Abstract
Secret image sharing (SIS) can be utilized to protect a secret image during transmit in the public channels. However, classic SIS schemes, e.g., visual secret sharing (VSS) and polynomial-based scheme, are not suitable for progressive encryption of greyscale images in noisy environment, since they will result in different problems, such as lossy recovery, pixel expansion, complex computation, “All-or-Nothing” and robustness. In this paper, a novel progressive secret sharing (PSS) method based on the linear congruence equation, namely LCPSS, is proposed to solve these problems. LCPSS is simple designed and easy to realize, but naturally has many great properties, e.g., (k, n) threshold, progressive recovery, lossless recovery, lack of robustness and simple computation. Experimental results are given to demonstrate the validity of LCPSS.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Visual cryptography for general access structures. Inf. Comput. 129(2), 86–106 (1996)
Blundo, C., De Santis, A., Naor, M.: Visual cryptography for grey level images. Inf. Process. Lett. 75(6), 255–259 (2000)
Cevallos, A., Fehr, S., Ostrovsky, R., Rabani, Y.: Unconditionally-secure robust secret sharing with compact shares. In: Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. LNCS, vol. 7237, pp. 195–208. Springer, Heidelberg (2012). doi:10.1007/978-3-642-29011-4_13
Chang, C.C., Hsieh, Y.P., Lin, C.H.: Sharing secrets in stego images with authentication. Pattern Recogn. 41(10), 3130–3137 (2008)
Chen, S.K.: Friendly progressive visual secret sharing using generalized random grids. Opt. Eng. 48(11), 117001 (2009)
Chen, S.K., Lin, J.C.: Fault-tolerant and progressive transmission of images. Pattern Recogn. 38(12), 2466–2471 (2005)
Cramer, R., Damgård, I.B., Döttling, N., Fehr, S., Spini, G.: Linear secret sharing schemes from error correcting codes and universal hash functions. In: Oswald, E., Fischlin, M. (eds.) EUROCRYPT 2015. LNCS, vol. 9057, pp. 313–336. Springer, Heidelberg (2015). doi:10.1007/978-3-662-46803-6_11
Guo, T., Liu, F., Wu, C.: Threshold visual secret sharing by random grids with improved contrast. J. Syst. Softw. 86(8), 2094–2109 (2013)
Hou, Y.C., Quan, Z.Y., Tsai, C.F., Tseng, A.Y.: Block-based progressive visual secret sharing. Inf. Sci. 233, 290–304 (2013)
Huang, C.P., Hsieh, C.H., Huang, P.S.: Progressive sharing for a secret image. J. Syst. Softw. 83(3), 517–527 (2010)
Li, P., Ma, P.J., Su, X.H., Yang, C.N.: Improvements of a two-in-one image secret sharing scheme based on gray mixing model. J. Vis. Commun. Image Represent. 23(3), 441–453 (2012)
Liu, F., Wu, C.: Embedded extended visual cryptography schemes. IEEE Trans. Inf. Forensics Secur. 6(2), 307–322 (2011)
Liu, F., Wu, C.K., Lin, X.J.: Colour visual cryptography schemes. IET Inf. Secur. 2(4), 151–165 (2008)
Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995). doi:10.1007/BFb0053419
Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)
Shen, G., Liu, F., Fu, Z., Yu, B.: Perfect contrast XOR-based visual cryptography schemes via linear algebra. Des. Codes Crypt. 85(1), 15–37 (2017)
Thien, C.C., Lin, J.C.: Secret image sharing. Comput. Graph. 26(5), 765–770 (2002)
Tuyls, P., Hollmann, H.D., Van Lint, J.H., Tolhuizen, L.: XOR-based visual cryptography schemes. Des. Codes Crypt. 37(1), 169–186 (2005)
Wang, R.Z., Su, C.H.: Secret image sharing with smaller shadow images. Pattern Recogn. Lett. 27(6), 551–555 (2006)
Wu, X., Ou, D., Liang, Q., Sun, W.: A user-friendly secret image sharing scheme with reversible steganography based on cellular automata. J. Syst. Softw. 85(8), 1852–1863 (2012)
Yan, X., Liu, X., Yang, C.N.: An enhanced threshold visual secret sharing based on random grids. J. Real-Time Image Process. 1–13 (2015)
Yan, X., Wang, S., El-Latif, A.A.A., Sang, J., Niu, X.: A novel perceptual secret sharing scheme. In: Shi, Y.Q., Liu, F., Yan, W. (eds.) Transactions on Data Hiding and Multimedia Security IX. LNCS, vol. 8363, pp. 68–90. Springer, Heidelberg (2014). doi:10.1007/978-3-642-55046-1_5
Yan, X., Wang, S., Niu, X., Yang, C.N.: Generalized random grids-based threshold visual cryptography with meaningful shares. Sig. Process. 109, 317–333 (2015)
Yang, C.N.: New visual secret sharing schemes using probabilistic method. Pattern Recogn. Lett. 25(4), 481–494 (2004)
Yang, C.N., Chen, T.S., Yu, K.H., Wang, C.C.: Improvements of image sharing with steganography and authentication. J. Syst. Softw. 80(7), 1070–1076 (2007)
Acknowledgement
The authors would like to thank the anonymous reviewers for their valuable comments. This work is supported by the National Natural Science Foundation of China (Grant Number: 61602491).
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Liu, L., Lu, Y., Yan, X., Ding, W. (2017). A Novel Progressive Secret Image Sharing Method with Better Robustness. In: Zou, B., Han, Q., Sun, G., Jing, W., Peng, X., Lu, Z. (eds) Data Science. ICPCSEE 2017. Communications in Computer and Information Science, vol 728. Springer, Singapore. https://doi.org/10.1007/978-981-10-6388-6_46
Download citation
DOI: https://doi.org/10.1007/978-981-10-6388-6_46
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-6387-9
Online ISBN: 978-981-10-6388-6
eBook Packages: Computer ScienceComputer Science (R0)