Skip to main content
Log in

A novel mapping-based lossless recovery algorithm for VSS

  • Special Issue Paper
  • Published:
Journal of Real-Time Image Processing Aims and scope Submit manuscript

Abstract

The disadvantages of the existing lossless recovery algorithms in visual secret sharing (VSS) are that n shadow images or complex computation operation (i.e., Lagrange interpolations) is required in the recovering phase. Inspired by this, a novel mapping-based lossless recovery algorithm (MbLRA) for VSS is proposed in this paper. MbLRA at least has two merits: (1) compared with the previous schemes, less number of shadow images (may be n or less than n) are required in the proceeding of lossless recovery. (2) Secret image can be reconstructed losslessly by using simple addition operation. The MbLRA proves that the condition of lossless recovery is \(\xi 0_n \cap \xi 1_n =\emptyset \) and \(t_r\) is the least number of the shadow images which can recover the secret losslessly by analyzing the Hamming weight of adding all n shadows. Experiments are conducted to evaluate the efficiency of the proposed scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Yan, X., Wang, S., El-Latif, A.A.A., Niu, X.: A novel perceptual secret sharing scheme. In: Transactions on Data Hiding and Multimedia Security (DHMS), pp. 68–90. Springer (2013)

  2. Naor, M., Shamir, A.: Visual cryptography. In: Advances in CryptologyEUROCRYPT’94 Lecture Notes in Computer Science, Workshop on the Theory and Application of Cryptographic Techniques, May 9C12, pp. 1–12. Springer, Perugia, Italy (1995)

  3. Yang, C.N.: New visual secret sharing schemes using probabilistic method. Pattern Recognit. Lett. 25(4), 481–494 (2004)

    Article  Google Scholar 

  4. Cimato, S., De Prisco, R., De Santis, A.: Probabilistic visual cryptography schemes. Comput. J. 49(1), 97–107 (2006)

    Article  MATH  Google Scholar 

  5. Kafri, O., Keren, E.: Encryption of pictures and shapes by random grids. Opt. Lett. 12(6), 377–379 (1987)

    Article  Google Scholar 

  6. Liu, F., Wu, C., Qian, L., et al.: Improving the visual quality of size invariant visual cryptography scheme. J. Vis. Commun. Image Represent. 23(2), 331–342 (2012)

    Article  Google Scholar 

  7. Shyu, S.J.: Image encryption by multiple random grids. Pattern Recogn. 42, 1582–1596 (2009)

    Article  MATH  Google Scholar 

  8. Yan, X., Wang, S., Niu, X.: Threshold construction from specific cases in visual cryptography without the pixel expansion. Sig. Process. 105, 389–398 (2014)

    Article  Google Scholar 

  9. Chen, T.H., Tsao, K.H.: Threshold visual secret sharing by random grids. J. Syst. Softw. 84(7), 1197–1208 (2011)

    Article  Google Scholar 

  10. Chen, T.H., Tsao, K.H.: Image encryption by (n,n) random grids. In: Proceedings of 18th Information Security Conference, Hualien (2008)

  11. Wu, X., Sun, W.: Improving the visual quality of random grid-based visual secret sharing. Sig. Process. 93(5), 977–995 (2013)

    Article  Google Scholar 

  12. X. Yan, X. Liu, Yang, C.N.: An enhanced threshold visual secret sharing based on random grids. J. Real Time Image Process. 1–13 (2015)

  13. Tuyls, P., Hollmann, H.D., Van Lint, J.H.: Xor-based visual cryptography schemes. Des. Codes Crypt. 37, 169–186 (2012)

    Article  MathSciNet  MATH  Google Scholar 

  14. Chen, G., Wang, C., Yan, X., Li, P.: Progressive Visual Secret Sharing with Multiple Decryptions and Unexpanded Shares. Digital-Forensics and Watermarking—13th International Workshop (IWDW), Taiwan (2014)

  15. Wu, X., Sun, W.: Random grid-based visual secret sharing with abilities of OR and XOR decryptions. J. Vis. Commun. Image Represent. 37, 48–62 (2013)

    Article  Google Scholar 

  16. Yan, X., Wang, S., El-Latif, A.A.A., Niu, X.: Visual secret sharing based on random grids with abilities of And and Xor lossless recovery. Multimed. Tools Appl. 74(9), 3231–3252 (2015)

    Article  Google Scholar 

  17. Lin, S.J., Lin, J.C.: VCPSS: a two-in-one two-decoding-options image sharing method combining visual cryptography (VC) and polynomial-style sharing (PSS) approaches. Pattern Recogn. 40(12), 3652–3666 (2007)

    Article  MATH  Google Scholar 

  18. Hou, Y.C., Quan, Z.Y.: Progressive visual cryptography with unexpanded shares. IEEE Trans. Circ. Syst. Video Technol. 21(11), 1760C–1764 (2011)

    Article  Google Scholar 

  19. Jos Ferreirs, Domnguez: Labyrinth of thought: a history of set theory and its role in modern mathematics. Hist. Philos. Logic 30(3), 301–305 (2009)

    Article  Google Scholar 

Download references

Acknowledgments

This work is supported by the National Natural Science Foundation of China (Grant Numbers: 61471141, 61361166006, 61301099, 61472108, 61173145, 61501148) and Basic Research Project of Shenzhen, China (Grant Number: JCYJ2015051351706561).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xin Liu.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Liu, X., Wang, S., Sang, J. et al. A novel mapping-based lossless recovery algorithm for VSS. J Real-Time Image Proc 14, 51–60 (2018). https://doi.org/10.1007/s11554-016-0644-5

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11554-016-0644-5

Keywords

Navigation