Skip to main content
Log in

Preserving friendly stacking and weighted shadows in selective scalable secret image sharing

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

With advancement of technology, the technique of selective scalable secret image sharing (SSSIS) was first proposed in 2017 as a new alternative of secret image sharing. The region of interest (ROI) in the protected secret could be revealed progressively once the number of collected shadows has reached a predefined threshold. Accordingly, the ROIs of the secret image increase based on the number of collected shadows. Nonetheless, players without sufficient shadows may be able to learn the location and contour of hidden secret to perform advanced guessing attacks. Thus, we aim to introduce friendly stacking to yield a genuine outcome of mitigating this risk during the recovery process. Furthermore, the weighting concept is brought into constructing the meaningful shadow so that the priority of a specific participant can be emphasized to approach real applications.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. Bhattacharjee T, Maity SP, Islam SR (2018) Hierarchical secret image sharing scheme in compressed sensing. Signal Process Image Commun 61:21–32

    Article  Google Scholar 

  2. Chang CC, Hsieh YP, Lin CH (2008) Sharing secrets in Stego images with authentication. Signal Process Image Commun 41(10):3130–3137

    MATH  Google Scholar 

  3. Chen CC, Chen CC, Lin YC (2009) Weighted Modulated Secret Image Sharing Method. J Electron Imag 18(4):043011

    Article  Google Scholar 

  4. Chen YC, Lee JS, Su HC (2018) Selective scalable secret image sharing with adaptive pixel-embedding technique. Multimed Tools Appl 77(20):27107–27121

    Article  Google Scholar 

  5. Eslami Z, Ahmadabadi JZ (2011) Secret image sharing with authentication-chaining and dynamic embedding. J Syst Softw 84(5):803–809

    Article  Google Scholar 

  6. Hou YC, Quan ZY (2011) Progressive visual cryptography with unexpanded shares. IEEE Transac Circuits Syst Video Technol 21(11):1760–1764

    Article  Google Scholar 

  7. Jia X, Wang D, Nie D, Zhang C (2018) Collaborative visual cryptography schemes. IEEE Transac Circuits Syst Video Technol 28(5):1056–1070

    Article  Google Scholar 

  8. Kamble PR, Patil S (2018) “Exploring secret image sharing with embedding of shares”, International Conference on Inventive Systems and Control, pp. 1090–1093

  9. Lee JS, Chen YR (2017) Selective scalable secret image sharing with verification. Multimed Tools Appl 76(1):1–11

    Article  Google Scholar 

  10. Lee JS, Wen KR, Li B (2016) Renovating contaminative image archives based on patch propagation and adaptive confidence collation. IEEE Transac Circuits Syst Video Technol 26(5):1004–1011

    Article  Google Scholar 

  11. Li P, Liu ZQ, Yang CN (2018) A construction method of (t, k, n)-essential secret image sharing scheme. Signal Process Image Commun 65:210–220

    Article  Google Scholar 

  12. Lin CC, Tsai WH (2004) Secret image sharing with steganography and authentication. J Syst Softw 73(3):405–414

    Article  Google Scholar 

  13. Lin SJ, Chen LS, Lin JC (2009) Fast-weighted Secret Image Sharing. Opt Eng 48(7):077008

    Article  Google Scholar 

  14. Shamir A (1979) How to share a secret. Commun ACM 22(11):612–613

    Article  MathSciNet  MATH  Google Scholar 

  15. Shyu SJ, Chuang CC, Chen YR, Lai AF (2009) “Weighted Threshold Secret Image Sharing”, Proceedings of the 3rd Pacific Rim Symposium on Advances in Image and Video Technology. pp. 988–998

  16. Thien CC, Lin JC (2002) Secret image sharing. Comput Graph 26(5):765–770

    Article  Google Scholar 

  17. Wang RZ, Shyu SJ (2007) Scalable secret image sharing. Signal Process Image Commun 22(4):363–373

    Article  Google Scholar 

  18. Wang RZ, Su CH (2006) Secret image sharing with smaller shadow images. Pattern Recogn Lett 27(6):551–555

    Article  Google Scholar 

  19. Wang JD, Jiang HZ, Yuan ZJ, Cheng MM, Hu XW, Zheng NN (2017) Salient Object Detection: A Discriminative Regional Feature Integration Approach. Int J Comput Vis 123:251–268

    Article  Google Scholar 

  20. Wu XT, Yang CN (2019) Partial reversible AMBTC-based secret image sharing with steganography. Dig Sign Proc 93:22–23

    Article  Google Scholar 

  21. Xie XZ, Chang CC, Lin CC (2019) Reversibility-oriented secret image sharing mechanism with steganography and authentication based on code division multiplexing. IET Image Process 13(9):1411–1420

    Article  Google Scholar 

  22. Xiong LZ, Zhong XW, Yang CN (2020) DWT-SISA: a secure and effective discrete wavelet transform-based secret image sharing with authentication. Signal Process 173:107571

    Article  Google Scholar 

  23. Yang CN, Chu YY (2011) A general (k, n) scalable secret image sharing scheme with the smooth scalability. J Syst Softw 84(10):1726–1733

    Article  Google Scholar 

  24. Yang CN, Huang SM (2010) Constructions and properties of k out of n scalable secret image sharing. Opt Commun 283(9):1750–1762

    Article  Google Scholar 

  25. Yang CN, Chen TS, Yu KH, Wang CC (2007) Improvements of image sharing with steganography and authentication. J Syst Softw 80(7):1070–1076

    Article  Google Scholar 

  26. Yang CY, Wu CC, Lin YC (2019) K out of n region-based progressive visual cryptography. IEEE Transac Circuits Syst Video Technol 29(1):252–262

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ngoc-Tu Huynh.

Ethics declarations

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

Conflict of interest

The authors declare no conflicts of interest.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Lee, JS., Chen, YC., Hsieh, YH. et al. Preserving friendly stacking and weighted shadows in selective scalable secret image sharing. Multimed Tools Appl 82, 29283–29305 (2023). https://doi.org/10.1007/s11042-023-14712-7

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-14712-7

Keywords

Navigation