Progressive Secret Image Sharing Scheme Based on Semantic Segmentation

被引:1
作者
Zhang, Lina [1 ,2 ]
Zheng, Xiangqin [1 ]
Liu, Ying [3 ]
机构
[1] Xian Univ Sci & Technol, Coll Comp Sci & Technol, Xian 710054, Peoples R China
[2] Shaanxi Normal Univ, Sch Comp Sci, Xian 710119, Peoples R China
[3] Natl Key Lab Complex Syst Simulat, Beijing 100020, Peoples R China
来源
IEEE ACCESS | 2020年 / 8卷
基金
中国国家自然科学基金;
关键词
Cryptography; Semantics; Image restoration; Image segmentation; Image reconstruction; Interpolation; PSIS; semantic segmentation; interpolated polynomial; VISUAL CRYPTOGRAPHY; ENCRYPTION; CONSTRUCTION;
D O I
10.1109/ACCESS.2020.3025836
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Secret Image Sharing (SIS) plays an important role in the field of information security. At present, from the perspective of image restoration, SIS schemes are roughly divided into two categories: traditional threshold SIS schemes and Progressive SIS (PSIS) schemes. The former provides an all-or-nothing recovery mode in image reconstruction phase. If one of these shadows is damaged or lost, the reconstruction will fail. In contrast, the latter can present the original image progressively during the reconstruction phase. In this paper, a PSIS scheme based on semantic segmentation is proposed, where only specific objects or sensitive areas in the image are shared. After simple processing, the remaining background images can be publicly transmitted on insecure channels of the network. The background image will be regarded as a normal picture by people without shares. Owners who have reached the share of trapdoor numbers can recover a key target in an image. As the share increases, more key targets can be recovered. This paper is the first to propose secure secret sharing of images based on semantic targets. Through this method, it is possible to perform permission control on the target that needs to be divided and shared. Since the shared object is not the entire image, it can save storage space to a certain extent. Finally, through the analysis of the experimental results and comparison with other works, it can be concluded that the proposed scheme has a higher level of security and the amount of data that needs to be transmitted is small.
引用
收藏
页码:173289 / 173297
页数:9
相关论文
共 50 条
  • [21] Relations Between Secret Sharing and Secret Image Sharing
    Yan, Xuehu
    Li, Jinming
    Lu, Yuliang
    Liu, Lintao
    Yang, Guozheng
    Chen, Huixian
    SECURITY WITH INTELLIGENT COMPUTING AND BIG-DATA SERVICES, 2020, 895 : 79 - 93
  • [22] A new double layer multi-secret sharing scheme
    Gunasekaran, Elavarasi
    Muthuraman, Vanitha
    CHINA COMMUNICATIONS, 2024, 21 (01) : 287 - 309
  • [23] Secret Image Sharing Based on Encrypted Pixels
    Zhou, Zhili
    Yang, Ching-Nung
    Cao, Yi
    Sun, Xingming
    IEEE ACCESS, 2018, 6 : 15021 - 15025
  • [24] Image Style Transfer Algorithm Based on Semantic Segmentation
    Lin, Zhijie
    Wang, Zhizhong
    Chen, Haibo
    Ma, Xiaolong
    Xie, Chuan
    Xing, Wei
    Zhao, Lei
    Song, Wei
    IEEE ACCESS, 2021, 9 : 54518 - 54529
  • [25] VSBSIS: A verifiable SVD-based secret image sharing scheme for lossless and efficient reconstruction
    Maity, Krishnendu
    Mukhopadhyay, Susanta
    DISPLAYS, 2023, 78
  • [26] On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme
    Wang, Daoshun
    Yi, Feng
    EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING, 2010,
  • [27] On the design of a two-decoding-option image secret sharing scheme
    Chen, Tzung-Her
    Lin, Kai-Siang
    Lin, Chih-Hung
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (07) : 7865 - 7881
  • [28] A NOVEL IMAGE SECRET SHARING SCHEME WITH MEANINGFUL SHARES
    Cai, Hongliang
    Liu, Huajian
    Yuan, Qizhao
    Steinebach, Martin
    Wang, Xiaojing
    2015 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING (ICASSP), 2015, : 1767 - 1771
  • [29] A Novel Hierarchical Threshold Secret Image Sharing Scheme
    Qin, Shiyue
    Tan, Zhenhua
    Li, Hong
    2020 IEEE INTL SYMP ON PARALLEL & DISTRIBUTED PROCESSING WITH APPLICATIONS, INTL CONF ON BIG DATA & CLOUD COMPUTING, INTL SYMP SOCIAL COMPUTING & NETWORKING, INTL CONF ON SUSTAINABLE COMPUTING & COMMUNICATIONS (ISPA/BDCLOUD/SOCIALCOM/SUSTAINCOM 2020), 2020, : 1163 - 1167
  • [30] A new image secret sharing scheme to identify cheaters
    Zhao, Rong
    Zhao, Jian-jie
    Dai, Fang
    Zhao, Feng-qun
    COMPUTER STANDARDS & INTERFACES, 2009, 31 (01) : 252 - 257