]() |
[32] | K. Prem, A. R. Cook, M. Jit, Projecting social contact matrices in 152 countries using contact surveys and demographic data, PLoS ONE, 13 (2017), e1005697. |
[33] |
A. Capaldi, S. Behrend, B. Berman, J. Smith, J. Wright, A. L. Lloyd, Parameter estimation and uncertainty quantification for an epidemic model, Math. Biosci. Eng., 9 (2012), 553–576. doi: 10.3934/mbe.2012.9.553
![]() |
[34] |
M. A. Capistrán, J. A. Christen, J. X. Velasco-Hernández, Towards uncertainty quantification and inference in the stochastic SIR epidemic model, Math. Biosci., 240 (2012), 250–259. doi: 10.1016/j.mbs.2012.08.005
![]() |
[35] | G. Chowell, Fitting dynamic models to epidemic outbreaks with quantified uncertainty: A primer for parameter uncertainty, identifiability, and forecasts, Infect. Dis. Model., 2 (2017), 379–398. |
[36] |
M. G. Roberts, Epidemic models with uncertainty in the reproduction, J. Math. Biol., 66 (2013), 1463–1474. doi: 10.1007/s00285-012-0540-y
![]() |
[37] |
G. Albi, L. Pareschi, M. Zanella, Control with uncertain data of socially structured compartmental epidemic models, J. Math. Biol., 82 (2021), 1–41. doi: 10.1007/s00285-021-01560-y
![]() |
[38] | G. Dimarco, L. Pareschi, M. Zanella, Uncertainty quantification for kinetic models in socio-economic and life sciences. In Uncertainty Quantification for Hyperbolic and Kinetic Equations, (Eds. S. Jin, and L. Pareschi), SEMA SIMAI Springer Series, vol. 14, (2017), 151–191. |
[39] | L. Pareschi, An introduction to uncertainty quantification for kinetic equations and related problems, In Trails in Kinetic Theory: Foundational Aspects and Numerical Methods, (Eds. G. Albi, S. Merino-Aceituno, A. Nota, M. Zanella), SEMA-SIMAI Springer Series vol. 25, (2021), 141–181. |
[40] | D. Xiu, Numerical Methods for Stochastic Computations: A Spectral Methods Approach, Princeton University Press, 2010. |
[41] |
M. Barro, A. Guiro, D. Ouedraogo, Optimal control of a SIR epidemic model with general incidence function and a time delays, Cubo, 20 (2018), 53–66. doi: 10.4067/S0719-06462018000200053
![]() |
[42] |
L. Bolzoni, E. Bonacini, C. Soresina, M. Groppi, Time-optimal control strategies in SIR epidemic models, Math. Biosci., 292 (2017), 86–96. doi: 10.1016/j.mbs.2017.07.011
![]() |
[43] | R. M. Colombo, M. Garavello, Optimizing vaccination strategies in an age structured SIR model, Math. Bios. Eng., 17 (2019), 1074–1089. |
[44] |
A. d'Onofrio, P. Manfredi, E. Salinelli, Vaccinating behaviour, information, and the dynamics of SIR vaccine preventable diseases, Theor. Popul. Biol., 71 (2007), 301–317. doi: 10.1016/j.tpb.2007.01.001
![]() |
[45] | E. Franco, A feedback SIR (fSIR) model highlights advantages and limitations of infection-based social distancing, arXiv preprint arXiv: 2004.13216 (2020). |
[46] |
S. Lee, G. Chowell, C. Castillo-Chávez, Optimal control for pandemic influenza: the role of limited antiviral treatment and isolation, J. Theor. Biol., 265 (2010), 136–150. doi: 10.1016/j.jtbi.2010.04.003
![]() |
[47] |
S. Lee, M. Golinski, G. Chowell, Modeling optimal age-specific vaccination strategies against pandemic influenza, Bull. Math. Biol., 74 (2012), 958–980. doi: 10.1007/s11538-011-9704-y
![]() |
[48] |
