Skip to main content

Progressive Visual Secret Sharing with Multiple Decryptions and Unexpanded Shares

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 9023))

Abstract

Differently from traditional secret sharing, progressive and perceptual secret sharing can gain clearer recovered secret image with more shares. Recently, Hou and Quan proposed a progressive visual secret sharing (PVSS) scheme that solves the pixel expansion problem of previous research. However, Hou and Quan’s scheme suffers from some problems, such as different color representation from ordinary digital images, and lossy recovery. Aiming to solve the problems, in this paper, one PVSS scheme is proposed, which has the abilities of stacking and additive decryptions. If a light-weight device is not available, the secret could be reconstructed by stacking. On the other hand, if a light-weight device is available, the secret will be reconstructed losslessly by additive operation. In addition, the proposed scheme has no the pixel expansion as well as supports different image formats. Experiments are conducted to evaluate the efficiency of the proposed scheme.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Li, L., El-Latif, A.A.A., Shi, Z., Niu, X.: A new loss-tolerant image encryption scheme based on secret sharing and two chaotic systems. Res. J. Appl. Sci. Eng. Technol. 4, 877–883 (2012)

    Google Scholar 

  2. Naor, M., Shamir, A.: Visual cryptography. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 1–12. Springer, Heidelberg (1995)

    Google Scholar 

  3. Wang, Z., Arce, G.R., Di Crescenzo, G.: Halftone visual cryptography via error diffusion. IEEE Trans. Inf. Forensics Security. 4, 383–396 (2009)

    Article  Google Scholar 

  4. Yan, X., Wang, S., Niu, X.: Threshold construction from specific cases in visual cryptography without the pixel expansion. Sig. Process. 105, 389–398 (2014)

    Article  Google Scholar 

  5. Weir, J., Yan, W.Q.: A comprehensive study of visual cryptography. In: Shi, Y.Q. (ed.) Transactions on DHMS V. LNCS, vol. 6010, pp. 70–105. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  6. Jin, D., Yan, W.Q., Kankanhalli, M.S.: Progressive color visual cryptography. J. Electron. Imaging 14, 033019-1–033019-13 (2005)

    Article  Google Scholar 

  7. Hou, Y.C., Quan, Z.Y., Tsai, C.F., Tseng, A.Y.: Block-based progressive visual secret sharing. Inf. Sci. 233, 290–304 (2013)

    Article  Google Scholar 

  8. Fang, W.P., Lin, J.C.: Progressive viewing and sharing of sensitive images. Pattern Recogn. Image Anal. 16, 632–636 (2006)

    Article  Google Scholar 

  9. Hou, Y.C., Quan, Z.Y.: Progressive visual cryptography with unexpanded shares. IEEE Trans. Circ. Sys. Video Tech. 21, 1760–1764 (2011)

    Article  Google Scholar 

  10. Yan, X., Wang, S., El-Latif, A.A.A., Niu, X.: Visual secret sharing based on random grids with abilities of a AND and XOR lossless recovery. Multimedia Tools Appl. 74, 1–22 (2013)

    Google Scholar 

  11. Yan, X., Wang, S., El-Latif, A.A.A., Sang, J., Niu, X.: A novel perceptual secret sharing scheme. In: Shi, Y.Q., Liu, F., Yan, W. (eds.) Transactions on Data Hiding and Multimedia Security IX. LNCS, vol. 8363, pp. 68–90. Springer, Heidelberg (2014)

    Chapter  Google Scholar 

  12. Hou, Y.C.: Visual cryptography for color images. Pattern Recogn. 36, 1619–1629 (2003)

    Article  Google Scholar 

  13. Zhou, Z., Arce, G.R., Di Crescenzo, G.: Halftone visual cryptography. IEEE Trans. Image Process. 15, 2441–2453 (2006)

    Article  Google Scholar 

  14. Shyu, S.J.: Image encryption by random grids. Pattern Recogn. 40, 1014–1031 (2007)

    Article  MATH  Google Scholar 

  15. Chen, T.H., Tsao, K.H.: Threshold visual secret sharing by random grids. J. Syst. Softw. 84, 1197–1208 (2011)

    Article  Google Scholar 

  16. Wu, X., Sun, W.: Random grid-based visual secret sharing with abilities of or and xor decryptions. J. Vis. Commun. Image Represent. 24, 48–62 (2013)

    Article  Google Scholar 

  17. Shyu, S.J.: Image encryption by multiple random grids. Pattern Recogn. 42, 1582–1596 (2009)

    Article  MATH  Google Scholar 

  18. Chen, T.H., Tsao, K.H.: Image encryption by (n, n) random grids. In: Proceedings of 18th Information Security Conference, Hualien, IEEE (2008)

    Google Scholar 

  19. Chen, T.H., Tsao, K.H.: Visual secret sharing by random grids revisited. Pattern Recogn. 42, 2203–2217 (2009)

    Article  MATH  Google Scholar 

  20. Yang, C.N.: New visual secret sharing schemes using probabilistic method. Pattern Recognit. Lett. 25, 481–494 (2004)

    Article  Google Scholar 

  21. Wang, D., Zhang, L., Ma, N., Li, X.: Two secret sharing schemese based on boolean operations. Pattern Recognit. 40, 2776–2785 (2007)

    Article  MATH  Google Scholar 

Download references

Acknowledgement

The authors would like to thank the anonymous reviewers for their valuable discussions and comments.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xuehu Yan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Chen, G., Wang, C., Yan, X., Li, P. (2015). Progressive Visual Secret Sharing with Multiple Decryptions and Unexpanded Shares. In: Shi, YQ., Kim, H., Pérez-González, F., Yang, CN. (eds) Digital-Forensics and Watermarking. IWDW 2014. Lecture Notes in Computer Science(), vol 9023. Springer, Cham. https://doi.org/10.1007/978-3-319-19321-2_28

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-19321-2_28

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-19320-5

  • Online ISBN: 978-3-319-19321-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics