Skip to main content
Log in

Quality improved (k, n) priority based progressive visual secret sharing

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Progressive Visual Secret Sharing (PVSS) is a Visual Secret Sharing scheme which shares a secret image among multiple users and during the decryption this secret image can be reconstructed in a progressive manner. Recently, PVSS has been extended for priority users by giving different importance to different shares. Thus, the higher priority user holding higher importance shares obtains better visual quality compared to the lower priority users. However, existing priority based visual secret sharing suffers from the problem of inconsistent contrast and degraded visual quality. Hence, this paper uses two different approaches namely Codebook approach and Random grid approach to construct (k, n) Priority based Progressive Visual Secret Sharing (PPVSS) without pixel expansion to provide consistent contrast and better visual quality of reconstructed image. Experimental results show the effectiveness of proposed scheme compared to the existing scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. Bhattacharjee T, Rout RK, Maity SP (2017) Affine Boolean classification in secret image sharing for progressive quality access control. J Inf Secur Appl. https://doi.org/10.1016/j.jisa.2017.01.001

  2. Chao HC, Fan T-Y (2017) XOR-based progressive visual secret sharing using generalized random grids. J Displays 49:6–15

    Article  Google Scholar 

  3. Chao H-C, Fan T-Y (2017) Random-grid based progressive visual secret sharing scheme with adaptive priority. J Digital Signal Process 68:69–80

    Article  Google Scholar 

  4. Chao H-C, Fan T-Y (May 2018) Priority visual secret sharing of random grids for threshold access structures. J Multimedia Tools Appl 77(10):11867–11882

    Article  Google Scholar 

  5. Ching-NungYang PL, Wu C-C, Cai S-R (2015) Reducing shadow size in essential secret image sharing by conjunctive hierarchical approach. J Signal Process Image Commun 31:1–9

    Article  Google Scholar 

  6. Chiu P-L, Lee K-H (2019) Efficient constructions for progressive visual cryptography with meaningful shares. J Signal Process 165:233–249

    Article  Google Scholar 

  7. Hou Y-C, Quan Z-Y (2011) Progressive visual cryptography with unexpanded shares. IEEE Trans Circuit Syst Video Technol 21(11):1760–1764

    Article  Google Scholar 

  8. Hou Y-C, Quan Z-Y, Tsai C-F (2015) A privilege-based visual secret sharing model. J Vis Commun Image Represent 33:358–367

    Article  Google Scholar 

  9. Huh J-H (2017) PLC-based design of monitoring system for ICT-integrated vertical fish farm. Hum Cent Comput Inf Sci 7:20. https://doi.org/10.1186/s13673-017-0101-x

    Article  Google Scholar 

  10. Ibtihal M, Driss EO, Hassan N (April 2017) Homomorphic encryption as a service for outsourced images in mobile cloud computing environment. Int J Cloud Appl Comput 7(2):27–40

    Google Scholar 

  11. Jung S-H, Huh J-H (2019) A novel on transmission line tower big aata analysis model using altered K-means and ADQL. J Sustain. https://doi.org/10.3390/su11133499

  12. LeCun Y, Bengio Y, Hinton G (2015) Deep learning. J Nat 521(7553):436–444

    Article  Google Scholar 

  13. Lee J-S, Chang C-C, Huynh N-T, Tsai H-Y (2015) Preserving user-friendly shadow and high-contrast quality for multiple visual secret sharing technique. J Digital Signal Process 40:131–139

    Article  MathSciNet  Google Scholar 

  14. Li Z, Zhao M, Jiang H, Xu Q (2019) Keyword guessing on multi-user searchable encryption. Int J High Perform Comput Netw 14(1). https://doi.org/10.1504/IJHPCN.2019.099744

  15. Lin K-S, Lin C-H, Chen T-H (2014) Distortionless visual multi-secret sharing based on random grid. J Sci 288:330–346

    MATH  Google Scholar 

  16. Lin C-H, Lee Y-S, Chen T-H (2015) Friendly progressive random-grid-based visual secret sharing with adaptive contrast. J Vis Commun Image Represent 33:31–41