R. Dutta, S. Gomes, D. Kalise, L. Pacchiardi, Using mobility data in the design of optimal lockdown strategies for the COVID-19 pandemic, PLOS Comput. Biol., 17 (2021), e1009236. doi: 10.1371/journal.pcbi.1009236
![]() |
[49] | S. Flaxman, S. Mishra, A. Gandy, H. Unwin, H. Coupland, T. Mellan, et al., Estimating the number of infections and the impact of non-pharmaceutical interventions on COVID-19 in 11 European countries, Report 13. Imperial College COVID-19 Response Team, 30 March 2020. |
[50] | S. Khajanchi, K. Sarkar, J. Mondal, K. S. Nisar, S. F. Abdelwahab, Mathematical modeling of the COVID-19 pandemic with intervention strategies, Res. Phys., 25 (2021), 104285. |
[51] |
F. Lin, K. Muthuraman, M. Lawley, An optimal control theory approach to non-pharmaceutical interventions, BMC Infect. Dis., 10 (2010), 32. doi: 10.1186/1471-2334-10-32
![]() |
[52] | D. H. Morris, F. W. Rossine, J. B. Plotkin, S. A. Levin, Optimal, near-optimal, and robust epidemic control, Commun. Phys., 4 (2021), 1–8. |
[53] |
G. Bertaglia, L. Pareschi, Hyperbolic models for the spread of epidemics on networks: kinetic description and numerical methods, ESAIM: Math. Model. Numer. Anal., 55 (2021), 381–407. doi: 10.1051/m2an/2020082
![]() |
[54] | G. Bertaglia, L. Pareschi, Hyperbolic compartmental models for epidemic spread on networks with uncertain data: application to the emergence of COVID-19 in Italy, Math. Mod. Meth. App. Sci., (2021), in press. |
[55] | W. Boscheri, G. Dimarco, L. Pareschi, Modeling and simulating the spatial spread of an epidemic through multiscale kinetic equations, Math. Mod. Meth. App. Sci., (2021), 1–39. |
[56] |
V. Capasso, G. Serio, A generalization of the Kermack-McKendrick deterministic epidemic model, Math. Biosci., 42 (1978), 43–61. doi: 10.1016/0025-5564(78)90006-8
![]() |
[57] |
J. Chen, H. Lu, G. Melino, S. Boccia, M. Piacentini, W. Ricciardi, et al., COVID-19 infection: the China and Italy perspectives, Cell Death Dis., 11 (2020), 1–17. doi: 10.1038/s41419-019-2182-0
![]() |
[58] |
E. Dong, H. Du, L. Gardner, An interactive web-based dashboard to track COVID-19 in real time, Lancet Infect. Dis., 20 (2020), 533–534. doi: 10.1016/S1473-3099(20)30120-1
![]() |
[59] |
G. Giordano, F. Blanchini, R. Bruno, P. Colaneri, A. Di Filippo, A. Di Matteo, et al., Modelling the COVID-19 epidemic and implementation of population-wide interventions in Italy, Nat. Med., 26 (2020), 855–860. doi: 10.1038/s41591-020-0883-7
![]() |
[60] |
A. Korobeinikov, P. K. Maini, Non-linear incidence and stability of infectious disease models, Math. Med. Biol., 22 (2005), 113–128. doi: 10.1093/imammb/dqi001
![]() |
[61] |
E. Lavezzo, E. Franchin, C. Ciavarella, G. Cuomo-Dannenburg, L. Barzon, C. Del Vecchio, et al., Suppression of a SARS-CoV-2 outbreak in the Italian municipality of Vo', Nature, 584 (2020), 425–429, doi: 10.1038/s41586-020-2488-1
![]() |
[62] |
X. Liu, P. Stechlinski, Infectious disease models with time-varying parameters and general nonlinear incidence rate, Appl. Math. Model., 36 (2012), 1974–1994. doi: 10.1016/j.apm.2011.08.019
![]() |
[63] | Y. Liu, A. A. Gayle, A. Wilder-Smith, J. Rocklöv, The reproductive number of COVID-19 is higher compared to SARS coronavirus, J. Travel Med., 27 (2020), 1–4. |
[64] | G. Rinaldi, M. Paradisi, An empirical estimate of the infection fatality rate of COVID-19 from the first Italian outbreak, (2020), in press. |
