Cropping Resilient Secret Image Sharing Scheme with Lossless Recovery

被引:0
作者
Luo, Shengyang [1 ]
Liu, Yaqi [1 ]
Yan, Xuehu [1 ]
Huang, Chao [1 ]
机构
[1] Natl Univ Def Technol, Hefei, Peoples R China
来源
2023 IEEE 22ND INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, BIGDATASE, CSE, EUC, ISCI 2023 | 2024年
基金
中国国家自然科学基金;
关键词
Secret image sharing; Robustness; Cropping; Lossless Recovery; Reed-Solomon Coding; AUTHENTICATION;
D O I
10.1109/TrustCom60117.2023.00152
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In recent years, secret image sharing (SIS) has attracted extensive attention in the academic community due to its advantages of loss tolerance and low computational complexity. To enhance the robustness of SIS system, it is vital to study SIS technology that can resist shadow image cropping. Unfortunately, the current research on this topic is limited. In view of this, this paper proposes a robust SIS scheme for color images, which can resist large-scale shadow image cropping. The proposed scheme generates shadow images of the same size as the original secret image by integrating SIS, error correction coding, and pixel rearrangement techniques. Even in the extreme case that all shadow images are cropped by 25%, it can still achieve lossless recovery regardless of whether the cropping positions of each shadow image intersect or overlap. In addition, it can resist shadow image noise, such as salt-and-pepper noise. Experimental results demonstrate that the proposed scheme has significant advantages over existing schemes in robustness and overall performance and is expected to promote the practical application of SIS.
引用
收藏
页码:1103 / 1110
页数:8
相关论文
共 16 条
[1]   Secret sharing for cloud data security: a survey [J].
Attasena, Varunya ;
Darmont, Jerome ;
Harbi, Nouria .
VLDB JOURNAL, 2017, 26 (05) :657-681
[2]   Multi-secret image sharing based on elementary cellular automata with steganography [J].
Azza, A. A. ;
Lian, Shiguo .
MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (29-30) :21241-21264
[3]   Meaningful secret sharing technique with authentication and remedy abilities [J].
Chang, Chin-Chen ;
Chen, Yi-Hui ;
Wang, Hsin-Chi .
INFORMATION SCIENCES, 2011, 181 (14) :3073-3084
[4]  
Chih-Ching Thien, 2002, Computers & Graphics, V26, P765, DOI 10.1016/S0097-8493(02)00131-0
[5]   A lossless secret image sharing scheme using a larger finite field [J].
Hu, Weitong ;
Wu, Ting ;
Chen, Yuanfang ;
Shen, Yanzhao ;
Yuan, Lifeng .
MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (19) :28731-28743
[6]   Cropping and Noise Resilient Steganography Algorithm using Secret Image Sharing [J].
Juarez-Sandoval, Oswaldo ;
Fierro-Radilla, Atoany ;
Espejel-Trujillo, Angelina ;
Nakano-Miyatake, Mariko ;
Perez-Meana, Hector .
SIXTH INTERNATIONAL CONFERENCE ON GRAPHIC AND IMAGE PROCESSING (ICGIP 2014), 2015, 9443
[7]   A Lossless Linear Algebraic Secret Image Sharing Scheme [J].
Kanso, Ali ;
Ghebleh, Mohammad ;
Alazemi, Abdullah .
INFORMATICA, 2020, 31 (03) :499-522
[8]   A Reversible Data Hiding Scheme in Encrypted Domain for Secret Image Sharing Based on Chinese Remainder Theorem [J].
Ke, Yan ;
Zhang, Minqing ;
Zhang, Xinpeng ;
Liu, Jia ;
Su, Tingting ;
Yang, Xiaoyuan .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2022, 32 (04) :2469-2481
[9]   Secret image sharing scheme with lossless recovery and high efficiency [J].
Luo, Shengyang ;
Liu, Yaqi ;
Yan, Xuehu ;
Yu, Yongqiang .
SIGNAL PROCESSING, 2023, 206
[10]  
Naor M., 1995, WORKSHOP THEORY APPL, P1, DOI 10.1007/BFb0053419