A Novel Progressive Secret Image Sharing Method with Better Robustness | SpringerLink
Skip to main content

A Novel Progressive Secret Image Sharing Method with Better Robustness

  • Conference paper
  • First Online:
Data Science (ICPCSEE 2017)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 728))

  • 1644 Accesses

Abstract

Secret image sharing (SIS) can be utilized to protect a secret image during transmit in the public channels. However, classic SIS schemes, e.g., visual secret sharing (VSS) and polynomial-based scheme, are not suitable for progressive encryption of greyscale images in noisy environment, since they will result in different problems, such as lossy recovery, pixel expansion, complex computation, “All-or-Nothing” and robustness. In this paper, a novel progressive secret sharing (PSS) method based on the linear congruence equation, namely LCPSS, is proposed to solve these problems. LCPSS is simple designed and easy to realize, but naturally has many great properties, e.g., (kn) threshold, progressive recovery, lossless recovery, lack of robustness and simple computation. Experimental results are given to demonstrate the validity of LCPSS.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 5719
Price includes VAT (Japan)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
JPY 7149
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Visual cryptography for general access structures. Inf. Comput. 129(2), 86–106 (1996)

    Article  MathSciNet  MATH  Google Scholar 

  2. Blundo, C., De Santis, A., Naor, M.: Visual cryptography for grey level images. Inf. Process. Lett. 75(6), 255–259 (2000)

    Article  MathSciNet  MATH  Google Scholar 

  3. Cevallos, A., Fehr, S., Ostrovsky, R., Rabani, Y.: Unconditionally-secure robust secret sharing with compact shares. In: Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. LNCS, vol. 7237, pp. 195–208. Springer, Heidelberg (2012). doi:10.1007/978-3-642-29011-4_13

    Chapter  Google Scholar 

  4. Chang, C.C., Hsieh, Y.P., Lin, C.H.: Sharing secrets in stego images with authentication. Pattern Recogn. 41(10), 3130–3137 (2008)

    Article  MATH  Google Scholar 

  5. Chen, S.K.: Friendly progressive visual secret sharing using generalized random grids. Opt. Eng. 48(11), 117001 (2009)

    Article  Google Scholar 

  6. Chen, S.K., Lin, J.C.: Fault-tolerant and progressive transmission of images. Pattern Recogn. 38(12), 2466–2471 (2005)

    Article  Google Scholar 

  7. Cramer, R., Damgård, I.B., Döttling, N., Fehr, S., Spini, G.: Linear secret sharing schemes from error correcting codes and universal hash functions. In: Oswald, E., Fischlin, M. (eds.) EUROCRYPT 2015. LNCS, vol. 9057, pp. 313–336. Springer, Heidelberg (2015). doi:10.1007/978-3-662-46803-6_11

    Google Scholar 

  8. Guo, T., Liu, F., Wu, C.: Threshold visual secret sharing by random grids with improved contrast. J. Syst. Softw. 86(8), 2094–2109 (2013)

    Article  Google Scholar 

  9. Hou, Y.C., Quan, Z.Y., Tsai, C.F., Tseng, A.Y.: Block-based progressive visual secret sharing. Inf. Sci. 233, 290–304 (2013)

    Article  Google Scholar 

  10. Huang, C.P., Hsieh, C.H., Huang, P.S.: Progressive sharing for a secret image. J. Syst. Softw. 83(3), 517–527 (2010)

    Article  Google Scholar 

  11. Li, P., Ma, P.J., Su, X.H., Yang, C.N.: Improvements of a two-in-one image secret sharing scheme based on gray mixing model. J. Vis. Commun. Image Represent. 23(3), 441–453 (2012)

    Article  Google Scholar 

  12. Liu, F., Wu, C.: Embedded extended visual cryptography schemes. IEEE Trans. Inf. Forensics Secur. 6(2), 307–322 (2011)

    Article  Google Scholar 

  13. Liu, F., Wu, C.K., Lin, X.J.: Colour visual cryptography schemes. IET Inf. Secur. 2(4), 151–165 (2008)

    Article  Google Scholar 

  14. Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995). doi:10.1007/BFb0053419

    Google Scholar 

  15. Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)

    Article  MathSciNet  MATH  Google Scholar 

  16. Shen, G., Liu, F., Fu, Z., Yu, B.: Perfect contrast XOR-based visual cryptography schemes via linear algebra. Des. Codes Crypt. 85(1), 15–37 (2017)

    Article  MathSciNet  Google Scholar 

  17. Thien, C.C., Lin, J.C.: Secret image sharing. Comput. Graph. 26(5), 765–770 (2002)

    Article  Google Scholar 

  18. Tuyls, P., Hollmann, H.D., Van Lint, J.H., Tolhuizen, L.: XOR-based visual cryptography schemes. Des. Codes Crypt. 37(1), 169–186 (2005)

    Article  MathSciNet  MATH  Google Scholar 

  19. Wang, R.Z., Su, C.H.: Secret image sharing with smaller shadow images. Pattern Recogn. Lett. 27(6), 551–555 (2006)

    Article  Google Scholar 

  20. Wu, X., Ou, D., Liang, Q., Sun, W.: A user-friendly secret image sharing scheme with reversible steganography based on cellular automata. J. Syst. Softw. 85(8), 1852–1863 (2012)

    Article  Google Scholar 

  21. Yan, X., Liu, X., Yang, C.N.: An enhanced threshold visual secret sharing based on random grids. J. Real-Time Image Process. 1–13 (2015)

    Google Scholar 

  22. Yan, X., Wang, S., El-Latif, A.A.A., Sang, J., Niu, X.: A novel perceptual secret sharing scheme. In: Shi, Y.Q., Liu, F., Yan, W. (eds.) Transactions on Data Hiding and Multimedia Security IX. LNCS, vol. 8363, pp. 68–90. Springer, Heidelberg (2014). doi:10.1007/978-3-642-55046-1_5

    Chapter  Google Scholar 

  23. Yan, X., Wang, S., Niu, X., Yang, C.N.: Generalized random grids-based threshold visual cryptography with meaningful shares. Sig. Process. 109, 317–333 (2015)

    Article  Google Scholar 

  24. Yang, C.N.: New visual secret sharing schemes using probabilistic method. Pattern Recogn. Lett. 25(4), 481–494 (2004)

    Article  Google Scholar 

  25. Yang, C.N., Chen, T.S., Yu, K.H., Wang, C.C.: Improvements of image sharing with steganography and authentication. J. Syst. Softw. 80(7), 1070–1076 (2007)

    Article  Google Scholar 

Download references

Acknowledgement

The authors would like to thank the anonymous reviewers for their valuable comments. This work is supported by the National Natural Science Foundation of China (Grant Number: 61602491).

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Lintao Liu or Xuehu Yan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Liu, L., Lu, Y., Yan, X., Ding, W. (2017). A Novel Progressive Secret Image Sharing Method with Better Robustness. In: Zou, B., Han, Q., Sun, G., Jing, W., Peng, X., Lu, Z. (eds) Data Science. ICPCSEE 2017. Communications in Computer and Information Science, vol 728. Springer, Singapore. https://doi.org/10.1007/978-981-10-6388-6_46

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-6388-6_46

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-6387-9

  • Online ISBN: 978-981-10-6388-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics