Abstract
Two-in-one image secret sharing (TiOISS) scheme shares a secret image into n multiple shadows. In the revealing process, stacking any k (k ≤ n) shadows can decode a vague secret image in the first stage. It also can reveal the original secret image by computation in the second stage. Many TiOISS schemes have proposed based on visual cryptography scheme (VCS) and polynomial-based image secret sharing (PISS). Since PISS reveals the secret image by Lagrange’s interpolation, it needs complicated computation. In this paper, we combine perfect black VCS with image secret sharing based on Boolean operations, and propose a new TiOISS scheme. Compared with existing TiOISS schemes, our scheme only needs few XOR operations to reveal the secret image in the second-stage reconstruction phase.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Shamir, A.: How to share a secret. Commun. Assoc. Comput. Mach. 22, 612–613 (1979)
Thien, C.C., Lin, J.C.: Secret image sharing. Comput. Graphics 26, 765–770 (2002)
Yang, C.N., Chen, T.S., Yu, K.H., Wang, C.C.: Improvements of image sharing with steganography and authentication. J. Syst. Softw. 80, 1070–1076 (2007)
Wang, R.Z., Shyu, S.J.: Scalable secret image sharing. Sig. Process. Image Commun. 22, 363–373 (2007)
Yang, C.N., Huang, S.M.: Constructions and properties of k out of n scalable secret image sharing. Optics Communications 2831750–1762 (2010)
Naor, Moni, Shamir, Adi: Visual Cryptography. In: De Santis, Alfredo (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)
Yang, C.N., Chen, T.S.: Extended visual secret sharing schemes: improving the shadow image quality. Int. J. Pattern Recogn. Artif. Intell. 21, 879–898 (2007)
Liu, F., Wu, C.K.: Embedded extended visual cryptography schemes. IEEE Trans. Inf. Forensics Secur. 6, 307–322 (2011)
Yang, C.N., Chen, T.S.: Colored visual cryptography scheme based on additive color mixing. Pattern Recogn. 41, 3114–3129 (2008)
Shyu, S.J.: Efficient visual secret sharing scheme for color images. Pattern Recogn. 39, 866–880 (2006)
Liu, F., Wu, C.K., Lin, X.J.: Color visual cryptography schemes. IET Inf. Secur. 2, 151–165 (2008)
Lin, S.J., Lin, J.C.: VCPSS: a two-in-one two-decoding-options image sharing method combining visual cryptography (VC) and polynomial-style sharing (PSS) approaches. Pattern Recogn. 40, 3652–3666 (2007)
Yang, C.N., Ciou, C.B.: Image secret sharing method with two-decoding-options: lossless recovery and previewing capability. Image Vis. Comput. 28, 1600–1610 (2010)
Li, P., Ma, P.J., Su, X.H., Yang, C.N.: Improvements of a two-in-one image secret sharing scheme based on gray mixing model. J. Vis. Commun. Image Represent. 23, 441–453 (2012)
Li, P., Yang, C.N., Kong, Q., Ma, Y., Liu, Z.: Sharing more information in gray visual cryptography scheme. J. Vis. Commun. Image Represent. 24, 1380–1393 (2013)
Wang, D., Zhang, L., Ma, N., Li, X.: Two secret sharing schemes based on Boolean operations. Patt. Recogn. 40, 2776–2785 (2007)
Chao, K.Y., Lin, J.C.: Secret image sharing: a boolean-operations-based approach combining benefits of polynomial-based and fast approaches. Int. J. Pattern Recogn. Artif. Intell. 23, 263–285 (2009)
Viet, Duong Quang, Kurosawa, Kaoru: almost ideal contrast visual cryptography with reversing. In: Okamoto, Tatsuaki (ed.) CT-RSA 2004. LNCS, vol. 2964, pp. 353–365. Springer, Heidelberg (2004)
Acknowledgments
This work was supported by the Natural Science Funds of Hebei (Grant No: F2015502014).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Li, P., Yang, CN., Kong, Q. (2015). Two-in-One Image Secret Sharing Scheme Based on Boolean Operations. In: Shi, YQ., Kim, H., Pérez-González, F., Yang, CN. (eds) Digital-Forensics and Watermarking. IWDW 2014. Lecture Notes in Computer Science(), vol 9023. Springer, Cham. https://doi.org/10.1007/978-3-319-19321-2_23
Download citation
DOI: https://doi.org/10.1007/978-3-319-19321-2_23
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-19320-5
Online ISBN: 978-3-319-19321-2
eBook Packages: Computer ScienceComputer Science (R0)