Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Reversible Image Secret Sharing

Published: 01 January 2020 Publication History

Abstract

In reversible image secret sharing (RISS), the cover image can be recovered to some degree, and a share can be comprehensible rather than noise-like. Reversible cover images play an important role in law enforcement and medical diagnosis. The comprehensible share can not only reduce the suspicion of attackers but also improve the management efficiency of shares. In this paper, we first provide a formal definition of RISS. Then, we propose an RISS algorithm for a <inline-formula> <tex-math notation="LaTeX">$(k,n)$ </tex-math></inline-formula>-threshold based on the principle of the Chinese remainder theorem-based ISS (CRTISS). In the proposed RISS, the secret image is losslessly decoded by a modular operation, and the original cover image is recovered by a binarization operation, both of which are just simple operations. Theoretical analyses and experiments are provided to validate the proposed definition and algorithm.

References

[1]
Y. Cheng, Z. Fu, and B. Yu, “Improved visual secret sharing scheme for QR code applications,” IEEE Trans. Inf. Forensics Security, vol. 13, no., pp. 2393–2403, Sep. 2018.
[2]
H. Luo, Z. M. Lu, and J. S. Pan, “Multiple watermarking in visual cryptography,” in Proc. Int. Workshop Digit. Watermarking, 2007, pp. 60–70.
[3]
A. A. Abd El-Latif, B. Abd-El-Atty, M. S. Hossain, M. A. Rahman, A. Alamri, and B. B. Gupta, “Efficient quantum information hiding for remote medical image sharing,” IEEE Access, vol. 6, pp. 21075–21083, 2018.
[4]
Y. Li and L. Guo, “Robust image fingerprinting via distortion-resistant sparse coding,” IEEE Signal Process. Lett., vol. 25, no. 1, pp. 140–144, Jan. 2018.
[5]
P. V. Chavan, M. Atique, and L. Malik, “Signature based authentication using contrast enhanced hierarchical visual cryptography,” in Proc. IEEE Students’ Conf. Electr., Electron. Comput. Sci., Mar. 2014, pp. 1–5.
[6]
M. Fukumitsu, S. Hasegawa, J.-Y. Iwazaki, M. Sakai, and D. Takahashi, “A proposal of a secure P2P-type storage scheme by using the secret sharing and the blockchain,” in Proc. IEEE 31st Int. Conf. Adv. Inf. Netw. Appl. (AINA), Mar. 2017, pp. 803–810.
[7]
X. Yan, Y. Lu, L. Liu, S. Wan, W. Ding, and H. Liu, “Exploiting the homomorphic property of visual cryptography,” Int. J. Digit. Crime Forensics, vol. 9, no. 2, pp. 45–56, 2017.
[8]
W. Wang, F. Liu, T. Guo, and Y. Ren, “Temporal integration based visual cryptography scheme and its application,” in Proc. 16th Int. Workshop Digit. Forensics Watermarking (IWDW), in Lecture Notes in Computer Science. Magdeburg, Germany: Springer, Aug. 2017, pp. 406–419.
[9]
S. Zou, Y. Liang, L. Lai, and S. Shamai, “An information theoretic approach to secret sharing,” 2014, arXiv:1404.6474. [Online]. Available: http://arxiv.org/abs/1404.6474
[10]
I. Komargodski, M. Naor, and E. Yogev, “Secret-sharing for NP,” J. Cryptol., vol. 30, no. 2, pp. 444–469, Apr. 2017.
[11]
D. R. Stinson, “An explication of secret sharing schemes,” Des., Codes Cryptogr., vol. 2, no. 4, pp. 357–390, Dec. 1992.
[12]
M. Naor and A. Shamir, “Visual cryptography,” in Advances in Cryptology—EUROCRYPT (Lecture Notes in Computer Science). \Perugia, Italy: Springer, 1995, pp. 1–12.
[13]
G. Wang, F. Liu, and W. Q. Yan, “Basic visual cryptography using braille,” Int. J. Digit. Crime Forensics, vol. 8, no. 3, pp. 85–93, Jul. 2016.
[14]
A. Shamir, “How to share a secret,” Commun. ACM, vol. 22, no. 11, pp. 612–613, Nov. 1979.
[15]
C. Asmuth and J. Bloom, “A modular approach to key safeguarding,” IEEE Trans. Inf. Theory, vol. TIT-29, no. 2, pp. 208–210, Mar. 1983.
[16]
X. Yan, Y. Lu, L. Liu, S. Wan, W. Ding, and H. Liu, “Chinese remainder theorem-based secret image sharing for (k, n) threshold,” in Cloud Computing and Security (Lecture Notes in Computer Science), vol. 10603. Nanjing, China: Springer, Jun. 2017, pp. 433–440. 10.1007/978-3-319-68542-7_36.
[17]
J. Weir and W. Yan, “A comprehensive study of visual cryptography,” in Transactions on Data Hiding and Multimedia Security (Lecture Notes in Computer Science), vol. 6010. Berlin, Germany: Springer-Verlag, 2010, pp. 70–105.
[18]
