A verifiable variable threshold visual image secret sharing scheme

被引:0
作者
Yang, Yu-Guang [1 ]
Cheng, Wen [1 ]
Xu, Guang-Bao [2 ]
Jiang, Dong-Huan [3 ]
Zhou, Yi-Hua [1 ]
Shi, Wei-Min [1 ]
Jiang, Dong-Hua [4 ]
机构
[1] Beijing Univ Technol, Coll Comp Sci & Technol, Beijing 100124, Peoples R China
[2] Shandong Univ Sci & Technol, Coll Comp Sci & Engn, Qingdao 266590, Peoples R China
[3] Shandong Univ Sci & Technol, Coll Math & Syst Sci, Qingdao 266590, Peoples R China
[4] Sun Yat Sen Univ, Sch Comp Sci & Engn, Guangzhou 511400, Peoples R China
基金
北京市自然科学基金; 中国国家自然科学基金;
关键词
Compressive sensing; Variable threshold secret sharing; Visually meaningful image encryption; ENCRYPTION; ALGORITHM;
D O I
10.1007/s00530-025-01765-x
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes a visual image encryption algorithm based on 2D compressive sensing and variable threshold secret sharing, aiming to achieve efficient, secure, and flexible image encryption and decryption. Firstly, the plain image is compressed and encrypted using the 2D compressive sensing technique, while the measurement matrix and disordered sequence are generated through an improved chaotic system. Secondly, the shadow image is produced using the variable threshold secret sharing scheme, and a corresponding authentication signature is generated to verify the integrity and authenticity of the shadow image. Finally, the shadow image and its signature are embedded into a carrier image to generate a cipher image with visual steganography. Experimental results demonstrate that the proposed algorithm achieves excellent performance in terms of operational efficiency, visual encryption quality, and decryption performance. The encryption execution time is 0.694 s, the PSNR of decrypted images is approximately 32 dB, and the PSNR of cipher images is around 42 dB, ensuring high visual concealment and reconstruction quality while maintaining security.
引用
收藏
页数:18
相关论文
共 33 条
[1]   Stegocrypt: A robust tri-stage spatial steganography algorithm using TLM encryption and DNA coding for securing digital images [J].
Alexan, Wassim ;
Mamdouh, Eyad ;
Aboshousha, Amr ;
Alsahafi, Youssef S. ;
Gabr, Mohamed ;
Hosny, Khalid M. .
IET IMAGE PROCESSING, 2024, 18 (13) :4189-4206
[2]   Triple Layer RGB Image Encryption Algorithm Utilizing Three Hyperchaotic Systems and Its FPGA Implementation [J].
Alexan, Wassim ;
Elabyad, Noor ;
Khaled, Maya ;
Osama, Remas ;
El-Damak, Dina ;
Abd El Ghany, Mohamed A. ;
Korayem, Yousef ;
Mamdouh, Eyad ;
Gabr, Mohamed .
IEEE ACCESS, 2024, 12 :118339-118361
[3]   Secure Communication of Military Reconnaissance Images Over UAV-Assisted Relay Networks [J].
Alexan, Wassim ;
Aly, Laila ;
Korayem, Yousef ;
Gabr, Mohamed ;
El-Damak, Dina ;
Fathy, Abdallah ;
Mansour, Hany A. A. .
IEEE ACCESS, 2024, 12 :78589-78610
[4]   Image Encryption Based on Fourier-DNA Coding for Hyperchaotic Chen System, Chen-Based Binary Quantization S-Box, and Variable-Base Modulo Operation [J].
Alexan, Wassim ;
El-Damak, Dina ;
Gabr, Mohamed .
IEEE ACCESS, 2024, 12 :21092-21113
[5]   An authenticated image encryption scheme based on chaotic maps and memory cellular automata [J].
Bakhshandeh, Atieh ;
Eslami, Ziba .
OPTICS AND LASERS IN ENGINEERING, 2013, 51 (06) :665-673
[6]   Image encryption: Generating visually meaningful encrypted images [J].
Bao, Long ;
Zhou, Yicong .
INFORMATION SCIENCES, 2015, 324 :197-207
[7]  
Blakely G. R., 1979, Computers & Mathematics with Applications, V5, P169, DOI 10.1016/0898-1221(79)90039-7
[8]   An efficient visually meaningful image compression and encryption scheme based on compressive sensing and dynamic LSB embedding [J].
Chai, Xiuli ;
Wu, Haiyang ;
Gan, Zhihua ;
Zhang, Yushu ;
Chen, Yiran ;
Nixon, Kent W. .
OPTICS AND LASERS IN ENGINEERING, 2020, 124
[9]   Compressed sensing [J].
Donoho, DL .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2006, 52 (04) :1289-1306
[10]   Fibonacci Q-Matrix, Hyperchaos, and Galois Field (28) for Augmented Medical Image Encryption [J].
El-Damak, Dina ;
Alexan, Wassim ;
Mamdouh, Eyad ;
El-Aasser, Minar ;
Fathy, Abdallah ;
Gabr, Mohamed .
IEEE ACCESS, 2024, 12 :102718-102744