Two-in-One Image Secret Sharing Scheme Based on Boolean Operations

被引:1
作者
Li, Peng [1 ]
Yang, Ching-Nung [2 ]
Kong, Qian [1 ]
机构
[1] North China Elect Power Univ, Dept Math & Phys, Baoding, Hebei, Peoples R China
[2] Natl Dong Hwa Univ, Dept CSIE, Hualien 97401, Taiwan
来源
DIGITAL-FORENSICS AND WATERMARKING, IWDW 2014 | 2015年 / 9023卷
关键词
Image secret sharing; Visual cryptography; Boolean operation; Gray mixing model; VISUAL CRYPTOGRAPHY; IMPROVEMENTS;
D O I
10.1007/978-3-319-19321-2_23
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Two-in-one image secret sharing (TiOISS) scheme shares a secret image into n multiple shadows. In the revealing process, stacking any k (k <= n) shadows can decode a vague secret image in the first stage. It also can reveal the original secret image by computation in the second stage. Many TiOISS schemes have proposed based on visual cryptography scheme (VCS) and polynomial-based image secret sharing (PISS). Since PISS reveals the secret image by Lagrange's interpolation, it needs complicated computation. In this paper, we combine perfect black VCS with image secret sharing based on Boolean operations, and propose a new TiOISS scheme. Compared with existing TiOISS schemes, our scheme only needs few XOR operations to reveal the secret image in the second-stage reconstruction phase.
引用
收藏
页码:305 / 318
页数:14
相关论文
共 18 条
[1]   SECRET IMAGE SHARING: A BOOLEAN-OPERATIONS-BASED APPROACH COMBINING BENEFITS OF POLYNOMIAL-BASED AND FAST APPROACHES [J].
Chao, Kun-Yuan ;
Lin, Ja-Chen .
INTERNATIONAL JOURNAL OF PATTERN RECOGNITION AND ARTIFICIAL INTELLIGENCE, 2009, 23 (02) :263-285
[2]   Sharing more information in gray visual cryptography scheme [J].
Li, Peng ;
Yang, Ching-Nung ;
Kong, Qian ;
Ma, Yanpeng ;
Liu, Zheng .
JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2013, 24 (08) :1380-1393
[3]   Improvements of a two-in-one image secret sharing scheme based on gray mixing model [J].
Li, Peng ;
Ma, Pei-Jun ;
Su, Xiao-Hong ;
Yang, Ching-Nung .
JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2012, 23 (03) :441-453
[4]   VCPSS: A two-in-one two-decoding-options image sharing method combining visual cryptography (VC) and polynomial-style sharing (PSS) approaches [J].
Lin, Sian-Jheng ;
Lin, Ja-Chen .
PATTERN RECOGNITION, 2007, 40 (12) :3652-3666
[5]   Colour visual cryptography schemes [J].
Liu, F. ;
Wu, C. K. ;
Lin, X. J. .
IET Information Security, 2008, 2 (04) :151-165
[6]   Embedded Extended Visual Cryptography Schemes [J].
Liu, Feng ;
Wu, Chuankun .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (02) :307-322
[7]  
Naor M., 1994, Workshop on the theory and application of of cryptographic techniques, P1, DOI [DOI 10.1007/BFB0053419, 10.1007/BFb0053419, DOI 10.1007/978-1-4939-9484-7_1]
[8]   HOW TO SHARE A SECRET [J].
SHAMIR, A .
COMMUNICATIONS OF THE ACM, 1979, 22 (11) :612-613
[9]   Efficient visual secret sharing scheme for color images [J].
Shyu, SH .
PATTERN RECOGNITION, 2006, 39 (05) :866-880
[10]  
Thien CC, 2002, COMPUT GRAPH-UK, V26, P766