Z. Wang, G. R. Arce, and G. Di Crescenzo, “Halftone visual cryptography via error diffusion,” IEEE Trans. Inf. Forensics Security, vol. 4, no. 3, pp. 383–396, Sep. 2009.
[19]
Z.-X. Fu and B. Yu, “Visual cryptography and random grids schemes,” in Digital-Forensics and Watermarking. Auckland, New Zealand: Springer, 2014, pp. 109–122.
[20]
T. Guo, F. Liu, and C. Wu, “Threshold visual secret sharing by random grids with improved contrast,” J. Syst. Softw., vol. 86, no. 8, pp. 2094–2109, Aug. 2013.
[21]
X. Yan, X. Liu, and C.-N. Yang, “An enhanced threshold visual secret sharing based on random grids,” J. Real-Time Image Process., vol. 14, no. 1, pp. 61–73, Jan. 2018.
[22]
X. Yan and Y. Lu, “Progressive visual secret sharing for general access structure with multiple decryptions,” Multimedia Tools Appl., vol. 77, no. 2, pp. 2653–2672, Jan. 2018.
[23]
C.-C. Thien and J.-C. Lin, “Secret image sharing,” Comput. Graph., vol. 26, no. 5, pp. 765–770, Oct. 2002.
[24]
C.-N. Yang and C.-B. Ciou, “Image secret sharing method with two-decoding-options: Lossless recovery and previewing capability,” Image Vis. Comput., vol. 28, no. 12, pp. 1600–1610, Dec. 2010.
[25]
Y. Liu, C. Yang, Y. Wang, L. Zhu, and W. Ji, “Cheating identifiable secret sharing scheme using symmetric bivariate polynomial,” Inf. Sci., vol. 453, pp. 21–29, Jul. 2018.
[26]
W. Yan, W. Ding, and Q. Dongxu, “Image sharing based on Chinese remainder theorem,” J. North China Univ. Tech., vol. 12, no. 1, pp. 6–9, 2000.
[27]
S. J. Shyu and Y.-R. Chen, “Threshold secret image sharing by Chinese remainder theorem,” in Proc. IEEE Asia–Pacific Services Comput. Conf., Dec. 2008, pp. 1332–1337.
[28]
M. Ulutas, V. V. Nabiyev, and G. Ulutas, “A new secret image sharing technique based on Asmuth Bloom’s scheme,” in Proc. Int. Conf. Appl. Inf. Commun. Technol., Oct. 2009, pp. 1–5.
[29]
C. Hu, X. Liao, and D. Xiao, “Secret image sharing based on chaotic map and Chinese remainder theorem,” Int. J. Wavelets, Multiresolution Inf. Process., vol. 10, no. 3, May 2012, Art. no.
[30]
T.-W. Chuang, C.-C. Chen, and B. Chien, “Image sharing and recovering based on Chinese remainder theorem,” in Proc. Int. Symp. Comput., Consum. Control (IS3C), Jul. 2016, pp. 817–820.
[31]
C.-C. Chang, N.-T. Huynh, and H.-D. Le, “Lossless and unlimited multi-image sharing based on Chinese remainder theorem and Lagrange interpolation,” Signal Process., vol. 99, pp. 159–170, Jun. 2014. [Online]. Available: http://www.sciencedirect.com/science/article/pii/S0165168413005112
[32]
Z. Ni, Y.-Q. Shi, N. Ansari, and W. Su, “Reversible data hiding,” IEEE Trans. Circuits Syst. Video Technol., vol. 16, no. 3, pp. 354–362, Mar. 2006.
[33]
D. Hou, W. Zhang, J. Liu, S. Zhou, D. Chen, and N. Yu, “Emerging applications of reversible data hiding,” in Proc. 2nd Int. Conf. Image Graph. Process. (ICIGP), Singapore, Feb. 2019, pp. 105–109.
[34]
C.-C. Chang, Y.-P. Hsieh, and C.-H. Lin, “Sharing secrets in stego images with authentication,” Pattern Recognit., vol. 41, no. 10, pp. 3130–3137, Oct. 2008.
[35]
P.-Y. Lin and C.-S. Chan, “Invertible secret image sharing with steganography,” Pattern Recognit. Lett., vol. 31, no. 13, pp. 1887–1893, 2010.
[36]
P.-Y. Lin, J.-S. Lee, and C.-C. Chang, “Distortion-free secret image sharing mechanism using modulus operator,” Pattern Recognit., vol. 42, no. 5, pp. 886–895, May 2009. [Online]. Available: http://www.sciencedirect.com/science/article/pii/S0031320308004056
[37]
X. Yan, Y. Lu, L. Liu, S. Wan, W. Ding, and H. Liu, “Security analysis of secret image sharing,” in Data Science (Communications in Computer and Information Science), vol. 727. Changsha, China: Springer, Sep. 2017, pp. 305–316. 10.1007/978-981-10-6385-5_26.
[38]
M. Ulutas, G. Ulutas, and V. V. Nabiyev, “Invertible secret image sharing for gray level and dithered cover images,” J. Syst. Softw., vol. 86, no. 2, pp. 485–500, Feb. 2013. [Online]. Available: http://www.sciencedirect.com/science/article/pii/S0164121212002701
[39]
M. Miyahara, K. Kotani, and V. R. Algazi, “Objective picture quality scale (PQS) for image coding,” IEEE Trans. Commun., vol. 46, no. 9, pp. 1215–1226, Sep. 1998.
[40]
X. Yan, S. Wang, X. Niu, and C.-N. Yang, “Halftone visual cryptography with minimum auxiliary black pixels and uniform image quality,” Digit. Signal Process., vol. 38, pp. 53–65, Mar. 2015.