[65] | T. W. Russell, J. Hellewell, C. I. Jarvis, K. van Zandvoort, S. Abbott, R. Ratnayake, et al., Estimating the infection and case fatality ratio for coronavirus disease (COVID-19) using age-adjusted data from the outbreak on the Diamond Princess cruise ship, Euro. Surveill., 25 (2020), 2000256. |
[66] | X. Tang, S. S. Musa, S. Zhao, S. Mei, D. He, Using Proper Mean Generation Intervals in Modeling of COVID-19, Front. Public Health, 9 (2020), 691262. |
[67] |
S. Wang, F. Zhong, W. Bao, Y. Li, L. Liu, H. Wang, et al., Age-dependent risks of Incidence and Mortality of COVID- 19 in Hubei Province and Other Parts of China Hongdou, Front. Med., 7 (2020), 190. doi: 10.3389/fmed.2020.00190
![]() |
[68] |
M. Zanella, C. Bardelli, M. Azzi, S. Deandrea, P. Perotti, S. Silva, et al., Social contacts, epidemic spreading and health system. Mathematical modeling and applications to COVID-19 infection, Math. Biosci. Eng., 18 (2021), 3384–3403. doi: 10.3934/mbe.2021169
![]() |
1. | Joachim von Below, José A. Lubary, 2020, Chapter 1, 978-3-030-44096-1, 1, 10.1007/978-3-030-44097-8_1 | |
2. | Yuta Ishii, Multi-spike Patterns for the Gierer-Meinhardt Model with Heterogeneity on Y-shaped Metric Graph, 2022, 1040-7294, 10.1007/s10884-022-10157-y |
![]() |
BMP | AMBTC | DCT | DWT |
CR | 1 | 4 | 10-40 | 4-40 |
CS | Fastest | Fast | Slower | Slowest |
RSB | Wide | Narrow | Narrower | Narrowest |
IQ | Best | Good | Quite Good | Better |
Notations | Decriptions |
k | The minimum number of shadow images (bitmaps) need to be obtained in recovery phase. |
t | The number of stego shadow images actually obtained by the dealer in recovery phase. |
n | The number of cover images used in sharing phase and the total number of shadow images. |
t×t | The block size used in AMBTC compression. |
i | The i-th block of the image. |
SCi | Substitute the shadow images with L and H. |
M×N | The size of the bmp image. |
Vi | The average pixel value of the current block. |
Hi | In the current block, the high quantization level, in other words, the pixels higher than the average pixel value are averaged. |
Li | In the current block, the low quantization level, in other words, the pixel lower than the average pixel value are averaged. |
H | The set of Hi, and we save it with images. |
L | The set of Li, and we save it with images.. |
BMi,j | The value of the bitmap in the position of i,j. |
BM | The entire bitmap of the image. |
Algorithm 1: The compression algorithm of secret image and cover images. |
Input: An original BMP image of size M×N. |
Output:BM, H and L. |
Step 1:Divide the picture into 4×4 blocks. |
Step 2:For each block (i,j)∈{(i,j)|1≤i≤M4,1≤j≤N4}, repeat Steps 3-4 (the commonly used image size is an integral multiple of four). |
Step 3: Calculate Vi of each block, take the average value of the pixel value less than Vi and the average value of the pixel value greater than Vi as L and H respectively. |
Step 4:The position of the pixel value less than Vi is recorded as "0", and greater than Vi is recorded as "1" in the bitmap. |
Step 5:Output BM, H and L. |
Algorithm 2: Bitmaps sharing algorithm. |
Input: BM of the secret image and BMs of n cover images. |
Output: SCi(i=1,2,⋯,n). |
