Secret image sharing scheme with lossless recovery and high efficiency

被引:16
|
作者
Luo, Shengyang [1 ,2 ]
Liu, Yaqi [1 ,2 ]
Yan, Xuehu [1 ,2 ]
Yu, Yongqiang [1 ,2 ]
机构
[1] Natl Univ Def Technol, Hefei 230037, Peoples R China
[2] Anhui Prov Key Lab Cyberspace Secur Situat Awarene, Hefei 230037, Peoples R China
关键词
Secret image sharing scheme (SISS); Arnold permutation; Neighborhood consistency calculation; Lossless recovery; High efficiency; STEGANOGRAPHY;
D O I
10.1016/j.sigpro.2023.108931
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
As a well-known secret image sharing scheme, Thien-and-Lin's scheme generates shadow images of re-duced size, which is beneficial for storage, transmission, and processing. However, it has some draw-backs, such as lossy recovery, needing extra secure transmission channels. For decades, many improved schemes have been proposed, but none can solve all the drawbacks simultaneously. Therefore, this paper proposes a (k, n )-threshold secret image sharing scheme, trying to solve the drawbacks comprehensively. In the sharing phase, two 8-bit pixels of the secret image are linked as a 16-bit secret value, and all the coefficients of the generating polynomial are used to embed secrets. Then, Shamir's secret sharing is implemented in Galois Field GF(65, 537) , and the only invalid share 65,536 will be set to 0. In the recov-ery phase, lossless recovery can be realized through neighborhood consistency calculation. To avoid key transmission, we develop a robust statistical invariance index of the secret image to generate permuta-tion keys. Then Arnold permutation is performed to prevent information leakage. The proposed scheme can realize lossless recovery efficiently, without pixel expansion, complex preprocessing, and extra secure transmission channels. Theoretical analysis and experiments are given to validate the effectiveness of our scheme. (c) 2023 Elsevier B.V. All rights reserved.
引用
收藏
页数:16
相关论文
共 50 条
  • [11] Weighted visual secret sharing with multiple decryptions and lossless recovery
    Liu, Feng
    Yan, Xuehu
    Liu, Lintao
    Lu, Yuliang
    Tan, Longdan
    MATHEMATICAL BIOSCIENCES AND ENGINEERING, 2019, 16 (05) : 5750 - 5764
  • [12] Extended Secret Image Sharing with Lossless Recovery Based on Chinese Remainder Theorem and Quick Response Code
    Jiang, Yue
    Lu, Yuliang
    Yan, Xuehu
    Liu, Lintao
    2018 IEEE 3RD INTERNATIONAL CONFERENCE ON IMAGE, VISION AND COMPUTING (ICIVC), 2018, : 678 - 683
  • [13] A Secure Verifiable Scheme for Secret Image Sharing
    Rose, Angel A.
    Thampi, Sabu M.
    SECOND INTERNATIONAL SYMPOSIUM ON COMPUTER VISION AND THE INTERNET (VISIONNET'15), 2015, 58 : 140 - 150
  • [14] Lossless and Efficient Polynomial-Based Secret Image Sharing with Reduced Shadow Size
    Zhou, Xuan
    Lu, Yuliang
    Yan, Xuehu
    Wang, Yongjie
    Liu, Lintao
    SYMMETRY-BASEL, 2018, 10 (07):
  • [15] Lossless Recovery of Multiple Decryption Capability and Progressive Visual Secret Sharing
    Qi, Xin
    INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2016, 9 (02): : 51 - 60
  • [16] Distortion less secret image sharing scheme for Internet of Things system
    Li, Li
    Hossain, M. Shamim
    Abd El-Latif, Ahmed A.
    Alhamid, M. F.
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 1): : 2293 - 2307
  • [17] A grouped-scalable secret image sharing scheme
    Liu, Wenjie
    Wang, Anhong
    Chang, Chin-Chen
    Li, Zhihong
    Liu, Li
    MULTIMEDIA TOOLS AND APPLICATIONS, 2015, 74 (17) : 7095 - 7109
  • [18] A novel weighted threshold secret image sharing scheme
    Li, Mingchu
    Ma, Shu
    Guo, Cheng
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (17) : 3083 - 3093
  • [19] Reversible secret image sharing scheme in encrypted images
    Sang-Ho Shin
    Ki-Hyun Jung
    Multimedia Tools and Applications, 2016, 75 : 13931 - 13949
  • [20] Visual secret sharing based on random grids with abilities of AND and XOR lossless recovery
    Xuehu Yan
    Shen Wang
    Ahmed A. Abd El-Latif
    Xiamu Niu
    Multimedia Tools and Applications, 2015, 74 : 3231 - 3252