Abstract
This paper addresses the problem of sharing the secret image among several groups with different priorities, resulting in a scheme of grouped-scalable secret image sharing. Our scheme is based on the concepts of bit-plane decomposition and Shamir’s (k, n)-threshold scheme: first, the secret image is decomposed into several subimages of different quality; second, each subimage is shared to generate shadows which are then embedded into the corresponding cover image by steganography, generating a group of stego images. The stego images in the same group are distributed to some specified participants with the same priority. At the receiver side, each subimage can be reconstructed only if more than k different shadows of the same group are provided, while the cooperation of fewer than k participants in each group or more than k participants from different groups cannot obtain anything about the subimage. Scalable recovering of the secret image is achieved when different groups offer their restored subimages. The lossless restoration of the secret image and cover images can be achieved when all of the subimages are available. The experimental results show the superiority of our scheme for grouped-management applications of secret images.











Similar content being viewed by others
References
Blakley GR (1979) Safeguarding cryptographic keys. Proc AFIPS National Comput Conf 48:313–317
Chang CC, Hsieh YP, Liao CC (2011) A visual secret sharing scheme for progressively restoring secrets. J Electron Sci Technol 9(4):325–331
Chang CC, Lin CC, Lin CH et al (2008) A novel secret image sharing scheme in color images using small shadow images. Inf Sci 178(11):2433–2447
Chen SK, Lin JC (2005) Fault-tolerant and progressive transmission of images. Pattern Recogn 38(12):2466–2471
Chen TH, Wu CS (2011) Efficient multi-secret image sharing based on Boolean operations. Signal Process 91(1):90–97
Dastanian R, Shahhoseini HS (2011) Multi secret sharing scheme for encrypting two secret images into two shares. Proc IPCSIT 2011 Int Conf Inf Electron Eng 6:171–175
Dehkordi MH, Mashhadi S (2008) New efficient and practical verifiable multi-secret sharing schemes. Inf Sci 178(9):2262–2274
Fang WP (2007) Multi-layer progressive secret image sharing. Proceedings of the 7th WSEAS International Conference on Signal Processing, Computational Geometry & Artificial Vision: 112–116
Fang WP (2008) Friendly progressive visual secret sharing. Pattern Recogn 41(4):1410–1414
Guo C, Chang CC, Qin C (2012) A hierarchical threshold secret image sharing. Pattern Recogn Lett 33(1):83–91
Guo C, Chang CC, Qin C (2012) A multi-threshold secret image sharing scheme based on MSP. Pattern Recogn Lett 33(12):1594–1600
Guo C, Wang ZH, Chang CC et al (2011) A secret image sharing scheme with high quality shadows based on exploiting modification direction. J Multimedia 6(4):341–348
Huang CP, Hsieh CH, Huang PS (2010) Progressive sharing for a secret image. J Syst Softw 83(3):517–527
Kong J, Zhang YF, Meng XB et al (2007) Bio-Inspired Computational Intelligence and Applications, A scalable secret image sharing method based on discrete wavelet transform. Springer, Berlin Heidelberg, pp 736–745
Lin PY, Chan CS (2010) Invertible secret image sharing with steganography. Pattern Recogn Lett 31(13):1887–1893
Lin TL, Horng SJ, Lee KH, Chiu PL, Kao TW, Chen YH et al (2010) A novel visual secret sharing scheme for multiple secrets without pixel expansion. Expert Syst Appl 37(12):7858–7869
Lin PY, Lee JS, Chang CC (2009) Distortion-free secret image sharing mechanism using modulus operator. Pattern Recogn 42(5):886–895
Lukac R, Plataniotis KN (2005) Bit-level based secret sharing for image encryption. Pattern Recogn 38(5):767–772
Naor M, Shamir A (1995) Visual cryptography. Advances in cryptography: Eurocrypt’94. Springer, Berlin, pp 1–12
Shamir A (1979) How to share a secret. Commun ACM 22(11):612–613
Tassa T (2007) Hierarchical threshold secret sharing. J Cryptol 20(2):237–264
Wang RZ, Shyu SJ (2007) Scalable secret image sharing. Signal Process Image Commun 22(4):363–373
Wang RZ, Su CH (2006) Secret image sharing with smaller shadow images. Pattern Recogn Lett 27(6):551–555
Acknowledgments
This work was supported in part by NSFC (No. 61272262), Shanxi NSF (No. 2012011014-3), Youth Science and Technology Research Foundation of TYUST (No.20123004).
Author information
Authors and Affiliations
Corresponding authors
Rights and permissions
About this article
Cite this article
Liu, W., Wang, A., Chang, CC. et al. A grouped-scalable secret image sharing scheme. Multimed Tools Appl 74, 7095–7109 (2015). https://doi.org/10.1007/s11042-014-1953-y
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-014-1953-y