Skip to main content
Log in

Progressive visual secret sharing for general access structure with multiple decryptions

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Visual secret sharing (VSS) for general access structure (GAS) owns wider applications than (k,n) threshold VSS. VSS with multiple decryptions realizes the functionalities of both OR-based VSS (OVSS) and XOR-based VSS (XVSS), which can broaden the applications compared to one recovery method-based VSS. In this paper, we propose a progressive VSS (PVSS) scheme for GAS with the features of both OR and XOR decryptions based on random grid (RG). The different regions of the secret image and corresponding genearted random bits are employed to gain progressive property as well as GAS with OR and XOR decryptions. For the qualified sets, we can reconstruct the secret by stacking. On the other hand, if a device with XOR operation is available, we can improve the visual quality of the recovered secret image as well as reconstruct the secret image losslessly when we collect all the n shares. In addition, our scheme has neither pixel expansion nor codebook design due to RG. The effectiveness of the proposed scheme is shown in terms of experimental results and analyses.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Ateniese G, Blundo C, De Santis A, Stinson D R (1996) Visual cryptography for general access structures. Inf Comput 129(2):86–106

    Article  MathSciNet  MATH  Google Scholar 

  2. Cimato S, De Prisco R, De Santis A (2006) Probabilistic visual cryptography schemes. Comput J 49(1):97–107

    Article  MATH  Google Scholar 

  3. Chen TH, Tsao KH (2011) Threshold visual secret sharing by random grids. J Syst Softw 84(7):1197–1208

    Article  Google Scholar 

  4. De Prisco R, De Santis A (2014) On the relation of random grid and deterministic visual cryptography. IEEE Trans Inf Forensic Secur 9(3-4):653–665

    Article  Google Scholar 

  5. Fu ZX, Yu B (2014) Visual cryptography and random grids schemes DigitalForensics and Watermarking. Springer, Auckland, New Zealand, pp 109-122

    Google Scholar 

  6. Guo T, Liu F, Wu C (2014) k out of k extended visual cryptography scheme by random grids. Signal Process 94:90–101

    Article  Google Scholar 

  7. Guo T, Liu F, Wu C (2013) Threshold visual secret sharing by random grids with improved contrast. J Syst Softw 86(8):2094–2109

    Article  Google Scholar 

  8. Horng SJ, Tzeng SF, Pan Y, Fan P, Wang X, Li T (2013) Khan, MK: b-specs+: Batch verification for secure pseudonymous authentication in vanet. IEEE Trans Inf Forensic Secur 8(11):1860–1875

    Article  Google Scholar 

  9. Khan MK, Kumari S (2013) An authentication scheme for secure access to healthcare services. J Med Syst 37(4):9954

    Article  Google Scholar 

  10. Kuwakado H, Tanaka H (1999) Image size invariant visual cryptography. IEICE Trans Fundam Electron, Commun Comput Sci 82(10):2172–2177

    Google Scholar 

  11. Kafri O, Keren E (1987) Encryption of pictures and shapes by random grids. Opt Lett 12(6):377–379

    Article  Google Scholar 

  12. Kumar S, Sharma KR (2013) Secret image sharing for general access structures using random grids. Int J Comput Appl 83(7):1–8

    Google Scholar 

  13. Lee YS, Wang BJ, Chen TH (2013) Quality-improved threshold visual secret sharing scheme by random grids. Image Process IET 7(2):137–143

    Article  MathSciNet  Google Scholar 

  14. Li P, Ma PJ, Su XH, Yang CN (2012) Improvements of a two-in-one image secret sharing scheme based on gray mixing model. J Vis Commun Image Represent 23 (3):441–453

    Article  Google Scholar 

  15. Naor M, Shamir A Visual cryptography. In: Advances in CryptologyEUROCRYPT’94 Lecture Notes in Computer Science, Workshop on the Theory and Application of Cryptographic Techniques, May 9–12, Perugia, Italy, Springer (1995) pp 1–12

