Skip to main content
Log in

Highly efficient and secure multi-secret image sharing scheme

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

This paper presents a novel highly efficient secret image sharing scheme that is symmetric, Boolean-based, secure, and enables multi-secret image sharing. The proposed (n, n) scheme involves sharing n secret images among n shared images and recovers all n secret images from n shared images, and losing any shared image prevents recovering any secret image. We propose a novel symmetric sharing-recovery function (SSRF) for performing sharing and recovery. The scheme is based on Boolean operations to attain low computational complexity and is more secure than previous Boolean-based schemes; it exhibits more randomness in each shared image, more randomness between two or more shared images, and higher shared image sensitivity. The experimental results showed that a similar CPU computation time is required for both generating shared images from secret images, and recovering secret images from shared images. Furthermore, the computation time of the SSRF is proportional to the number of secret images.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Chen J, Chen YS, Hsu HC, Chen HW (2005) New visual cryptography system based on circular shadow image and fixed angle segmentation. J Electron Imaging 14:033018-1–033018-5

    Google Scholar 

  2. Chen CC, Fu WY (2008) A geometry-based secret image sharing approach. J Inf Sci Eng 24:1567–1577

    MathSciNet  Google Scholar 

  3. Chen CC, Huang JY (2014) Progressive share of secret audio by Chinese remainder theorem and integer wavelet transform. Int J Electron Commerce Stud 5:219–232

    Article  Google Scholar 

  4. Chen CC, Liu CA (2013) Tamper-Proof secret image sharing scheme for identifying cheated secret keys and shared images. J Electron Imaging 22:013008-1–013008-7

    Google Scholar 

  5. Chen TH, Wu CS (2011) Efficient multi-secret image sharing based on Boolean operations. Signal Process 91:90–97

    Article  MATH  Google Scholar 

  6. Chen CC, Wu WJ (2014) A secure boolean-based multi-secret image sharing scheme. J Syst Softw 92:107–114

    Article  Google Scholar 

  7. Dhara BC, Chanda B (2012) A fast progressive image transmission scheme using block truncation coding by pattern fitting. J Vis Commun Image Represent 23:313–322

    Article  Google Scholar 

  8. Guo C, Chang CC, Qin C (2012) A hierarchical threshold secret image sharing. Pattern Recogn Lett 33:83–91

    Article  Google Scholar 

  9. Hsu HC, Chen J, Chen TS, Lin YH (2007) Special type of circular visual cryptography for multiple secret hiding. Imaging Sci J 55:175–179

    Article  Google Scholar 

  10. Huang CP, Hsieh CH, Huang PS (2010) Progressive sharing for a secret image. J Syst Softw 83:517–527

    Article  Google Scholar 

  11. Huang R, Rhee KH, Uchida S (2014) A parallel image encryption method based on compressive sensing. Multimed Tools Appl 72:71–93

    Article  Google Scholar 

  12. Lima JB, Lima EAO, Madeiro F (2013) Image encryption based on the finite field cosine transform. Signal Process Image Commun 28:1537–1547

    Article  Google Scholar 

  13. Lin SJ, Chen SK, Lin JC (2010) Flip visual cryptography (FVC) with perfect security, conditionally-optimal contrast, and no expansion. J Vis Commun Image Represent 21:900–916

    Article  Google Scholar 

  14. Lin PY, Lee JS, Chang CC (2009) Distortion-free secret image sharing mechanism using modulus operator. Pattern Recogn 42:886–895

    Article  MATH  Google Scholar 

  15. Lin SJ, Lin JC (2007) VCPSS: a two-in-one two-decoding-options image sharing method combining visual cryptography (VC) and polynomial-style sharing (PSS) approaches. Pattern Recogn 40:3652–3666

    Article  MATH  Google Scholar 

  16. Liu X, Cao Y, Lu P, Lu X, Li Y (2013) Optical image encryption technique based on compressed sensing and Arnold transformation. Optik-Int J Light Electron Opt 124:6590–6593

    Article  Google Scholar 

  17. Shyu SJ, Chen YR (2008) Threshold Secret Image Sharing by Chinese Remainder Theorem. in: Proceedings of IEEE Asia-Pacific Services Computing 1332–1337.

  18. Shyu SJ, Huang SY, Lee YK, Wang RZ, Chen K (2007) Sharing multiple secrets in visual cryptography. Pattern Recogn 40:3633–3651

    Article  MATH  Google Scholar 

  19. Thien CC, Lin JC (2002) Secret image sharing. Comput Graph 26:765–770

    Article  Google Scholar 

  20. Ulutas M, Ulutas G, Nabiyev V (2013) Invertible secret image sharing for gray level and dithered cover images. J Syst Softw 86:485–500

    Article  Google Scholar 

  21. Wang RZ, Su CH (2006) Secret image sharing with smaller shadow images. Pattern Recogn Lett 27:551–555

    Article  MathSciNet  Google Scholar 

  22. Wang D, Zhang L, Ma N, Li X (2007) Two secret sharing schemes based on Boolean operations. Pattern Recogn 40:2776–2785

    Article  MATH  Google Scholar 

  23. Wu HC, Chang CC (2005) Sharing visual multi-secrets using circle shares. Comput Stand Interfaces 28:123–135

    Article  Google Scholar 

  24. Yang CN, Ciou CB (2010) Image secret sharing method with two-decoding-options: lossless recovery and previewing capability. Image Vis Comput 28:1600–1610

    Article  Google Scholar 

  25. Yang CN, Ouyang JF, Harn L (2012) Steganography and authentication in image sharing without parity bits. Opt Commun 285:1725–1735

    Article  Google Scholar 

Download references

Acknowledgments

This paper was partially supported by the National Science Council of the Republic of China under contract MOST 103-2221-E-032-051.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chien-Chang Chen.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chen, CC., Wu, WJ. & Chen, JL. Highly efficient and secure multi-secret image sharing scheme. Multimed Tools Appl 75, 7113–7128 (2016). https://doi.org/10.1007/s11042-015-2634-1

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-015-2634-1

Keywords

Navigation