Abstract
With advancement of technology, the technique of selective scalable secret image sharing (SSSIS) was first proposed in 2017 as a new alternative of secret image sharing. The region of interest (ROI) in the protected secret could be revealed progressively once the number of collected shadows has reached a predefined threshold. Accordingly, the ROIs of the secret image increase based on the number of collected shadows. Nonetheless, players without sufficient shadows may be able to learn the location and contour of hidden secret to perform advanced guessing attacks. Thus, we aim to introduce friendly stacking to yield a genuine outcome of mitigating this risk during the recovery process. Furthermore, the weighting concept is brought into constructing the meaningful shadow so that the priority of a specific participant can be emphasized to approach real applications.
Similar content being viewed by others
References
Bhattacharjee T, Maity SP, Islam SR (2018) Hierarchical secret image sharing scheme in compressed sensing. Signal Process Image Commun 61:21–32
Chang CC, Hsieh YP, Lin CH (2008) Sharing secrets in Stego images with authentication. Signal Process Image Commun 41(10):3130–3137
Chen CC, Chen CC, Lin YC (2009) Weighted Modulated Secret Image Sharing Method. J Electron Imag 18(4):043011
Chen YC, Lee JS, Su HC (2018) Selective scalable secret image sharing with adaptive pixel-embedding technique. Multimed Tools Appl 77(20):27107–27121
Eslami Z, Ahmadabadi JZ (2011) Secret image sharing with authentication-chaining and dynamic embedding. J Syst Softw 84(5):803–809
Hou YC, Quan ZY (2011) Progressive visual cryptography with unexpanded shares. IEEE Transac Circuits Syst Video Technol 21(11):1760–1764
Jia X, Wang D, Nie D, Zhang C (2018) Collaborative visual cryptography schemes. IEEE Transac Circuits Syst Video Technol 28(5):1056–1070
Kamble PR, Patil S (2018) “Exploring secret image sharing with embedding of shares”, International Conference on Inventive Systems and Control, pp. 1090–1093
Lee JS, Chen YR (2017) Selective scalable secret image sharing with verification. Multimed Tools Appl 76(1):1–11
Lee JS, Wen KR, Li B (2016) Renovating contaminative image archives based on patch propagation and adaptive confidence collation. IEEE Transac Circuits Syst Video Technol 26(5):1004–1011
Li P, Liu ZQ, Yang CN (2018) A construction method of (t, k, n)-essential secret image sharing scheme. Signal Process Image Commun 65:210–220
Lin CC, Tsai WH (2004) Secret image sharing with steganography and authentication. J Syst Softw 73(3):405–414
Lin SJ, Chen LS, Lin JC (2009) Fast-weighted Secret Image Sharing. Opt Eng 48(7):077008
Shamir A (1979) How to share a secret. Commun ACM 22(11):612–613
Shyu SJ, Chuang CC, Chen YR, Lai AF (2009) “Weighted Threshold Secret Image Sharing”, Proceedings of the 3rd Pacific Rim Symposium on Advances in Image and Video Technology. pp. 988–998
Thien CC, Lin JC (2002) Secret image sharing. Comput Graph 26(5):765–770
Wang RZ, Shyu SJ (2007) Scalable secret image sharing. Signal Process Image Commun 22(4):363–373
Wang RZ, Su CH (2006) Secret image sharing with smaller shadow images. Pattern Recogn Lett 27(6):551–555
Wang JD, Jiang HZ, Yuan ZJ, Cheng MM, Hu XW, Zheng NN (2017) Salient Object Detection: A Discriminative Regional Feature Integration Approach. Int J Comput Vis 123:251–268
Wu XT, Yang CN (2019) Partial reversible AMBTC-based secret image sharing with steganography. Dig Sign Proc 93:22–23
Xie XZ, Chang CC, Lin CC (2019) Reversibility-oriented secret image sharing mechanism with steganography and authentication based on code division multiplexing. IET Image Process 13(9):1411–1420
Xiong LZ, Zhong XW, Yang CN (2020) DWT-SISA: a secure and effective discrete wavelet transform-based secret image sharing with authentication. Signal Process 173:107571
Yang CN, Chu YY (2011) A general (k, n) scalable secret image sharing scheme with the smooth scalability. J Syst Softw 84(10):1726–1733
Yang CN, Huang SM (2010) Constructions and properties of k out of n scalable secret image sharing. Opt Commun 283(9):1750–1762
Yang CN, Chen TS, Yu KH, Wang CC (2007) Improvements of image sharing with steganography and authentication. J Syst Softw 80(7):1070–1076
Yang CY, Wu CC, Lin YC (2019) K out of n region-based progressive visual cryptography. IEEE Transac Circuits Syst Video Technol 29(1):252–262
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.
Conflict of interest
The authors declare no conflicts of interest.
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Lee, JS., Chen, YC., Hsieh, YH. et al. Preserving friendly stacking and weighted shadows in selective scalable secret image sharing. Multimed Tools Appl 82, 29283–29305 (2023). https://doi.org/10.1007/s11042-023-14712-7
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-023-14712-7