A Novel General (n, n)-Threshold Multiple Secret Images Sharing Scheme Based on Information Hiding in the Sharing Domain

被引:2
作者
Xing, Fengyue [1 ,2 ]
Yan, Xuehu [1 ,2 ]
Yu, Long [1 ,2 ]
Li, Longlong [1 ,2 ]
机构
[1] Natl Univ Def Technol, Coll Elect Engn, Hefei 230037, Peoples R China
[2] Anhui Prov Key Lab Cyberspace Secur Situat Awaren, Hefei 230037, Peoples R China
基金
中国国家自然科学基金;
关键词
secret image sharing; multiple secret images sharing; random element utilization model; VISUAL CRYPTOGRAPHY; RANDOM GRIDS; CONSTRUCTION;
D O I
10.3390/e24030318
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
(k, n)-threshold secret image sharing (SIS) protects an image by dividing it into n shadow images. The secret image will be recovered as we gather k or more shadow images. In complex networks, the security, robustness and efficiency of protecting images draws more and more attention. Thus, we realize multiple secret images sharing (MSIS) by information hiding in the sharing domain (IHSD) and propose a novel and general (n, n)-threshold IHSD-MSIS scheme (IHSD-MSISS), which can share and recover two secret images simultaneously. The proposed scheme spends less cost on managing and identifying shadow images, and improves the ability to prevent malicious tampering. Moreover, it is a novel approach to transmit important images with strong associations. The superiority of (n, n)-threshold IHSD-MSISS is in fusing the sharing phases of two secret images by controlling randomness of SIS. We present a general construction model and algorithms of the proposed scheme. Sufficient theoretical analyses, experiments and comparisons show the effectiveness of the proposed scheme.
引用
收藏
页数:29
相关论文
共 30 条
[1]   Visual cryptography for general access structures [J].
Ateniese, G ;
Blundo, C ;
DeSantis, A ;
Stinson, DR .
INFORMATION AND COMPUTATION, 1996, 129 (02) :86-106
[2]   Combination of Sharing Matrix and Image Encryption for Lossless (k, n)-Secret Image Sharing [J].
Bao, Long ;
Yi, Shuang ;
Zhou, Yicong .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2017, 26 (12) :5618-5631
[3]  
Chang Chin-Chen, 2014, J. Inf. Hiding Multim. Signal Process., V5, P342
[4]   A new Boolean-based multiple secret image sharing scheme to share different sized secret images [J].
Chen, Chien-Chang ;
Chen, Jun-Long .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2017, 33 :45-54
[5]   Multiple secret image sharing with general access structure [J].
Chen, Tzung-Her ;
Wu, Xi-Wen .
MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (19-20) :13247-13265
[6]  
Chien MC, 2012, 2012 5TH INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING (CISP), P1325, DOI 10.1109/CISP.2012.6469950
[7]  
Chih-Ching Thien, 2002, Computers & Graphics, V26, P765, DOI 10.1016/S0097-8493(02)00131-0
[8]  
Dastanian R., 2011, P 2011 INT C INF EL
[9]   Visual secret sharing schemes for multiple secret images allowing the rotation of shares [J].
Iwamoto, Mitsugu ;
Wang, Lei ;
Yoneyama, Kazuki ;
Kunihiro, Noboru ;
Ohta, Kazuo .
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2006, E89A (05) :1382-1395
[10]   Embedded Extended Visual Cryptography Schemes [J].
Liu, Feng ;
Wu, Chuankun .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (02) :307-322