  16. Shyu SJ (2009) Image encryption by multiple random grids. Pattern Recogn 42:1582–1596

    Article  MATH  Google Scholar 

  17. Shyu SJ (2013) Visual cryptograms of random grids for general access structures. IEEE Trans Circ Syst Vid Technol 23(3):414–424

    Article  Google Scholar 

  18. Shyu SJ (2007) Image encryption by random grids. Pattern Recogn 40(3):1014–1031

    Article  MATH  Google Scholar 

  19. Tuyls P, Hollmann HD, Van Lint JH, LMGM T (2005) Xor-based visual cryptography schemes. Des, Codes Cryptogr 37:169–186

  20. Wang D, Zhang L, Ma N, Li X (2007) Two secret sharing schemes based on boolean operations. PatternRecognit 40(10):2776–2785

    MATH  Google Scholar 

  21. Wang Z, Arce GR, Di Crescenzo G (2009) Halftone visual cryptography via error diffusion. IEEE Trans Inf Forensic Secur 4(3):383–396

    Article  MATH  Google Scholar 

  22. Weir J, Yan W (2010) A comprehensive study of visual cryptography. In: In: Transactions on DHMS V, LNCS 6010. Springer-Verlag. Springer, Berlin, Heidelberg, pp 70-105

    Google Scholar 

  23. Wu X, Sun W (2012) Visual secret sharing for general access structures by random grids. Iet Inf Secur 6(4):299–309

    Article  Google Scholar 

  24. Wu X, Sun W (2013) Random grid-based visual secret sharing with abilities of or and xor decryptions. J Vis Commun Image Represent 24(1):48–62

    Article  Google Scholar 

  25. Wu X, Sun W (2014) Extended capabilities for xor-based visual cryptography. IEEE Trans Inf Forensic Secur 9(10):1592–1605

    Article  Google Scholar 

  26. Wu X, Sun W (2014) Improved tagged visual cryptography by random grids. Signal Process 97:64–82

    Article  Google Scholar 

  27. Yan X, Wang S, El-Latif AAA, Niu X Visual secret sharing based on random grids with abilities of and and xor lossless recovery. Multimedia Tools and Applications (2013) pp 1–22

  28. Yan X, Wang S, El-Latif AAA, Niu X Random grids-based visual secret sharing with improved visual quality via error diffusion. Multimedia Tools and Applications (2014) pp 1–18

  29. Yan X, Wang S, Niu X (2014) Threshold construction from specific cases in visual cryptography without the pixel expansion. Signal Process 105:389–398

    Article  Google Scholar 

  30. Yan X, Liu X, Yang CN An enhanced threshold visual secret sharing based on random grids. Journal of Real-Time Image Processing (2015) pp 1–13

  31. Yan X, Wang S, Niu X, Yang CN (2015) Random grid-based visual secret sharing with multiple decryptions. J Vis Commun Image Represent 26(0):94 – 104

    Article  Google Scholar 

  32. Yang CN (2004) New visual secret sharing schemes using probabilistic method. Pattern Recognit Lett 25(4):481–494

    Article  Google Scholar 

  33. Yang CN, Wu CC, Wang DS (2014) A discussion on the relationship between probabilistic visual cryptography and random grid. Inf Sci 278:141–173

    Article  MathSciNet  MATH  Google Scholar 

Download references

Acknowledgments

The authors would like to thank the anonymous reviewers for their valuable discussions and comments. This work is supported by the National Natural Science Foundation of China (Grant Number: 61602491) A preliminary short version of this paper appeared under the same title in Proceeding of 2016 8-th International Conference on IT in Medicine and Education (ITME 2016).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xuehu Yan.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yan, X., Lu, Y. Progressive visual secret sharing for general access structure with multiple decryptions. Multimed Tools Appl 77, 2653–2672 (2018). https://doi.org/10.1007/s11042-017-4421-7

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-017-4421-7

Keywords

Navigation