    Article  Google Scholar 

  17. Liu Y-N, Wu Z (2018) An improved threshold multi-level image recovery scheme. J Inf Secur Appl 40:166–172

    Google Scholar 

  18. Liu X, Shen W, Yan X, Zhang W (2018) Random grid-based threshold visual secret sharing with improved visual quality and lossless recovery ability. J Multimedia Tools Appl 77(16):20673–20696

    Article  Google Scholar 

  19. Mhala NC, Pais AR (2019) Contrast enhancement of Progressive Visual Secret Sharing (PVSS) scheme for gray-scale and color images using super-resolution. J Signal Process 162:253–267

    Article  Google Scholar 

  20. Naor M, Shamir A (1994) Visual cryptography. In: De Santis A (ed) Advances in cryptology proceedings of Eurocypto 94, lecture notes in computer science, vol 950, pp 1–12

  21. Schmidhuber J (2015) Deep learning in neural networks: an overview. J Neural Netw 61:85–117

    Article  Google Scholar 

  22. Seo Y-S, Huh J-H (2019) Automatic emotion-based music classification for supporting intelligent IoT applications. J Electron. https://doi.org/10.3390/electronics8020164

  23. Shivani S, Agarwal S (2017) Novel basis matrix creation and preprocessingalgorithms for friendly progressive visual secret sharing with space-efficient shares. J Multimedia Tools Appl 76(6):8711–8744

    Article  Google Scholar 

  24. Shyu SJ (2009) Image encryption by multiple random grids. J Pattern Recognit 42:1582–1596

    Article  Google Scholar 

  25. Wu X, Sun W (2013) Improving the visual quality of random grid-based visual secret sharing. J Signal Process 93:977–995

    Article  Google Scholar 

  26. Yan X, Shen W, Niu X (2014) Threshold construction from specific cases in visual cryptography without the pixel expansion. J Signal Process 105:389–398

    Article  Google Scholar 

  27. Yan X, Liu X, Yang C-N (2015) An enhanced threshold visual secret sharing based on random grids. J Real-Time Image Proc. https://doi.org/10.1007/s11554-015-0540-4

  28. Yan X, Wang S, Abd El-Latif AA, Niu X (2015) Random grids-based visual secret sharing with improved visual quality via error diffusion. J Multimedia Tools Appl 74(21):9279–9296

    Article  Google Scholar 

  29. Yan X, Shen W, Niu X (2016) Threshold progressive visual cryptography construction with unexpanded shares. J Multimedia Tools Appl 75(14):8657–8674

    Article  Google Scholar 

  30. Yang C-N, Chu Y-Y (2011) A general (k, n) scalable secret image sharing scheme with the smooth scalability. J Syst Softw 84:1726–1733

    Article  Google Scholar 

  31. Yang C-N, Lin C-Y (2015) Almost-aspect-ratio-invariant visual cryptography without adding extra subpixels. J Inf Sci 312:131–151

    Article  MathSciNet  Google Scholar 

  32. Yang C-N, Yang Y-Y (July 2014) New extended visual cryptography schemes with clearer shadow images. J Inf Sci 271(4):246–263

    Article  MathSciNet  Google Scholar 

  33. Yang C-N, Liao J-K, Wang D-S (2017) New privilege-based visual cryptography with arbitrary privilege levels. J Vis Commun Image Represent 42:121–131

    Article  Google Scholar 

  34. Zkik K, Orhanou G, El Hajji S (June 2017) Secure mobile multi cloud architecture for authentication and data storage. Int J Cloud Appl Comput 7(2):62–76

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Srividhya Sridhar.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sridhar, S., Sudha, G.F. Quality improved (k, n) priority based progressive visual secret sharing. Multimed Tools Appl 79, 11459–11486 (2020). https://doi.org/10.1007/s11042-019-08319-0

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-019-08319-0

Keywords

Navigation