Step 1:For each pixel of the secret image bitmap, repeat Steps 2-4. |
Step 2:Randomly select k of n cover images, and calculate the XOR result of their BMi,j. |
Step 3:If the result is equal to the BMi,j of the secret image, return to step 1. Otherwise, go to step 4. |
Step 4:Randomly select one of the k images in step 2, and flip its BMi,j. |
Step 5:Substitute H and L of each cover image generated in the compression process into the shadow images obtained in Step 4. |
Step 6:Output SCi(i=1,2,⋯,n). |
Algorithm 3: Recovery algorithm of the secret image and cover images. |
Input: t(k≤t≤n) stego images, H and L of secret image and cover images. |
Output: The recovered image and n recovered cover images. |
Step 1:Take the XOR result of the t stego images' BM as the bitmap of the recovered image. |
Step 2:Take t shadow images as the bitmaps of the recovered cover images. |
Step 3: For t+1 bitmaps, replace the bitmaps with the corresponding H and L generated in the compression phase. |
Step 4:The gray srcret image and t cover images are recovered. |
Cover images in Figure 2 | PSNRS−A(dB) of stego image 1 | PSNRS−A(dB) of stego image 2 |
(a) (b) | 35.0359 | 34.4229 |
(c) (d) | 34.7117 | 39.6069 |
(e) (f) | 36.8109 | 35.4058 |
(g) (h) | 34.8926 | 33.6556 |
Stego image | PSNRA−O | PSNRS−O | PSNRS−A | |||
Our method | Wu et al. [29] | Our method | Wu et al. [29] | Our method | Wu et al. [29] | |
1 | 32.8368 | 29.3867 | 32.2722 | 24.6240 | 39.0208 | 26.4169 |
2 | 34.5202 | 29.3867 | 33.4245 | 24.6231 | 38.3990 | 26.4100 |
3 | 35.2864 | 29.3867 | 34.0183 | 24.6551 | 38.6779 | 26.4324 |
4 | 41.1087 | 29.3867 | 39.4648 | 24.6125 | 43.6731 | 26.4180 |
5 | 35.9097 | 29.3867 | 35.0476 | 24.6051 | 40.8447 | 26.4001 |
Schemes | Key technique | ER | Stego image format | Pixel expansion | Reversible | Functionality |
Ref. [27] | VSS, AMBTC | 0.5 | AMBTC compressed | 16 times | Yes | SIS, steganography |
Ref. [5] | VSS, AMBTC | − | AMBTC compressed | 16 times | Yes, partial. | Stacking-to-see decryption |
Ref. [28] | PSIS, HMAC, AMBTC | 0.25 | AMBTC compressed | 2 times | Yes | SIS, authentication, steganography |
Ref. [29] | PSIS, HMAC, AMBTC | 0.25 | AMBTC compressed | 8 times | Yes, partial. | SIS, authentication, steganography |
Our | VSS, AMBTC | 0.5 | AMBTC compressed | No | Yes | SIS, steganography |
![]() |
BMP | AMBTC | DCT | DWT |
CR | 1 | 4 | 10-40 | 4-40 |
CS | Fastest | Fast | Slower | Slowest |
RSB | Wide | Narrow | Narrower | Narrowest |
IQ | Best | Good | Quite Good | Better |
Notations | Decriptions |
k | The minimum number of shadow images (bitmaps) need to be obtained in recovery phase. |
t | The number of stego shadow images actually obtained by the dealer in recovery phase. |
n | The number of cover images used in sharing phase and the total number of shadow images. |
t×t | The block size used in AMBTC compression. |
i | The i-th block of the image. |
SCi | Substitute the shadow images with L and H. |
M×N | The size of the bmp image. |
Vi | The average pixel value of the current block. |
Hi | In the current block, the high quantization level, in other words, the pixels higher than the average pixel value are averaged. |
Li | In the current block, the low quantization level, in other words, the pixel lower than the average pixel value are averaged. |
