Abstract
In this paper, a new perceptual secret sharing (PSS) scheme is developed based on Boolean operations and random grids. In the developed scheme, the secret image is shared among n shadows using (l, n, n) threshold scheme, while the restored secret image is restored from l out of n shadows. P(l, n, n) threshold is satisfied in this developed scheme, by acquiring this property no information recovery occurs when less than l shares are stacked, imperfect recovery occurs when more than l but less than n shares are presented and perfect recovery occurs when n shares are collected.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Yan, X., Wang, S., El-Latif, A.A.A., Sang, J., Niu, X.: A novel perceptual secret sharing scheme. In: Shi, Y.Q., Liu, F., Yan, W. (eds.) Transactions on Data Hiding and Multimedia Security IX. LNCS, vol. 8363, pp. 68–90. Springer, Heidelberg (2014). https://doi.org/10.1007/978-3-642-55046-1_5
Liu, F., Chuankun, W.: Embedded extended visual cryptography schemes. IEEE Trans. Inf. Foren. Secur. 6(2), 307–322 (2011)
Wang, D.-S., Zhang, L., Ma, N., et al.: Two secret sharing schemes based on boolean operations. Pattern Recogn. 40(10), 2776–2785 (2007)
Wang, Z., Arce, G.R.: Halftone visual cryptography through error diffusion. In: ICIP, pp. 109–112 (2006)
Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995). https://doi.org/10.1007/BFb0053419
Weir, J., Yan, W.Q.: A comprehensive study of visual cryptography. In: Shi, Y.Q. (ed.) Transactions on Data Hiding and Multimedia Security V. LNCS, vol. 6010, pp. 70–105. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-14298-7_5
Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Extended capabilities for visual cryptography. Theoret. Comput. Sci. 250(1/2), 143–161 (2001)
Kafri, O., Keren, E.: Encryption of pictures and shapes by random grids. Optics Lett. 12(6), 377–379 (1987)
Shyu, S.J.: Image encryption by random grids. Pattern Recogn. 40(3), 1014–1031 (2007)
Chen, T., Tsao, K.: Threshold visual secret sharing by random grids. J. Syst. Softw. 84, 1197–1208 (2011)
Shyu, S.J.: Image encryption by multiple random grids. Pattern Recogn. 42, 1582–1596 (2009)
Wu, X., Sun, W.: Improving the visual quality of random grid-based visual secret sharing. Signal Process. 93(5), 977–995 (2013)
Jin, D., Yan, W.-Q., Kankanhalli, M.S.: Progressive color visual cryptography. J. Electron. Imaging 14(3) (2005)
Hou, Y.-C., Quan, Z.-Y., Tsai, C.-F.: Block-based progressive visual secret sharing. Inf. Sci. 233, 290–304 (2013)
Fang, W.-P., Lin, J.-C.: Progressive viewing and sharing of sensitive images. Pattern Recogn. Image Anal. 16(4), 632–636 (2006)
Hou, Y.-C., Quan, Z.-Y.: Progressive visual cryptography with unexpanded shares. IEEE Trans. Circ. Syst. Video Technol. 21(11), 1760–1764 (2011)
Chen, S.-K.: Friendly progressive visual secret sharing using generalized random grids. Optical Eng. 48(11), 117001-1–117001-7 (2009)
Chen, S.-K., Lin, J.-C.: Fault-tolerant and progressive transmission of images. Pattern Recogn. 38(12), 2466–2471 (2005)
Huang, C.-P., Hsieh, C.-H., Huang, P.S.: Progressive sharing for a secret image. J. Syst. Softw. 83, 517–527 (2010)
Acknowledgement
The authors would like to thank the anonymous reviewers for their valuable discussions and comments. This work is supported by the National Natural Science Foundation of China (Grant Number: 61602491).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Yan, X., Lu, Y., Liu, L., Wan, S., Ding, W., Liu, H. (2018). Perceptual Secret Sharing Scheme Based on Boolean Operations and Random Grids. In: Huang, M., Zhang, Y., Jing, W., Mehmood, A. (eds) Wireless Internet. WICON 2016. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 214. Springer, Cham. https://doi.org/10.1007/978-3-319-72998-5_9
Download citation
DOI: https://doi.org/10.1007/978-3-319-72998-5_9
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-72997-8
Online ISBN: 978-3-319-72998-5
eBook Packages: Computer ScienceComputer Science (R0)