Skip to main content
Log in

A novel two-in-one image secret sharing scheme based on perfect black visual cryptography

  • Special Issue Paper
  • Published:
Journal of Real-Time Image Processing Aims and scope Submit manuscript

Abstract

Perfect black visual cryptography scheme (PBVCS) shares a binary secret image into n shadows. Stacking any \(k(k<n)\) shadows can reveal a vague secret image, and the black area of the secret image is recovered as perfect black. Two-in-one image secret sharing (TiOISS) scheme is a secret image sharing method with two decoding options. It can not only decode a vague secret image by stacking any k shadows, but also reveal the original grayscale secret image with k shadows by computation. Researchers proposed some TiOISS schemes, which are based on visual cryptography and polynomial-based image secret sharing (PISS). Since PISS reveals the secret image by Lagrange’s interpolation, these TiOISS schemes need complex computation. In this paper, we proposed a novel TiOISS scheme based on PBVCS using exclusive OR operation. Compared with literature TiOISS schemes, our scheme does not need complex computation in revealing process, and it can be used in real-time application. The grayscale secret image can be recovered quickly with a few Boolean operations.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Shamir, A.: How to share a secret. Commun. Assoc. Comput. Mach. 22, 612–613 (1979)

    MathSciNet  MATH  Google Scholar 

  2. Thien, C.C., Lin, J.C.: Secret image sharing. Comput. Graph. 26, 765770 (2002)

    Article  Google Scholar 

  3. Yang, C.N., Chen, T.S., Yu, K.H., Wang, C.C.: Improvements of image sharing with steganography and authentication. J. Syst. Softw. 80, 1070–1076 (2007)

    Article  Google Scholar 

  4. Wang, R.Z., Shyu, S.J.: Scalable secret image sharing. Sig. Process. Image Commun. 22, 363–373 (2007)

    Article  Google Scholar 

  5. Yang, C.N., Huang, S.M.: Constructions and properties of k out of n scalable secret image sharing. Opt. Commun. 283, 17501762 (2010)

    Google Scholar 

  6. Naor, M., Shamir, A.: Visual cryptography. In EUROCRYPT’94, Lecture Notes in Computer Science, vol. 950, pp. 1–12. Springer (1995)

  7. Yang, C.N., Chen, T.S.: Extended visual secret sharing schemes: improving the shadow image quality. Int. J. Pattern Recognit. Artif. Intell. 21, 879898 (2007)

    Google Scholar 

  8. Liu, F., Wu, C.K.: Embedded extended visual cryptography schemes. IEEE Trans. Inf. Forensics Secur. 6, 307–322 (2011)

    Article  Google Scholar 

  9. Yang, C.N., Chen, T.S.: Colored visual cryptography scheme based on additive color mixing. Pattern Recogn. 41, 31143129 (2008)

    Google Scholar 

  10. Shyu, S.J.: Efficient visual secret sharing scheme for color images. Pattern Recogn. 39, 866880 (2006)

    Article  MATH  Google Scholar 

  11. Liu, F., Wu, C.K., Lin, X.J.: Color visual cryptography schemes. IET Inf. Secur. 2, 151–165 (2008)

    Article  Google Scholar 

  12. Lin, S.J., Lin, J.C.: VCPSS: a two-in-one two-decoding-options image sharing method combining visual cryptography (VC) and polynomial-style sharing (PSS) approaches. Pattern Recogn. 40, 3652–3666 (2007)

    Article  MATH  Google Scholar 

  13. Yang, C.N., Ciou, C.B.: Image secret sharing method with two-decoding-options: lossless recovery and previewing capability. Image Vis. Comput. 28, 1600–1610 (2010)

    Article  Google Scholar 

  14. Li, P., Ma, P.J., Su, X.H., Yang, C.N.: Improvements of a two-in-one image secret sharing scheme based on gray mixing model. J. Vis. Commun. Image Represent. 23, 441453 (2012)

    Google Scholar 

  15. Li, P., Yang, C.N., Kong, Q., Ma, Y., Liu, Z.: Sharing more information in gray visual cryptography scheme. J. Vis. Commun. Image Represent. 24, 1380–1393 (2013)

    Article  Google Scholar 

  16. Wang, D., Zhang, L., Ma, N., Li, X.: Two secret sharing schemes based on Boolean operations. Pattern Recogn. 40, 2776–2785 (2007)

    Article  MATH  Google Scholar 

  17. Chao, K.Y., Lin, J.C.: Secret image sharing: a Boolean-operations-based approach combining benefits of polynomial-based and fast approaches. Int. J. Pattern Recognit. Artif. Intell. 23, 263285 (2009)

    Article  Google Scholar 

  18. Li, P., Yang, C.N., Kong, Q.: Two-in-one image secret sharing scheme based on Boolean operations. In: Accepted by IWDW 2014 (13th International Workshop on Digital-forensics and Watermarking), Lecture Notes in Computer Science, 2015, vol. 9023, pp 305–318, Taibei, 1 Oct–4 Oct (2014)

  19. Viet, D.Q., Kurosawa, K.: Almost ideal contrast visual cryptography with reversing. Lect. Notes Comput. Sci. 2964, 353–365 (2004)

    Article  MathSciNet  MATH  Google Scholar 

Download references

Acknowledgments

This work is supported in part by the Natural Science Funds of Hebei (Grant No. F2015502014), and Ministry of Science and Technology, Taiwan, under Grant 104-2918-I-259-001 and 104-2221-E-259-013.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Peng Li.

Additional information

A preliminary version of this paper appeared under the title ‘Two-in-one secret image sharing scheme based on Boolean operations’ in Proceeding of 13-th International Workshop on Digital-forensics and Watermarking (IWDW 2014) [18].

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Li, P., Yang, CN. & Kong, Q. A novel two-in-one image secret sharing scheme based on perfect black visual cryptography. J Real-Time Image Proc 14, 41–50 (2018). https://doi.org/10.1007/s11554-016-0621-z

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11554-016-0621-z

Keywords

Navigation