H | The set of Hi, and we save it with images. |
L | The set of Li, and we save it with images.. |
BMi,j | The value of the bitmap in the position of i,j. |
BM | The entire bitmap of the image. |
Algorithm 1: The compression algorithm of secret image and cover images. |
Input: An original BMP image of size M×N. |
Output:BM, H and L. |
Step 1:Divide the picture into 4×4 blocks. |
Step 2:For each block (i,j)∈{(i,j)|1≤i≤M4,1≤j≤N4}, repeat Steps 3-4 (the commonly used image size is an integral multiple of four). |
Step 3: Calculate Vi of each block, take the average value of the pixel value less than Vi and the average value of the pixel value greater than Vi as L and H respectively. |
Step 4:The position of the pixel value less than Vi is recorded as "0", and greater than Vi is recorded as "1" in the bitmap. |
Step 5:Output BM, H and L. |
Algorithm 2: Bitmaps sharing algorithm. |
Input: BM of the secret image and BMs of n cover images. |
Output: SCi(i=1,2,⋯,n). |
Step 1:For each pixel of the secret image bitmap, repeat Steps 2-4. |
Step 2:Randomly select k of n cover images, and calculate the XOR result of their BMi,j. |
Step 3:If the result is equal to the BMi,j of the secret image, return to step 1. Otherwise, go to step 4. |
Step 4:Randomly select one of the k images in step 2, and flip its BMi,j. |
Step 5:Substitute H and L of each cover image generated in the compression process into the shadow images obtained in Step 4. |
Step 6:Output SCi(i=1,2,⋯,n). |
Algorithm 3: Recovery algorithm of the secret image and cover images. |
Input: t(k≤t≤n) stego images, H and L of secret image and cover images. |
Output: The recovered image and n recovered cover images. |
Step 1:Take the XOR result of the t stego images' BM as the bitmap of the recovered image. |
Step 2:Take t shadow images as the bitmaps of the recovered cover images. |
Step 3: For t+1 bitmaps, replace the bitmaps with the corresponding H and L generated in the compression phase. |
Step 4:The gray srcret image and t cover images are recovered. |
Cover images in Figure 2 | PSNRS−A(dB) of stego image 1 | PSNRS−A(dB) of stego image 2 |
(a) (b) | 35.0359 | 34.4229 |
(c) (d) | 34.7117 | 39.6069 |
(e) (f) | 36.8109 | 35.4058 |
(g) (h) | 34.8926 | 33.6556 |
Stego image | PSNRA−O | PSNRS−O | PSNRS−A | |||
Our method | Wu et al. [29] | Our method | Wu et al. [29] | Our method | Wu et al. [29] | |
1 | 32.8368 | 29.3867 | 32.2722 | 24.6240 | 39.0208 | 26.4169 |
2 | 34.5202 | 29.3867 | 33.4245 | 24.6231 | 38.3990 | 26.4100 |
3 | 35.2864 | 29.3867 | 34.0183 | 24.6551 | 38.6779 | 26.4324 |
4 | 41.1087 | 29.3867 | 39.4648 | 24.6125 | 43.6731 | 26.4180 |
5 | 35.9097 | 29.3867 | 35.0476 | 24.6051 | 40.8447 | 26.4001 |
Schemes | Key technique | ER | Stego image format | Pixel expansion | Reversible | Functionality |
Ref. [27] | VSS, AMBTC | 0.5 | AMBTC compressed | 16 times | Yes | SIS, steganography |
Ref. [5] | VSS, AMBTC | − | AMBTC compressed | 16 times | Yes, partial. | Stacking-to-see decryption |
Ref. [28] | PSIS, HMAC, AMBTC | 0.25 | AMBTC compressed | 2 times | Yes | SIS, authentication, steganography |
Ref. [29] | PSIS, HMAC, AMBTC | 0.25 | AMBTC compressed | 8 times | Yes, partial. | SIS, authentication, steganography |
Our | VSS, AMBTC | 0.5 | AMBTC compressed | No | Yes | SIS, steganography |