Advertisement

Preview-Versioned Essential Secret Image Sharing

  • Shang-Kuan Chen
  • Rei-Heng Cheng
Conference paper
Part of the Smart Innovation, Systems and Technologies book series (SIST, volume 110)

Abstract

In a (t, s, k, n)-essential secret image sharing ESIS scheme, a secret image is shared into two kinds of shadows including s essential shadows and (n − s) non-essential shadows. When receiving at least k shadows containing at least t essential shadows, the secret image can be lossless revealed. In this paper, a preview-versioned style essential secret image sharing is proposed. When receiving at least t essential shadows, a previewed version of secret image can be revealed. It is reasonable that at least t essential shadows are entitled to see the rough version of secret image, when the total shadows are less than k.

Keywords

Essential secret image sharing Secret image sharing Rough previewing Essential shadows Preview-version 

References

  1. 1.
    Naor, M., Shamir, A.: Visual cryptography. In: Advances in Cryptology, Eurocrypt’94, pp. 1–12 (1995)Google Scholar
  2. 2.
    Kafri, O., Keren, E.: Encryption of pictures and shapes by random grids. Opt. Lett. 12, 377–379 (1987)CrossRefGoogle Scholar
  3. 3.
    Shyu, S.J.: Image encryption by random grids. Pattern Recognit. 40(3), 1014–1031 (2007)CrossRefGoogle Scholar
  4. 4.
    Shyu, S.J.: Image encryption by multiple random grids. Pattern Recognit. 42(7), 1582–1596 (2009)CrossRefGoogle Scholar
  5. 5.
    Chen, T.H., Tsao, K.H.: Visual secret sharing by random grids revisited. Pattern Recognit. 42, 2203–2217 (2009)CrossRefGoogle Scholar
  6. 6.
    Chen, S.K.: Friendly progressive visual secret sharing using generalized random grids. Opt. Eng. 48(11), 117001.1–117001.7 (2009)Google Scholar
  7. 7.
    Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Visual cryptography for general access structures. Inf. Comput. 129, 86–106 (1996)MathSciNetCrossRefGoogle Scholar
  8. 8.
    Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Extended capabilities for visual cryptography. Theor. Comput. Sci. 250, 143–161 (2001)MathSciNetCrossRefGoogle Scholar
  9. 9.
    Hou, Y.C.: Visual cryptography for color images. Pattern Recognit. 36, 1619–1629 (2003)CrossRefGoogle Scholar
  10. 10.
    Fang, W.P., Lin, J.C.: Visual cryptography with extra ability of hiding confidential data. J. Electron. Imaging 15, 023020–023026 (2006)CrossRefGoogle Scholar
  11. 11.
    Hofmeister, T., Krause, M., Simon, H.U.: Contrast-optimal k out of n secret sharing schemes in visual cryptography. Theor. Comput. Sci. 240(2), 471–485 (2000)MathSciNetCrossRefGoogle Scholar
  12. 12.
    Thien, C.C., Lin, J.C.: Secret image sharing. Comput. Graph. 26, 765–770 (2002)CrossRefGoogle Scholar
  13. 13.
    Chen, S.K., Lin, J.C.: Fault-tolerant and progressive transmission of images. Pattern Recognit. 38(12), 2466–2471 (2005)CrossRefGoogle Scholar
  14. 14.
    Wang, R.Z., Shyu, S.J.: Scalable secret image sharing. Signal Process.: Image Commun. 22, 363–373 (2007)Google Scholar
  15. 15.
    Yang, C.N., Huang, S.M.: Constructions and properties of k out of n scalable secret image sharing. Opt. Commun. 283, 1750–1762 (2010)CrossRefGoogle Scholar
  16. 16.
    Wu, C.C., Kao, S.J., Hwang, M.S.: A high quality image sharing with steganography and adaptive authentication scheme. J. Syst. Softw. 84, 2196–2207 (2011)CrossRefGoogle Scholar
  17. 17.
    Wang, R.Z., Su, C.H.: Secret image sharing with smaller shadow images. Pattern Recognit. Lett. 27(6), 551–555 (2006)CrossRefGoogle Scholar
  18. 18.
    Chang, C.C., Hsieh, Y.P., Lin, C.H.: Sharing secrets in stego images with authentication. Pattern Recognit. 41, 3130–3137 (2008)CrossRefGoogle Scholar
  19. 19.
    Yang, C.N., Chu, Y.Y.: A general (k, n) scalable secret image sharing scheme with the smooth scalability. J. Syst. Softw. 84, 1726–1733 (2011)CrossRefGoogle Scholar
  20. 20.
    Li, P., Yang, C.N., Wu, C.C., Kong, Q., Ma, Y.: Essential secret image sharing scheme with different importance of shadows. J. Vis. Commun. Image Represent. 24, 1106–1114 (2013)CrossRefGoogle Scholar
  21. 21.
    Yang, C.N., Li, P., Wu, C.C., Cai, S.R.: Reducing shadow size in essential secret image sharing by conjunctive hierarchical approach. Signal Process.: Image Commun. 31, 1–9 (2015)Google Scholar
  22. 22.
    Chen, S.K.: Essential secret image sharing with increasable shadows. Opt. Eng. 55(1), 013103 (2016)CrossRefGoogle Scholar
  23. 23.
    Stalling, W.: Cryptography and network security: principles and practices. Pearson Education Inc., pp. 126–134 (2003)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Information Engineering CollegeYango UniversityFuzhouChina

Personalised recommendations