Abstract
This paper presents a novel highly efficient secret image sharing scheme that is symmetric, Boolean-based, secure, and enables multi-secret image sharing. The proposed (n, n) scheme involves sharing n secret images among n shared images and recovers all n secret images from n shared images, and losing any shared image prevents recovering any secret image. We propose a novel symmetric sharing-recovery function (SSRF) for performing sharing and recovery. The scheme is based on Boolean operations to attain low computational complexity and is more secure than previous Boolean-based schemes; it exhibits more randomness in each shared image, more randomness between two or more shared images, and higher shared image sensitivity. The experimental results showed that a similar CPU computation time is required for both generating shared images from secret images, and recovering secret images from shared images. Furthermore, the computation time of the SSRF is proportional to the number of secret images.








Similar content being viewed by others
References
Chen J, Chen YS, Hsu HC, Chen HW (2005) New visual cryptography system based on circular shadow image and fixed angle segmentation. J Electron Imaging 14:033018-1–033018-5
Chen CC, Fu WY (2008) A geometry-based secret image sharing approach. J Inf Sci Eng 24:1567–1577
Chen CC, Huang JY (2014) Progressive share of secret audio by Chinese remainder theorem and integer wavelet transform. Int J Electron Commerce Stud 5:219–232
Chen CC, Liu CA (2013) Tamper-Proof secret image sharing scheme for identifying cheated secret keys and shared images. J Electron Imaging 22:013008-1–013008-7
Chen TH, Wu CS (2011) Efficient multi-secret image sharing based on Boolean operations. Signal Process 91:90–97
Chen CC, Wu WJ (2014) A secure boolean-based multi-secret image sharing scheme. J Syst Softw 92:107–114
Dhara BC, Chanda B (2012) A fast progressive image transmission scheme using block truncation coding by pattern fitting. J Vis Commun Image Represent 23:313–322
Guo C, Chang CC, Qin C (2012) A hierarchical threshold secret image sharing. Pattern Recogn Lett 33:83–91
Hsu HC, Chen J, Chen TS, Lin YH (2007) Special type of circular visual cryptography for multiple secret hiding. Imaging Sci J 55:175–179
Huang CP, Hsieh CH, Huang PS (2010) Progressive sharing for a secret image. J Syst Softw 83:517–527
Huang R, Rhee KH, Uchida S (2014) A parallel image encryption method based on compressive sensing. Multimed Tools Appl 72:71–93
Lima JB, Lima EAO, Madeiro F (2013) Image encryption based on the finite field cosine transform. Signal Process Image Commun 28:1537–1547
Lin SJ, Chen SK, Lin JC (2010) Flip visual cryptography (FVC) with perfect security, conditionally-optimal contrast, and no expansion. J Vis Commun Image Represent 21:900–916
Lin PY, Lee JS, Chang CC (2009) Distortion-free secret image sharing mechanism using modulus operator. Pattern Recogn 42:886–895
Lin SJ, Lin JC (2007) VCPSS: a two-in-one two-decoding-options image sharing method combining visual cryptography (VC) and polynomial-style sharing (PSS) approaches. Pattern Recogn 40:3652–3666
Liu X, Cao Y, Lu P, Lu X, Li Y (2013) Optical image encryption technique based on compressed sensing and Arnold transformation. Optik-Int J Light Electron Opt 124:6590–6593
Shyu SJ, Chen YR (2008) Threshold Secret Image Sharing by Chinese Remainder Theorem. in: Proceedings of IEEE Asia-Pacific Services Computing 1332–1337.
Shyu SJ, Huang SY, Lee YK, Wang RZ, Chen K (2007) Sharing multiple secrets in visual cryptography. Pattern Recogn 40:3633–3651
Thien CC, Lin JC (2002) Secret image sharing. Comput Graph 26:765–770
Ulutas M, Ulutas G, Nabiyev V (2013) Invertible secret image sharing for gray level and dithered cover images. J Syst Softw 86:485–500
Wang RZ, Su CH (2006) Secret image sharing with smaller shadow images. Pattern Recogn Lett 27:551–555
Wang D, Zhang L, Ma N, Li X (2007) Two secret sharing schemes based on Boolean operations. Pattern Recogn 40:2776–2785
Wu HC, Chang CC (2005) Sharing visual multi-secrets using circle shares. Comput Stand Interfaces 28:123–135
Yang CN, Ciou CB (2010) Image secret sharing method with two-decoding-options: lossless recovery and previewing capability. Image Vis Comput 28:1600–1610
Yang CN, Ouyang JF, Harn L (2012) Steganography and authentication in image sharing without parity bits. Opt Commun 285:1725–1735
Acknowledgments
This paper was partially supported by the National Science Council of the Republic of China under contract MOST 103-2221-E-032-051.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Chen, CC., Wu, WJ. & Chen, JL. Highly efficient and secure multi-secret image sharing scheme. Multimed Tools Appl 75, 7113–7128 (2016). https://doi.org/10.1007/s11042-015-2634-1
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-015-2634-1