Secret image sharing scheme with lossless recovery and high efficiency

被引:22
作者
Luo, Shengyang [1 ,2 ]
Liu, Yaqi [1 ,2 ]
Yan, Xuehu [1 ,2 ]
Yu, Yongqiang [1 ,2 ]
机构
[1] Natl Univ Def Technol, Hefei 230037, Peoples R China
[2] Anhui Prov Key Lab Cyberspace Secur Situat Awarene, Hefei 230037, Peoples R China
关键词
Secret image sharing scheme (SISS); Arnold permutation; Neighborhood consistency calculation; Lossless recovery; High efficiency; STEGANOGRAPHY;
D O I
10.1016/j.sigpro.2023.108931
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
As a well-known secret image sharing scheme, Thien-and-Lin's scheme generates shadow images of re-duced size, which is beneficial for storage, transmission, and processing. However, it has some draw-backs, such as lossy recovery, needing extra secure transmission channels. For decades, many improved schemes have been proposed, but none can solve all the drawbacks simultaneously. Therefore, this paper proposes a (k, n )-threshold secret image sharing scheme, trying to solve the drawbacks comprehensively. In the sharing phase, two 8-bit pixels of the secret image are linked as a 16-bit secret value, and all the coefficients of the generating polynomial are used to embed secrets. Then, Shamir's secret sharing is implemented in Galois Field GF(65, 537) , and the only invalid share 65,536 will be set to 0. In the recov-ery phase, lossless recovery can be realized through neighborhood consistency calculation. To avoid key transmission, we develop a robust statistical invariance index of the secret image to generate permuta-tion keys. Then Arnold permutation is performed to prevent information leakage. The proposed scheme can realize lossless recovery efficiently, without pixel expansion, complex preprocessing, and extra secure transmission channels. Theoretical analysis and experiments are given to validate the effectiveness of our scheme. (c) 2023 Elsevier B.V. All rights reserved.
引用
收藏
页数:16
相关论文
共 50 条
[41]   An efficient (t,n)–threshold secret image sharing scheme [J].
Ali Kanso ;
Mohammad Ghebleh .
Multimedia Tools and Applications, 2017, 76 :16369-16388
[42]   A novel proactive secret image sharing scheme based on LISS [J].
Guo, Cheng ;
Zhang, Huan ;
Fu, Zhangjie ;
Feng, Bin ;
Li, Mingchu .
MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (15) :19569-19590
[43]   Essential secret image sharing scheme with the same size of shadows [J].
Li, Peng ;
Yang, Ching-Nung ;
Zhou, Zhili .
DIGITAL SIGNAL PROCESSING, 2016, 50 :51-60
[44]   Essential secret image sharing scheme with different importance of shadows [J].
Li, Peng ;
Yang, Ching-Nung ;
Wu, Chih-Cheng ;
Kong, Qian ;
Ma, Yanpeng .
JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2013, 24 (07) :1106-1114
[45]   A novel multiple-level secret image sharing scheme [J].
Liu, Yi-Ning ;
Zhong, Qi ;
Xie, Ming ;
Chen, Zu-Bin .
MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (05) :6017-6031
[46]   (k, n) secret image sharing scheme with privileged set [J].
Yang, Ching-Nung ;
Li, Peng ;
Kuo, Hsin-Chuan .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 73
[47]   Invertible secret image sharing scheme based on improved FEMD [J].
Ma L. ;
Wang J. .
Tongxin Xuebao/Journal on Communications, 2019, 40 (07) :48-56
[48]   A novel secret image sharing scheme using large primes [J].
Ghebleh, Mohammad ;
Kanso, Ali .
MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (10) :11903-11923
[49]   Robust Image Steganography Against General Downsampling Operations With Lossless Secret Recovery [J].
Li, Sheng ;
Wang, Zichi ;
Zhang, Xiudong ;
Zhang, Xinpeng .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (01) :340-352
[50]   (k, n) secret image sharing scheme capable of cheating detection [J].
Liu, Yan-Xiao ;
Sun, Qin-Dong ;
Yang, Ching-Nung .
EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2018,