An enhanced image protection framework: polynomial-based secret sharing meets information hiding

被引:0
作者
Li, Xiaopeng [1 ]
Fu, Zhengxin [1 ]
Gao, Yuan [1 ]
Yu, Bin [1 ]
机构
[1] Informat Engn Univ, Zhengzhou 450004, Peoples R China
基金
中国国家自然科学基金;
关键词
Image sharing; Meaningful share; Polynomial; Dynamic adjustment; Hiding; PROGRESSIVE VISUAL CRYPTOGRAPHY; SCHEME; STEGANOGRAPHY;
D O I
10.1007/s44443-025-00143-x
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The security of modern communication requires not only the confidentiality of communication content but also the concealment of communication behavior. Secret image sharing has emerged as a prominent research topic in recent years, aiming to transfer meaningful shares while ensuring that covert communication activities remain hidden from potential attackers' monitoring and analysis. In this paper, we propose a novel polynomial-based secret image sharing scheme with meaningful shares. It utilizes the mathematical construction of polynomial coefficients, along with the secret pixel values and the pixel values of the cover images, to determine the coefficients of the polynomial. Subsequently, we propose two algorithms to compute the pixel values of the n-th cover image for each respective image by minimizing their discrepancy with the corresponding cover image's pixel values. As a result, this scheme achieves both image sharing and hiding simultaneously, allowing for dynamic adjustment of share and recovered image quality in different application scenarios. Experimental results and analysis demonstrate that the proposed scheme is secure, reliable, easy to implement. Specifically, when the fluctuation value b = 3, both the shares and the recovered images demonstrate excellent visual quality, achieving an average PSNR of over 40 dB.
引用
收藏
页数:20
相关论文
共 29 条
[1]   Secret sharing: using meaningful image shadows based on Gray code [J].
Cheng, Ting-Fang ;
Chang, Ching-Chun ;
Liu, Li .
MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (07) :9337-9362
[2]   Efficient constructions for progressive visual cryptography with meaningful shares [J].
Chiu, Pei-Ling ;
Lee, Kai-Hui .
SIGNAL PROCESSING, 2019, 165 :233-249
[3]   Non-expansible XOR-based visual cryptography scheme with meaningful shares [J].
Cu, Duanhao ;
Sun, Wei ;
Wu, Xiaotian .
SIGNAL PROCESSING, 2015, 108 :604-621
[4]  
Ding Haiyang, 2018, [The Journal of China Universities of Posts and Telecommunications, 中国邮电高校学报], V25, P60
[5]   k out of k extended visual cryptography scheme by random grids [J].
Guo, Teng ;
Liu, Feng ;
Wu, ChuanKun .
SIGNAL PROCESSING, 2014, 94 :90-101
[6]   A secure image sharing scheme with high quality stego-images based on steganography [J].
He, Junhui ;
Lan, Weiqiang ;
Tang, Shaohua .
MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (06) :7677-7698
[7]   Progressive Visual Cryptography with Unexpanded Shares [J].
Hou, Young-Chang ;
Quan, Zen-Yu .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2011, 21 (11) :1760-1764
[8]   A novel extended secret image sharing scheme based on sharing matrix [J].
Li, Xiaopeng ;
Fu, Zhengxin ;
Yu, Bin .
JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2024, 101
[9]   Secret image sharing with steganography and authentication [J].
Lin, CC ;
Tsai, WH .
JOURNAL OF SYSTEMS AND SOFTWARE, 2004, 73 (03) :405-414
[10]   Secret image sharing with distinct covers based on improved Cycling-XOR [J].
Lin, Jiang-Yi ;
Horng, Ji-Hwei ;
Chang, Chin-Chen .
JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2024, 104