Secret image sharing scheme with lossless recovery and high efficiency

被引:16
作者
Luo, Shengyang [1 ,2 ]
Liu, Yaqi [1 ,2 ]
Yan, Xuehu [1 ,2 ]
Yu, Yongqiang [1 ,2 ]
机构
[1] Natl Univ Def Technol, Hefei 230037, Peoples R China
[2] Anhui Prov Key Lab Cyberspace Secur Situat Awarene, Hefei 230037, Peoples R China
关键词
Secret image sharing scheme (SISS); Arnold permutation; Neighborhood consistency calculation; Lossless recovery; High efficiency; STEGANOGRAPHY;
D O I
10.1016/j.sigpro.2023.108931
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
As a well-known secret image sharing scheme, Thien-and-Lin's scheme generates shadow images of re-duced size, which is beneficial for storage, transmission, and processing. However, it has some draw-backs, such as lossy recovery, needing extra secure transmission channels. For decades, many improved schemes have been proposed, but none can solve all the drawbacks simultaneously. Therefore, this paper proposes a (k, n )-threshold secret image sharing scheme, trying to solve the drawbacks comprehensively. In the sharing phase, two 8-bit pixels of the secret image are linked as a 16-bit secret value, and all the coefficients of the generating polynomial are used to embed secrets. Then, Shamir's secret sharing is implemented in Galois Field GF(65, 537) , and the only invalid share 65,536 will be set to 0. In the recov-ery phase, lossless recovery can be realized through neighborhood consistency calculation. To avoid key transmission, we develop a robust statistical invariance index of the secret image to generate permuta-tion keys. Then Arnold permutation is performed to prevent information leakage. The proposed scheme can realize lossless recovery efficiently, without pixel expansion, complex preprocessing, and extra secure transmission channels. Theoretical analysis and experiments are given to validate the effectiveness of our scheme. (c) 2023 Elsevier B.V. All rights reserved.
引用
收藏
页数:16
相关论文
共 50 条
  • [21] A novel weighted threshold secret image sharing scheme
    Li, Mingchu
    Ma, Shu
    Guo, Cheng
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (17) : 3083 - 3093
  • [22] New Condition for Hierarchical Secret Image Sharing Scheme
    Espejel-Trujillo, Angelina
    Nakano-Miyatake, Mariko
    Perez-Meana, Hector
    2014 IEEE 28TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2014, : 240 - 244
  • [23] Secret image sharing scheme with adaptive authentication strength
    Ulutas, Guzin
    Ulutas, Mustafa
    Nabiyev, Vasif V.
    PATTERN RECOGNITION LETTERS, 2013, 34 (03) : 283 - 291
  • [24] A grouped-scalable secret image sharing scheme
    Wenjie Liu
    Anhong Wang
    Chin-Chen Chang
    Zhihong Li
    Li Liu
    Multimedia Tools and Applications, 2015, 74 : 7095 - 7109
  • [25] Secret Image Sharing Scheme with Threshold Changeable Capability
    Yuan, Lifeng
    Li, Mingchu
    Guo, Cheng
    Hu, Weitong
    Luo, Xinjian
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2016, 2016
  • [26] Improved Secret Image Sharing Scheme with Payload Optimization
    Espejel-Trujillo, Angelina
    Castillo-Camacho, Ivan
    Nakano-Miyatake, Mariko
    Gallegos-Garcia, Gina
    Perez-Meana, Hector
    2012 IEEE 55TH INTERNATIONAL MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS (MWSCAS), 2012, : 1132 - 1135
  • [27] Scalable secret image sharing scheme with essential shadows
    Liu, Yanxiao
    Yang, Chingnung
    SIGNAL PROCESSING-IMAGE COMMUNICATION, 2017, 58 : 49 - 55
  • [28] A Novel Threshold Changeable Secret Image Sharing Scheme
    Wu, Guohua
    Wang, Mingyao
    Wang, Qiuhua
    Yao, Ye
    Yuan, Lifeng
    Miao, Gongxun
    SYMMETRY-BASEL, 2021, 13 (02): : 1 - 20
  • [29] Visual secret sharing based on random grids with abilities of AND and XOR lossless recovery
    Yan, Xuehu
    Wang, Shen
    Abd El-Latif, Ahmed A.
    Niu, Xiamu
    MULTIMEDIA TOOLS AND APPLICATIONS, 2015, 74 (09) : 3231 - 3252
  • [30] Lossless and Efficient Secret Image Sharing Based on Matrix Theory Modulo 256
    Yu, Long
    Liu, Lintao
    Xia, Zhe
    Yan, Xuehu
    Lu, Yuliang
    MATHEMATICS, 2020, 8 (06)