Secret image sharing based on multiphase retrieval algorithm

被引:1
作者
Zhao, Tieyu [1 ]
Chi, Yingying [1 ]
机构
[1] Northeastern Univ Qinhuangdao, Informat Sci Teaching & Res Sect, Qinhuangdao 066004, Hebei, Peoples R China
关键词
Secret sharing; secret image sharing; phase retrieval algorithm; multiphase retrieval algorithm; SCHEME; AUTHENTICATION;
D O I
10.1080/09500340.2020.1844327
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
This paper proposes a multiphase retrieval algorithm and then presents a secret image sharing scheme. The proposed algorithm can divide a secret image into multiple phase-only encodings (shadows) and then overcome the shadow expansion problem. When the shadows are arranged in a certain order, the light intensity detector can directly acquire the secret image using parallel light, and the recovery process is simple and easy to operate. Furthermore, Fresnel transform parameters are used for authentication, which can avoid deceit. The differences in the initial random phase encodings make the same secret image produce different shadows, which can effectively resist statistical analysis attacks. Finally, theoretical analysis and a simulation are used to verify the validity and feasibility of the proposed scheme.
引用
收藏
页码:1296 / 1303
页数:8
相关论文
共 23 条
[1]   A novel secret image sharing scheme in color images using small shadow images [J].
Chang, Chin-Chen ;
Lin, Chia-Chen ;
Lin, Chia-Hsuan ;
Chen, Yi-Hui .
INFORMATION SCIENCES, 2008, 178 (11) :2433-2447
[2]   Secret image sharing with smaller shadow sizes for general access structures [J].
Chen, Ying-Ru ;
Chen, Ling-Hwei ;
Shyu, Shyong Jian .
MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (21) :13913-13929
[3]   Secret image sharing with authentication-chaining and dynamic embedding [J].
Eslami, Z. ;
Ahmadabadi, J. Zarepour .
JOURNAL OF SYSTEMS AND SOFTWARE, 2011, 84 (05) :803-809
[4]   A new multi-secret images sharing scheme using Largrange's interpolation [J].
Feng, JB ;
Wu, HC ;
Tsai, CS ;
Chu, YP .
JOURNAL OF SYSTEMS AND SOFTWARE, 2005, 76 (03) :327-339
[5]   Progressive sharing for a secret image [J].
Huang, Chin-Pan ;
Hsieh, Chaur-Heh ;
Huang, Ping Sheng .
JOURNAL OF SYSTEMS AND SOFTWARE, 2010, 83 (03) :517-527
[6]   Roadmap on optical security [J].
Javidi, Bahram ;
Carnicer, Artur ;
Yamaguchi, Masahiro ;
Nomura, Takanori ;
Perez-Cabre, Elisabet ;
Millan, Maria S. ;
Nishchal, Naveen K. ;
Torroba, Roberto ;
Barrera, John Fredy ;
He, Wenqi ;
Peng, Xiang ;
Stern, Adrian ;
Rivenson, Yair ;
Alfalou, A. ;
Brosseau, C. ;
Guo, Changliang ;
Sheridan, John T. ;
Situ, Guohai ;
Naruse, Makoto ;
Matsumoto, Tsutomu ;
Juvells, Ignasi ;
Tajahuerce, Enrique ;
Lancis, Jesus ;
Chen, Wen ;
Chen, Xudong ;
Pinkse, Pepijn W. H. ;
Mosk, Allard P. ;
Markman, Adam .
JOURNAL OF OPTICS, 2016, 18 (08)
[7]   A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the Use of the PNG Image With a Data Repair Capability [J].
Lee, Che-Wei ;
Tsai, Wen-Hsiang .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2012, 21 (01) :207-218
[8]   Secret image sharing with steganography and authentication [J].
Lin, CC ;
Tsai, WH .
JOURNAL OF SYSTEMS AND SOFTWARE, 2004, 73 (03) :405-414
[9]   Scalable Secret Image Sharing With Smaller Shadow Images [J].
Lin, Yung-Yi ;
Wang, Ran-Zan .
IEEE SIGNAL PROCESSING LETTERS, 2010, 17 (03) :316-319
[10]   A novel real-time and progressive secret image sharing with flexible shadows based on compressive sensing [J].
Liu, Li ;
Wang, Anhong ;
Chang, Chin-Chen ;
Li, Zhihong .
SIGNAL PROCESSING-IMAGE COMMUNICATION, 2014, 29 (01) :128-134