A novel two-in-one image secret sharing scheme based on perfect black visual cryptography

被引:37
作者
Li, Peng [1 ]
Yang, Ching-Nung [2 ]
Kong, Qian [1 ]
机构
[1] North China Elect Power Univ, Dept Math & Phys, Baoding, Hebei, Peoples R China
[2] Natl Dong Hwa Univ, Dept CSIE, Hualien 974, Taiwan
关键词
Visual cryptography; Image secret sharing; Boolean operation; Gray mixing model;
D O I
10.1007/s11554-016-0621-z
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Perfect black visual cryptography scheme (PBVCS) shares a binary secret image into n shadows. Stacking any shadows can reveal a vague secret image, and the black area of the secret image is recovered as perfect black. Two-in-one image secret sharing (TiOISS) scheme is a secret image sharing method with two decoding options. It can not only decode a vague secret image by stacking any k shadows, but also reveal the original grayscale secret image with k shadows by computation. Researchers proposed some TiOISS schemes, which are based on visual cryptography and polynomial-based image secret sharing (PISS). Since PISS reveals the secret image by Lagrange's interpolation, these TiOISS schemes need complex computation. In this paper, we proposed a novel TiOISS scheme based on PBVCS using exclusive OR operation. Compared with literature TiOISS schemes, our scheme does not need complex computation in revealing process, and it can be used in real-time application. The grayscale secret image can be recovered quickly with a few Boolean operations.
引用
收藏
页码:41 / 50
页数:10
相关论文
共 50 条
[31]   Progressive image secret sharing scheme based on Boolean operations with perfect reconstruction capability [J].
Merabet, Nour El Houda Asma ;
Benzid, Redha .
INFORMATION SECURITY JOURNAL, 2018, 27 (01) :14-28
[32]   Circular meaningful shares based (k, n) two in one image secret sharing scheme for multiple secret images [J].
Sridhar, Srividhya ;
Sudha, Gnanou Florence .
MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (21) :28601-28632
[33]   A Visual Cryptography based system for sharing multiple secret images [J].
Chen, Shang-Kuan .
PROCEEDINGS OF THE 7TH WSEAS INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, COMPUTATIONAL GEOMETRY AND ARTIFICIAL VISION (ISCGAV'-07), 2007, :113-+
[34]   Competitive Swarm Improved Invasive Weed Optimization-Based Secret Sharing Scheme for Visual Cryptography [J].
Choudhary, Arvind Singh ;
Kumar, Manoj .
CYBERNETICS AND SYSTEMS, 2024, 55 (01) :42-60
[35]   A Novel Hierarchical Threshold Secret Image Sharing Scheme [J].
Qin, Shiyue ;
Tan, Zhenhua ;
Li, Hong .
2020 IEEE INTL SYMP ON PARALLEL & DISTRIBUTED PROCESSING WITH APPLICATIONS, INTL CONF ON BIG DATA & CLOUD COMPUTING, INTL SYMP SOCIAL COMPUTING & NETWORKING, INTL CONF ON SUSTAINABLE COMPUTING & COMMUNICATIONS (ISPA/BDCLOUD/SOCIALCOM/SUSTAINCOM 2020), 2020, :1163-1167
[36]   Enhanced Matrix-Based Secret Image Sharing Scheme [J].
Yang, Ching-Nung ;
Wu, Chih-Cheng ;
Lin, Yi-Chin ;
Kim, Cheonshik .
IEEE SIGNAL PROCESSING LETTERS, 2012, 19 (12) :789-792
[37]   On the design of a two-decoding-option image secret sharing scheme [J].
Chen, Tzung-Her ;
Lin, Kai-Siang ;
Lin, Chih-Hung .
MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (07) :7865-7881
[38]   On the design of a two-decoding-option image secret sharing scheme [J].
Tzung-Her Chen ;
Kai-Siang Lin ;
Chih-Hung Lin .
Multimedia Tools and Applications, 2018, 77 :7865-7881
[39]   Perfect recovery of XOR-based visual cryptography scheme [J].
Zhengxin Fu ;
Yuqiao Cheng ;
Bin Yu .
Multimedia Tools and Applications, 2019, 78 :2367-2384
[40]   Perfect recovery of XOR-based visual cryptography scheme [J].
Fu, Zhengxin ;
Cheng, Yuqiao ;
Yu, Bin .
MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (02) :2367-2384