Meaningful Secret Image Sharing with Saliency Detection

被引:15
作者
Cheng, Jingwen [1 ,2 ]
Yan, Xuehu [1 ,2 ]
Liu, Lintao [1 ,2 ]
Jiang, Yue [1 ,2 ]
Wang, Xuan [1 ,2 ]
机构
[1] Natl Univ Def Technol, Coll Elect Engn, Hefei 230037, Peoples R China
[2] Anhui Prov Key Lab Cyberspace Secur Situat Awaren, Hefei 230037, Peoples R China
基金
中国国家自然科学基金;
关键词
secret image sharing; random elements utilization model; statistical correlation; saliency detection; meaningful shadows; polynomial-based SIS; VISUAL CRYPTOGRAPHY;
D O I
10.3390/e24030340
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Secret image sharing (SIS), as one of the applications of information theory in information security protection, has been widely used in many areas, such as blockchain, identity authentication and distributed cloud storage. In traditional secret image sharing schemes, noise-like shadows introduce difficulties into shadow management and increase the risk of attacks. Meaningful secret image sharing is thus proposed to solve these problems. Previous meaningful SIS schemes have employed steganography to hide shares into cover images, and their covers are always binary images. These schemes usually include pixel expansion and low visual quality shadows. To improve the shadow quality, we design a meaningful secret image sharing scheme with saliency detection. Saliency detection is used to determine the salient regions of cover images. In our proposed scheme, we improve the quality of salient regions that are sensitive to the human vision system. In this way, we obtain meaningful shadows with better visual quality. Experiment results and comparisons demonstrate the effectiveness of our proposed scheme.
引用
收藏
页数:12
相关论文
共 41 条
[1]  
Achanta R, 2008, LECT NOTES COMPUT SC, V5008, P66
[2]  
Achanta R, 2009, PROC CVPR IEEE, P1597, DOI 10.1109/CVPRW.2009.5206596
[3]   A MODULAR APPROACH TO KEY SAFEGUARDING [J].
ASMUTH, C ;
BLOOM, J .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) :208-210
[4]   Extended capabilities for visual cryptography [J].
Ateniese, G ;
Blundo, C ;
De Santis, A ;
Stinson, DR .
THEORETICAL COMPUTER SCIENCE, 2001, 250 (1-2) :143-161
[5]   Secret sharing for cloud data security: a survey [J].
Attasena, Varunya ;
Darmont, Jerome ;
Harbi, Nouria .
VLDB JOURNAL, 2017, 26 (05) :657-681
[6]  
Avci D, 2016, KUWAIT J SCI, V43, P114
[7]   High-Speed NTT-based Polynomial Multiplication Accelerator for Post-Quantum Cryptography [J].
Bisheh-Niasar, Mojtaba ;
Azarderakhsh, Reza ;
Mozaffari-Kermani, Mehran .
2021 IEEE 28TH SYMPOSIUM ON COMPUTER ARITHMETIC (ARITH 2021), 2021, :94-101
[8]  
Chavan PV, 2014, 2014 IEEE STUDENTS' CONFERENCE ON ELECTRICAL, ELECTRONICS AND COMPUTER SCIENCE (SCEECS)
[9]   Secret sharing: using meaningful image shadows based on Gray code [J].
Cheng, Ting-Fang ;
Chang, Ching-Chun ;
Liu, Li .
MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (07) :9337-9362
[10]   Efficient constructions for progressive visual cryptography with meaningful shares [J].
Chiu, Pei-Ling ;
Lee, Kai-Hui .
SIGNAL PROCESSING, 2019, 165 :233-249