Skip to main content
Log in

A grouped-scalable secret image sharing scheme

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

This paper addresses the problem of sharing the secret image among several groups with different priorities, resulting in a scheme of grouped-scalable secret image sharing. Our scheme is based on the concepts of bit-plane decomposition and Shamir’s (k, n)-threshold scheme: first, the secret image is decomposed into several subimages of different quality; second, each subimage is shared to generate shadows which are then embedded into the corresponding cover image by steganography, generating a group of stego images. The stego images in the same group are distributed to some specified participants with the same priority. At the receiver side, each subimage can be reconstructed only if more than k different shadows of the same group are provided, while the cooperation of fewer than k participants in each group or more than k participants from different groups cannot obtain anything about the subimage. Scalable recovering of the secret image is achieved when different groups offer their restored subimages. The lossless restoration of the secret image and cover images can be achieved when all of the subimages are available. The experimental results show the superiority of our scheme for grouped-management applications of secret images.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  1. Blakley GR (1979) Safeguarding cryptographic keys. Proc AFIPS National Comput Conf 48:313–317

    Google Scholar 

  2. Chang CC, Hsieh YP, Liao CC (2011) A visual secret sharing scheme for progressively restoring secrets. J Electron Sci Technol 9(4):325–331

    Google Scholar 

  3. Chang CC, Lin CC, Lin CH et al (2008) A novel secret image sharing scheme in color images using small shadow images. Inf Sci 178(11):2433–2447

    Article  MathSciNet  Google Scholar 

  4. Chen SK, Lin JC (2005) Fault-tolerant and progressive transmission of images. Pattern Recogn 38(12):2466–2471

    Article  Google Scholar 

  5. Chen TH, Wu CS (2011) Efficient multi-secret image sharing based on Boolean operations. Signal Process 91(1):90–97

    Article  MATH  Google Scholar 

  6. Dastanian R, Shahhoseini HS (2011) Multi secret sharing scheme for encrypting two secret images into two shares. Proc IPCSIT 2011 Int Conf Inf Electron Eng 6:171–175

    Google Scholar 

  7. Dehkordi MH, Mashhadi S (2008) New efficient and practical verifiable multi-secret sharing schemes. Inf Sci 178(9):2262–2274

    Article  MATH  Google Scholar 

  8. Fang WP (2007) Multi-layer progressive secret image sharing. Proceedings of the 7th WSEAS International Conference on Signal Processing, Computational Geometry & Artificial Vision: 112–116

  9. Fang WP (2008) Friendly progressive visual secret sharing. Pattern Recogn 41(4):1410–1414

    Article  MATH  Google Scholar 

  10. Guo C, Chang CC, Qin C (2012) A hierarchical threshold secret image sharing. Pattern Recogn Lett 33(1):83–91

    Article  Google Scholar 

  11. Guo C, Chang CC, Qin C (2012) A multi-threshold secret image sharing scheme based on MSP. Pattern Recogn Lett 33(12):1594–1600

    Article  Google Scholar 

  12. Guo C, Wang ZH, Chang CC et al (2011) A secret image sharing scheme with high quality shadows based on exploiting modification direction. J Multimedia 6(4):341–348

    Article  Google Scholar 

  13. Huang CP, Hsieh CH, Huang PS (2010) Progressive sharing for a secret image. J Syst Softw 83(3):517–527

    Article  Google Scholar 

  14. Kong J, Zhang YF, Meng XB et al (2007) Bio-Inspired Computational Intelligence and Applications, A scalable secret image sharing method based on discrete wavelet transform. Springer, Berlin Heidelberg, pp 736–745

    Book  Google Scholar 

  15. Lin PY, Chan CS (2010) Invertible secret image sharing with steganography. Pattern Recogn Lett 31(13):1887–1893

    Article  MathSciNet  Google Scholar 

  16. Lin TL, Horng SJ, Lee KH, Chiu PL, Kao TW, Chen YH et al (2010) A novel visual secret sharing scheme for multiple secrets without pixel expansion. Expert Syst Appl 37(12):7858–7869

    Article  Google Scholar 

  17. Lin PY, Lee JS, Chang CC (2009) Distortion-free secret image sharing mechanism using modulus operator. Pattern Recogn 42(5):886–895

    Article  MATH  Google Scholar 

  18. Lukac R, Plataniotis KN (2005) Bit-level based secret sharing for image encryption. Pattern Recogn 38(5):767–772

    Article  MATH  Google Scholar 

  19. Naor M, Shamir A (1995) Visual cryptography. Advances in cryptography: Eurocrypt’94. Springer, Berlin, pp 1–12

    Google Scholar 

  20. Shamir A (1979) How to share a secret. Commun ACM 22(11):612–613

    Article  MATH  MathSciNet  Google Scholar 

  21. Tassa T (2007) Hierarchical threshold secret sharing. J Cryptol 20(2):237–264

    Article  MathSciNet  Google Scholar 

  22. Wang RZ, Shyu SJ (2007) Scalable secret image sharing. Signal Process Image Commun 22(4):363–373

    Article  Google Scholar 

  23. Wang RZ, Su CH (2006) Secret image sharing with smaller shadow images. Pattern Recogn Lett 27(6):551–555

    Article  Google Scholar 

Download references

Acknowledgments

This work was supported in part by NSFC (No. 61272262), Shanxi NSF (No. 2012011014-3), Youth Science and Technology Research Foundation of TYUST (No.20123004).

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Anhong Wang or Chin-Chen Chang.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Liu, W., Wang, A., Chang, CC. et al. A grouped-scalable secret image sharing scheme. Multimed Tools Appl 74, 7095–7109 (2015). https://doi.org/10.1007/s11042-014-1953-y

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-014-1953-y

Keywords