Skip to main content

Two-in-One Image Secret Sharing Scheme Based on Boolean Operations

  • Conference paper
  • First Online:
Digital-Forensics and Watermarking (IWDW 2014)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 9023))

Included in the following conference series:

Abstract

Two-in-one image secret sharing (TiOISS) scheme shares a secret image into n multiple shadows. In the revealing process, stacking any k (k ≤ n) shadows can decode a vague secret image in the first stage. It also can reveal the original secret image by computation in the second stage. Many TiOISS schemes have proposed based on visual cryptography scheme (VCS) and polynomial-based image secret sharing (PISS). Since PISS reveals the secret image by Lagrange’s interpolation, it needs complicated computation. In this paper, we combine perfect black VCS with image secret sharing based on Boolean operations, and propose a new TiOISS scheme. Compared with existing TiOISS schemes, our scheme only needs few XOR operations to reveal the secret image in the second-stage reconstruction phase.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Shamir, A.: How to share a secret. Commun. Assoc. Comput. Mach. 22, 612–613 (1979)

    MATH  MathSciNet  Google Scholar 

  2. Thien, C.C., Lin, J.C.: Secret image sharing. Comput. Graphics 26, 765–770 (2002)

    Google Scholar 

  3. Yang, C.N., Chen, T.S., Yu, K.H., Wang, C.C.: Improvements of image sharing with steganography and authentication. J. Syst. Softw. 80, 1070–1076 (2007)

    Google Scholar 

  4. Wang, R.Z., Shyu, S.J.: Scalable secret image sharing. Sig. Process. Image Commun. 22, 363–373 (2007)

    Google Scholar 

  5. Yang, C.N., Huang, S.M.: Constructions and properties of k out of n scalable secret image sharing. Optics Communications 2831750–1762 (2010)

    Google Scholar 

  6. Naor, Moni, Shamir, Adi: Visual Cryptography. In: De Santis, Alfredo (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)

    Chapter  Google Scholar 

  7. Yang, C.N., Chen, T.S.: Extended visual secret sharing schemes: improving the shadow image quality. Int. J. Pattern Recogn. Artif. Intell. 21, 879–898 (2007)

    Google Scholar 

  8. Liu, F., Wu, C.K.: Embedded extended visual cryptography schemes. IEEE Trans. Inf. Forensics Secur. 6, 307–322 (2011)

    Google Scholar 

  9. Yang, C.N., Chen, T.S.: Colored visual cryptography scheme based on additive color mixing. Pattern Recogn. 41, 3114–3129 (2008)

    MATH  Google Scholar 

  10. Shyu, S.J.: Efficient visual secret sharing scheme for color images. Pattern Recogn. 39, 866–880 (2006)

    MATH  Google Scholar 

  11. Liu, F., Wu, C.K., Lin, X.J.: Color visual cryptography schemes. IET Inf. Secur. 2, 151–165 (2008)

    MathSciNet  Google Scholar 

  12. Lin, S.J., Lin, J.C.: VCPSS: a two-in-one two-decoding-options image sharing method combining visual cryptography (VC) and polynomial-style sharing (PSS) approaches. Pattern Recogn. 40, 3652–3666 (2007)

    MATH  Google Scholar 

  13. Yang, C.N., Ciou, C.B.: Image secret sharing method with two-decoding-options: lossless recovery and previewing capability. Image Vis. Comput. 28, 1600–1610 (2010)

    Google Scholar 

  14. Li, P., Ma, P.J., Su, X.H., Yang, C.N.: Improvements of a two-in-one image secret sharing scheme based on gray mixing model. J. Vis. Commun. Image Represent. 23, 441–453 (2012)

    Google Scholar 

  15. Li, P., Yang, C.N., Kong, Q., Ma, Y., Liu, Z.: Sharing more information in gray visual cryptography scheme. J. Vis. Commun. Image Represent. 24, 1380–1393 (2013)

    Google Scholar 

  16. Wang, D., Zhang, L., Ma, N., Li, X.: Two secret sharing schemes based on Boolean operations. Patt. Recogn. 40, 2776–2785 (2007)

    MATH  Google Scholar 

  17. Chao, K.Y., Lin, J.C.: Secret image sharing: a boolean-operations-based approach combining benefits of polynomial-based and fast approaches. Int. J. Pattern Recogn. Artif. Intell. 23, 263–285 (2009)

    Google Scholar 

  18. Viet, Duong Quang, Kurosawa, Kaoru: almost ideal contrast visual cryptography with reversing. In: Okamoto, Tatsuaki (ed.) CT-RSA 2004. LNCS, vol. 2964, pp. 353–365. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

Download references

Acknowledgments

This work was supported by the Natural Science Funds of Hebei (Grant No: F2015502014).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Peng Li .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Li, P., Yang, CN., Kong, Q. (2015). Two-in-One Image Secret Sharing Scheme Based on Boolean Operations. In: Shi, YQ., Kim, H., Pérez-González, F., Yang, CN. (eds) Digital-Forensics and Watermarking. IWDW 2014. Lecture Notes in Computer Science(), vol 9023. Springer, Cham. https://doi.org/10.1007/978-3-319-19321-2_23

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-19321-2_23

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-19320-5

  • Online ISBN: 978-3-319-19321-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics