Abstract
Visual secret sharing (VSS) for general access structure (GAS) owns wider applications than (k,n) threshold VSS. VSS with multiple decryptions realizes the functionalities of both OR-based VSS (OVSS) and XOR-based VSS (XVSS), which can broaden the applications compared to one recovery method-based VSS. In this paper, we propose a progressive VSS (PVSS) scheme for GAS with the features of both OR and XOR decryptions based on random grid (RG). The different regions of the secret image and corresponding genearted random bits are employed to gain progressive property as well as GAS with OR and XOR decryptions. For the qualified sets, we can reconstruct the secret by stacking. On the other hand, if a device with XOR operation is available, we can improve the visual quality of the recovered secret image as well as reconstruct the secret image losslessly when we collect all the n shares. In addition, our scheme has neither pixel expansion nor codebook design due to RG. The effectiveness of the proposed scheme is shown in terms of experimental results and analyses.
Similar content being viewed by others
References
Ateniese G, Blundo C, De Santis A, Stinson D R (1996) Visual cryptography for general access structures. Inf Comput 129(2):86–106
Cimato S, De Prisco R, De Santis A (2006) Probabilistic visual cryptography schemes. Comput J 49(1):97–107
Chen TH, Tsao KH (2011) Threshold visual secret sharing by random grids. J Syst Softw 84(7):1197–1208
De Prisco R, De Santis A (2014) On the relation of random grid and deterministic visual cryptography. IEEE Trans Inf Forensic Secur 9(3-4):653–665
Fu ZX, Yu B (2014) Visual cryptography and random grids schemes DigitalForensics and Watermarking. Springer, Auckland, New Zealand, pp 109-122
Guo T, Liu F, Wu C (2014) k out of k extended visual cryptography scheme by random grids. Signal Process 94:90–101
Guo T, Liu F, Wu C (2013) Threshold visual secret sharing by random grids with improved contrast. J Syst Softw 86(8):2094–2109
Horng SJ, Tzeng SF, Pan Y, Fan P, Wang X, Li T (2013) Khan, MK: b-specs+: Batch verification for secure pseudonymous authentication in vanet. IEEE Trans Inf Forensic Secur 8(11):1860–1875
Khan MK, Kumari S (2013) An authentication scheme for secure access to healthcare services. J Med Syst 37(4):9954
Kuwakado H, Tanaka H (1999) Image size invariant visual cryptography. IEICE Trans Fundam Electron, Commun Comput Sci 82(10):2172–2177
Kafri O, Keren E (1987) Encryption of pictures and shapes by random grids. Opt Lett 12(6):377–379
Kumar S, Sharma KR (2013) Secret image sharing for general access structures using random grids. Int J Comput Appl 83(7):1–8
Lee YS, Wang BJ, Chen TH (2013) Quality-improved threshold visual secret sharing scheme by random grids. Image Process IET 7(2):137–143
Li P, Ma PJ, Su XH, Yang CN (2012) Improvements of a two-in-one image secret sharing scheme based on gray mixing model. J Vis Commun Image Represent 23 (3):441–453
Naor M, Shamir A Visual cryptography. In: Advances in CryptologyEUROCRYPT’94 Lecture Notes in Computer Science, Workshop on the Theory and Application of Cryptographic Techniques, May 9–12, Perugia, Italy, Springer (1995) pp 1–12
Shyu SJ (2009) Image encryption by multiple random grids. Pattern Recogn 42:1582–1596
Shyu SJ (2013) Visual cryptograms of random grids for general access structures. IEEE Trans Circ Syst Vid Technol 23(3):414–424
Shyu SJ (2007) Image encryption by random grids. Pattern Recogn 40(3):1014–1031
Tuyls P, Hollmann HD, Van Lint JH, LMGM T (2005) Xor-based visual cryptography schemes. Des, Codes Cryptogr 37:169–186
Wang D, Zhang L, Ma N, Li X (2007) Two secret sharing schemes based on boolean operations. PatternRecognit 40(10):2776–2785
Wang Z, Arce GR, Di Crescenzo G (2009) Halftone visual cryptography via error diffusion. IEEE Trans Inf Forensic Secur 4(3):383–396
Weir J, Yan W (2010) A comprehensive study of visual cryptography. In: In: Transactions on DHMS V, LNCS 6010. Springer-Verlag. Springer, Berlin, Heidelberg, pp 70-105
Wu X, Sun W (2012) Visual secret sharing for general access structures by random grids. Iet Inf Secur 6(4):299–309
Wu X, Sun W (2013) Random grid-based visual secret sharing with abilities of or and xor decryptions. J Vis Commun Image Represent 24(1):48–62
Wu X, Sun W (2014) Extended capabilities for xor-based visual cryptography. IEEE Trans Inf Forensic Secur 9(10):1592–1605
Wu X, Sun W (2014) Improved tagged visual cryptography by random grids. Signal Process 97:64–82
Yan X, Wang S, El-Latif AAA, Niu X Visual secret sharing based on random grids with abilities of and and xor lossless recovery. Multimedia Tools and Applications (2013) pp 1–22
Yan X, Wang S, El-Latif AAA, Niu X Random grids-based visual secret sharing with improved visual quality via error diffusion. Multimedia Tools and Applications (2014) pp 1–18
Yan X, Wang S, Niu X (2014) Threshold construction from specific cases in visual cryptography without the pixel expansion. Signal Process 105:389–398
Yan X, Liu X, Yang CN An enhanced threshold visual secret sharing based on random grids. Journal of Real-Time Image Processing (2015) pp 1–13
Yan X, Wang S, Niu X, Yang CN (2015) Random grid-based visual secret sharing with multiple decryptions. J Vis Commun Image Represent 26(0):94 – 104
Yang CN (2004) New visual secret sharing schemes using probabilistic method. Pattern Recognit Lett 25(4):481–494
Yang CN, Wu CC, Wang DS (2014) A discussion on the relationship between probabilistic visual cryptography and random grid. Inf Sci 278:141–173
Acknowledgments
The authors would like to thank the anonymous reviewers for their valuable discussions and comments. This work is supported by the National Natural Science Foundation of China (Grant Number: 61602491) A preliminary short version of this paper appeared under the same title in Proceeding of 2016 8-th International Conference on IT in Medicine and Education (ITME 2016).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Yan, X., Lu, Y. Progressive visual secret sharing for general access structure with multiple decryptions. Multimed Tools Appl 77, 2653–2672 (2018). https://doi.org/10.1007/s11042-017-4421-7
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-017-4421-7