Secret image sharing scheme with lossless recovery and high efficiency

被引:22
作者
Luo, Shengyang [1 ,2 ]
Liu, Yaqi [1 ,2 ]
Yan, Xuehu [1 ,2 ]
Yu, Yongqiang [1 ,2 ]
机构
[1] Natl Univ Def Technol, Hefei 230037, Peoples R China
[2] Anhui Prov Key Lab Cyberspace Secur Situat Awarene, Hefei 230037, Peoples R China
关键词
Secret image sharing scheme (SISS); Arnold permutation; Neighborhood consistency calculation; Lossless recovery; High efficiency; STEGANOGRAPHY;
D O I
10.1016/j.sigpro.2023.108931
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
As a well-known secret image sharing scheme, Thien-and-Lin's scheme generates shadow images of re-duced size, which is beneficial for storage, transmission, and processing. However, it has some draw-backs, such as lossy recovery, needing extra secure transmission channels. For decades, many improved schemes have been proposed, but none can solve all the drawbacks simultaneously. Therefore, this paper proposes a (k, n )-threshold secret image sharing scheme, trying to solve the drawbacks comprehensively. In the sharing phase, two 8-bit pixels of the secret image are linked as a 16-bit secret value, and all the coefficients of the generating polynomial are used to embed secrets. Then, Shamir's secret sharing is implemented in Galois Field GF(65, 537) , and the only invalid share 65,536 will be set to 0. In the recov-ery phase, lossless recovery can be realized through neighborhood consistency calculation. To avoid key transmission, we develop a robust statistical invariance index of the secret image to generate permuta-tion keys. Then Arnold permutation is performed to prevent information leakage. The proposed scheme can realize lossless recovery efficiently, without pixel expansion, complex preprocessing, and extra secure transmission channels. Theoretical analysis and experiments are given to validate the effectiveness of our scheme. (c) 2023 Elsevier B.V. All rights reserved.
引用
收藏
页数:16
相关论文
共 50 条
[31]   Transform Domain-Based Invertible and Lossless Secret Image Sharing With Authentication [J].
Xiong, Lizhi ;
Zhong, Xinwei ;
Yang, Ching-Nung ;
Han, Xiao .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 :2912-2925
[32]   Efficient and Lossless Polynomial-Based Secret Image Sharing for Color Images [J].
Gong, Qinghong ;
Wang, Yongjie ;
Yan, Xuehu ;
Liu, Lintao .
IEEE ACCESS, 2019, 7 :113216-113222
[33]   Secret image sharing scheme with hierarchical threshold access structure [J].
Pakniat, Nasrollah ;
Noroozi, Mahnaz ;
Eslami, Ziba .
JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2014, 25 (05) :1093-1101
[34]   A New Secret Image Sharing Scheme Based on Compressed Sensing [J].
Yang, Fuqiang ;
Dang, Na ;
Zhang, Junxing .
2017 2ND IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND BIG DATA ANALYSIS (ICCCBDA 2017), 2017, :321-327
[35]   An efficient (t,n)-threshold secret image sharing scheme [J].
Kanso, Ali ;
Ghebleh, Mohammad .
MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (15) :16369-16388
[36]   A sudoku-based secret image sharing scheme with reversibility [J].
Chang C.-C. ;
Lin P.-Y. ;
Wang Z.H. ;
Li M.C. .
Journal of Communications, 2010, 5 (01) :5-12
[37]   Progressive secret image sharing scheme using meaningful shadows [J].
Wang, Zhi-Hui ;
Di, Ya-Feng ;
Li, Jianjun ;
Chang, Chin-Chen ;
Liu, Hui .
SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (17) :4075-4088
[38]   A Linear Algebraic Threshold Essential Secret Image Sharing Scheme [J].
Ghebleh, Mohammad ;
Kanso, Ali ;
Alazemi, Abdullah .
MATHEMATICS, 2022, 10 (05)
[39]   Fake and dishonest participant location scheme in secret image sharing [J].
Liu, Jingju ;
Sun, Lei ;
Liu, Jinrui ;
Yan, Xuehu .
MATHEMATICAL BIOSCIENCES AND ENGINEERING, 2021, 18 (03) :2473-2495
[40]   An Implementation of Image Secret Sharing Scheme Based on Matrix Operations [J].
Ren, Zihan ;
Li, Peng ;
Wang, Xin .
MATHEMATICS, 2022, 10 (06)