Abstract
Perfect black visual cryptography scheme (PBVCS) shares a binary secret image into n shadows. Stacking any \(k(k<n)\) shadows can reveal a vague secret image, and the black area of the secret image is recovered as perfect black. Two-in-one image secret sharing (TiOISS) scheme is a secret image sharing method with two decoding options. It can not only decode a vague secret image by stacking any k shadows, but also reveal the original grayscale secret image with k shadows by computation. Researchers proposed some TiOISS schemes, which are based on visual cryptography and polynomial-based image secret sharing (PISS). Since PISS reveals the secret image by Lagrange’s interpolation, these TiOISS schemes need complex computation. In this paper, we proposed a novel TiOISS scheme based on PBVCS using exclusive OR operation. Compared with literature TiOISS schemes, our scheme does not need complex computation in revealing process, and it can be used in real-time application. The grayscale secret image can be recovered quickly with a few Boolean operations.
Similar content being viewed by others
References
Shamir, A.: How to share a secret. Commun. Assoc. Comput. Mach. 22, 612–613 (1979)
Thien, C.C., Lin, J.C.: Secret image sharing. Comput. Graph. 26, 765770 (2002)
Yang, C.N., Chen, T.S., Yu, K.H., Wang, C.C.: Improvements of image sharing with steganography and authentication. J. Syst. Softw. 80, 1070–1076 (2007)
Wang, R.Z., Shyu, S.J.: Scalable secret image sharing. Sig. Process. Image Commun. 22, 363–373 (2007)
Yang, C.N., Huang, S.M.: Constructions and properties of k out of n scalable secret image sharing. Opt. Commun. 283, 17501762 (2010)
Naor, M., Shamir, A.: Visual cryptography. In EUROCRYPT’94, Lecture Notes in Computer Science, vol. 950, pp. 1–12. Springer (1995)
Yang, C.N., Chen, T.S.: Extended visual secret sharing schemes: improving the shadow image quality. Int. J. Pattern Recognit. Artif. Intell. 21, 879898 (2007)
Liu, F., Wu, C.K.: Embedded extended visual cryptography schemes. IEEE Trans. Inf. Forensics Secur. 6, 307–322 (2011)
Yang, C.N., Chen, T.S.: Colored visual cryptography scheme based on additive color mixing. Pattern Recogn. 41, 31143129 (2008)
Shyu, S.J.: Efficient visual secret sharing scheme for color images. Pattern Recogn. 39, 866880 (2006)
Liu, F., Wu, C.K., Lin, X.J.: Color visual cryptography schemes. IET Inf. Secur. 2, 151–165 (2008)
Lin, S.J., Lin, J.C.: VCPSS: a two-in-one two-decoding-options image sharing method combining visual cryptography (VC) and polynomial-style sharing (PSS) approaches. Pattern Recogn. 40, 3652–3666 (2007)
Yang, C.N., Ciou, C.B.: Image secret sharing method with two-decoding-options: lossless recovery and previewing capability. Image Vis. Comput. 28, 1600–1610 (2010)
Li, P., Ma, P.J., Su, X.H., Yang, C.N.: Improvements of a two-in-one image secret sharing scheme based on gray mixing model. J. Vis. Commun. Image Represent. 23, 441453 (2012)
Li, P., Yang, C.N., Kong, Q., Ma, Y., Liu, Z.: Sharing more information in gray visual cryptography scheme. J. Vis. Commun. Image Represent. 24, 1380–1393 (2013)
Wang, D., Zhang, L., Ma, N., Li, X.: Two secret sharing schemes based on Boolean operations. Pattern Recogn. 40, 2776–2785 (2007)
Chao, K.Y., Lin, J.C.: Secret image sharing: a Boolean-operations-based approach combining benefits of polynomial-based and fast approaches. Int. J. Pattern Recognit. Artif. Intell. 23, 263285 (2009)
Li, P., Yang, C.N., Kong, Q.: Two-in-one image secret sharing scheme based on Boolean operations. In: Accepted by IWDW 2014 (13th International Workshop on Digital-forensics and Watermarking), Lecture Notes in Computer Science, 2015, vol. 9023, pp 305–318, Taibei, 1 Oct–4 Oct (2014)
Viet, D.Q., Kurosawa, K.: Almost ideal contrast visual cryptography with reversing. Lect. Notes Comput. Sci. 2964, 353–365 (2004)
Acknowledgments
This work is supported in part by the Natural Science Funds of Hebei (Grant No. F2015502014), and Ministry of Science and Technology, Taiwan, under Grant 104-2918-I-259-001 and 104-2221-E-259-013.
Author information
Authors and Affiliations
Corresponding author
Additional information
A preliminary version of this paper appeared under the title ‘Two-in-one secret image sharing scheme based on Boolean operations’ in Proceeding of 13-th International Workshop on Digital-forensics and Watermarking (IWDW 2014) [18].
Rights and permissions
About this article
Cite this article
Li, P., Yang, CN. & Kong, Q. A novel two-in-one image secret sharing scheme based on perfect black visual cryptography. J Real-Time Image Proc 14, 41–50 (2018). https://doi.org/10.1007/s11554-016-0621-z
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11554-016-0621-z