Advertisement

Multimedia Tools and Applications

, Volume 74, Issue 9, pp 3231–3252 | Cite as

Visual secret sharing based on random grids with abilities of AND and XOR lossless recovery

  • Xuehu Yan
  • Shen WangEmail author
  • Ahmed A. Abd El-Latif
  • Xiamu Niu
Article

Abstract

In this paper, a visual secret image sharing threshold scheme based on random grids and Boolean operations with the abilities of AND and XOR decryptions is proposed. When no light-weight computation device the secret could be revealed by human visual system with no cryptographic computation based on Boolean AND operation (stacking). On the other hand, if the light-weight computation device is available the secret could be revealed with better visual quality based on Boolean AND or XOR operation and could be losslessly revealed when sufficient shadow images are collected for a general k out of n scheme. Furthermore, the proposed scheme has several superior performances such as (k, n) threshold, no codebook design, avoiding the pixel expansion problem and the same color representation as digital images (digital color). Experiments are conducted to show the security and efficiency of the proposed scheme. Comparisons with previous approaches show the advantages of the proposed scheme.

Keywords

Visual secret sharing Random grids Boolean operations Lossless recovery Threshold secret sharing 

Notes

Acknowledgments

The authors wish to thank the anonymous reviewers for their suggestions to improve this paper. This work is supported by the National Natural Science Foundation of China (Grant Number: 61100187, 61301099, 61361166006) and the Fundamental Research Funds for the Central Universities (Grant Number: HIT. NSRIF. 2013061).

References

  1. 1.
    Chen TH, Tsao KH (2008) Image encryption by (n,n) random grids. In: Proceedings of 18th Information Security Conference, HualienGoogle Scholar
  2. 2.
    Chen TH, Tsao KH (2009) Visual secret sharing by random grids revisited. Pattern Recogn 42:2203–2217CrossRefzbMATHGoogle Scholar
  3. 3.
    Chen T, Tsao K (2011) Threshold visual secret sharing by random grids. J Syst Softw 84:1197–1208CrossRefGoogle Scholar
  4. 4.
    Dao-Shun W, Lei Z, Ning M et al (2007) Two secret sharing schemes based on Boolean operations [J]. Pattern Recogn 40(10):2776–2785CrossRefGoogle Scholar
  5. 5.
    Feng YI, Daoshun W, Shundong LI, Yiqi DAI (2008) Probabilistic visual cryptography scheme with reversing. J Tsinghua Univ Sci Tech 48(1):121–123Google Scholar
  6. 6.
    Hou Y-C, Quan Z-Y (2011) Progressive visual cryptography with unexpanded shares. IEEE Trans Circ Sys Vi Tech 21(11):1760–1764CrossRefGoogle Scholar
  7. 7.
    Kafri O, Keren E (1987) Encryption of pictures and shapes by random grids. Opt Lett 12(6):377–379CrossRefGoogle Scholar
  8. 8.
    Li L, Abd El-Latif AA, Shi Z, Niu X (2012) A new loss-tolerant image encryption scheme based on secret sharing and two chaotic systems. Res J Appl Sci Eng Technol 4(8):877–883Google Scholar
  9. 9.
    Naor M, Shamir A (1995) Visual cryptography, in Advances in Cryptography, Eurocrypt’94, pp 1–12Google Scholar
  10. 10.
    Shyu SJ (2009) Image encryption by multiple random grids. Pattern Recogn 42:1582–1596CrossRefzbMATHGoogle Scholar
  11. 11.
    Shyu, Shyong Jian (2007) Image encryption by random grids. Pattern Recognition 40.3: 1014–1031Google Scholar
  12. 12.
    Tuyls P, Hollmann H, Lint J, Tolhuizen L (2005) Xor-based visual cryptography schemes. Des Codes Crypt 37:169–186CrossRefzbMATHGoogle Scholar
  13. 13.
    Wang Z, Arce GR (2009) Halftone visual cryptography via error diffusion. IEEE Trans Inf Forensics Secur 4(3):383–396CrossRefGoogle Scholar
  14. 14.
    Weir J, WeiQi Yan Jan (2010) A comprehensive study of visual cryptography, Transactions on DHMS V, LNCS 6010, pp 70–105Google Scholar
  15. 15.
    Wu X, Sun W (2013) Random grid-based visual secret sharing with abilities of OR and XOR decryptions. J Vis Commun Image R 24:48–62CrossRefGoogle Scholar
  16. 16.
    Xiaotian W, Sun W (2013) Improving the visual quality of random grid-based visual secret sharing. Signal Process 93(5):977–995CrossRefGoogle Scholar
  17. 17.
    Yan X, Wang S, Abd El-Latif AA, Sang J, Niu X, Threshold visual secret sharing based on Boolean operations, To be appearGoogle Scholar
  18. 18.
    Yan X, Wang S, Li L, Abd AA, El-Latif ZW, Niu X (2013) A new assessment measure of shadow image quality based on error diffusion techniques. J Inf Hiding Multimedia Signal Process (JIHMSP) 4(2):118–126Google Scholar
  19. 19.
    Yang C (2004) New visual secret sharing schemes using probabilistic method [J]. Pattern Recogn Lett 25(4):481–494CrossRefGoogle Scholar
  20. 20.
    Zhou Z, Arce GR, Crescenzo GD (2006) Halftone visual cryptography. IEEE Trans Image Process 15(8):2441–2453CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2013

Authors and Affiliations

  • Xuehu Yan
    • 1
  • Shen Wang
    • 1
    Email author
  • Ahmed A. Abd El-Latif
    • 1
    • 2
  • Xiamu Niu
    • 1
  1. 1.School of Computer Science and TechnologyHarbin Institute of TechnologyHarbinChina
  2. 2.Mathematics Department, Faculty of ScienceMenoufia UniversityShebin El-KoomEgypt

Personalised recommendations