Cited By

View all
  • (2024)Reversible Data Hiding in Shared JPEG ImagesACM Transactions on Multimedia Computing, Communications, and Applications10.1145/369546320:12(1-24)Online publication date: 9-Sep-2024
  • (2024)Secret Cracking and Security Enhancement for the Image Application of CRT-Based Secret SharingIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.347726519(9819-9834)Online publication date: 1-Jan-2024
  • (2024)Invertible Secret Image Sharing With Authentication for Embedding Color Palette Image Into True Color ImageIEEE Transactions on Circuits and Systems for Video Technology10.1109/TCSVT.2024.341302434:11_Part_1(10987-10999)Online publication date: 12-Jun-2024
  • Show More Cited By

Index Terms

  1. Reversible Image Secret Sharing
          Index terms have been assigned to the content through auto-classification.

          Recommendations

          Comments

          Information & Contributors

          Information

          Published In

          cover image IEEE Transactions on Information Forensics and Security
          IEEE Transactions on Information Forensics and Security  Volume 15, Issue
          2020
          2247 pages

          Publisher

          IEEE Press

          Publication History

          Published: 01 January 2020

          Qualifiers

          • Research-article

          Contributors

          Other Metrics

          Bibliometrics & Citations

          Bibliometrics

          Article Metrics

          • Downloads (Last 12 months)0
          • Downloads (Last 6 weeks)0
          Reflects downloads up to 26 Jan 2025

          Other Metrics

          Citations

          Cited By

          View all
          • (2024)Reversible Data Hiding in Shared JPEG ImagesACM Transactions on Multimedia Computing, Communications, and Applications10.1145/369546320:12(1-24)Online publication date: 9-Sep-2024
          • (2024)Secret Cracking and Security Enhancement for the Image Application of CRT-Based Secret SharingIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.347726519(9819-9834)Online publication date: 1-Jan-2024
          • (2024)Invertible Secret Image Sharing With Authentication for Embedding Color Palette Image Into True Color ImageIEEE Transactions on Circuits and Systems for Video Technology10.1109/TCSVT.2024.341302434:11_Part_1(10987-10999)Online publication date: 12-Jun-2024
          • (2024)Size-invariant two-in-one image secret sharing scheme based on gray mixing modelJournal of Visual Communication and Image Representation10.1016/j.jvcir.2024.104134100:COnline publication date: 17-Jul-2024
          • (2023)Enhancement of Information Carrying and Decoding for Visual Cryptography with Error CorrectionACM Transactions on Multimedia Computing, Communications, and Applications10.1145/361292720:1(1-24)Online publication date: 5-Aug-2023
          • (2023)Sharing Visual Secrets Among Multiple Groups With Enhanced PerformanceIEEE Transactions on Circuits and Systems for Video Technology10.1109/TCSVT.2023.327129933:11(6503-6518)Online publication date: 1-Nov-2023
          • (2023)Reversible Data Hiding in Encrypted Images With Secret Sharing and Hybrid CodingIEEE Transactions on Circuits and Systems for Video Technology10.1109/TCSVT.2023.327088233:11(6443-6458)Online publication date: 1-Nov-2023
          • (2023)DR-SISMJournal of King Saud University - Computer and Information Sciences10.1016/j.jksuci.2023.10170535:8Online publication date: 1-Sep-2023
          • (2023)A (t,n)- Secret image sharing with steganography based on Rook polynomial and LWE problemMultimedia Tools and Applications10.1007/s11042-023-15016-682:25(39077-39097)Online publication date: 1-Oct-2023
          • (2023)Optimization of MSFs for watermarking using DWT-DCT-SVD and fish migration optimization with QUATREMultimedia Tools and Applications10.1007/s11042-022-13173-882:2(2255-2276)Online publication date: 1-Jan-2023
          • Show More Cited By

          View Options

          View options

          Figures

          Tables

          Media

          Share

          Share

          Share this Publication link

          Share on social media