access icon free User-friendly XOR-based visual secret sharing by random grid

This study proposes a user-friendly XOR-based visual secret sharing scheme using random grids. In some visual secret sharing schemes, problems such as pixel expansion or noisy and meaningless shares may be encountered. In the proposed scheme, different regions in the shared image will have different brightness levels depending on the cover image's pixel values so that the generated shares contain information regarding the cover image and are not just a meaningless noisy image. This can overcome the difficulty in recovering the secret image in cases wherein the shares were mixed up by mistake. Furthermore, the dimension of the share is the same as the secret image and there are no pixel expansion problems. The size of the recovered secret image is consistent with the size of the original secret image, and there are no changes in scaling. Lastly, although one of the generated share is a complementary cover image, the image quality of the recovered secret image is still favourable when the secret image is recovered. The experimental and analysis results demonstrate that the proposed scheme is more effective than other schemes.

Inspec keywords: cryptography; image coding; image resolution; image denoising

Other keywords: random grid; visual secret sharing scheme; shared image; generated share; complementary cover image; pixel expansion problems; user-friendly XOR; meaningless noisy image; original secret image; meaningless shares; image quality; recovered secret image

Subjects: Computer vision and image processing techniques; Data security; Optical, image and video signal processing; Cryptography

References

    1. 1)
      • 9. Naor, M., Pinka, B.: ‘Visual authentication and identification’. in Kaliski, B.S. (Eds.): Advances in Cryptology-CRYPTO97, (LNCS, Springer, Berlin, Heidelberg, 2006), 1294, pp. 322336.
    2. 2)
      • 8. Ciptasari, R.W., Rhee, K.H., Sakurai, K.: ‘An enhanced audio ownership protection scheme based on visual cryptography’, EURASIP J. Inf. Secur., 2014, 2014, (2), pp. 112.
    3. 3)
      • 16. Shyu, S.J.: ‘Image encryption by random grids’, Pattern Recognit., 2007, 40, (3), pp. 10141031.
    4. 4)
      • 3. Wu, X., Sun, W.: ‘Visual secret sharing for general access structures by random grids’, IET Inf. Secur., 2012, 6, (4), pp. 299309.
    5. 5)
      • 20. Chao, H.C., Fan, T.Y.: ‘Random-grid based progressive visual secret sharing scheme with adaptive priority’, Digit. Signal Process., 2017, 68, pp. 6980.
    6. 6)
      • 31. Singh, P., Raman, B.: ‘Reversible data hiding based on Shamir's secret sharing for color images over cloud’, Inf. Sci., 2018, 422, pp. 7797.
    7. 7)
      • 27. Cimato, S., De Prisco, R., De Santis, A.: ‘Probabilistic visual cryptography schemes’, Comput. J., 2006, 49, pp. 97107.
    8. 8)
      • 15. Kafri, O., Keren, E.: ‘Encryption of pictures and shapes by random grids’, Opt. Lett., 1987, 12, (6), pp. 377379.
    9. 9)
      • 30. Brindha, K., Jeyanthi, N.: ‘Secured document sharing using visual cryptography in cloud data storage’, Cybern. Inf. Technol., 2015, 15, (4), pp. 111123.
    10. 10)
      • 18. Chen, T.H., Tsao, K.H.: ‘Threshold visual secret sharing by random grids’, J. Syst. Softw., 2011, 84, (7), pp. 11971208.
    11. 11)
      • 29. Yang, C.N., Wu, C.C., Wang, D.S.: ‘On the relation of probabilistic visual cryptography and random grid’, Inf. Sci., 2014, 278, pp. 141173.
    12. 12)
      • 13. Zhou, Z., Arce, G., Di Crescenzo, G.: ‘Halftone visual cryptography’, IEEE Trans. Image Process., 2006, 15, (8), pp. 24412453.
    13. 13)
      • 12. Ateniese, G., Blundo, C., De Santis, A., et al: ‘Extended schemes for visual cryptography’, Theor. Comput. Sci., 2000, 250, (1–2), pp. 143161.
    14. 14)
      • 10. Shyu, S.J., Chen, M.C.: ‘Optimum pixel expansions for threshold visual secret sharing schemes’, IEEE Trans. Inf. Forensics Secur., 2011, 6, (3), pp. 9609969.
    15. 15)
      • 19. Chiu, P.L., Lee, K.H.: ‘User-friendly threshold visual cryptography with complementary cover images’, Signal Process., 2015, 108, pp. 476488.
    16. 16)
      • 4. Yang, C.N., Liao, J.K., Wang, D.S.: ‘New privilege-based visual cryptography with arbitrary privilege levels’, J. Vis. Commun. Image Represent., 2017, 42, pp. 121131.
    17. 17)
      • 28. De Prisco, R., De Santis, A.: ‘On the relation of random grid and deterministic visual cryptography’, IEEE Trans. Inf. Forensics Secur., 2014, 9, (4), pp. 653665.
    18. 18)
      • 26. Yang, C.N.: ‘New visual secret sharing schemes using probabilistic method’, Pattern Recogn. Lett., 2004, 25, pp. 481494.
    19. 19)
      • 25. Hou, Y.C., Quan, Z.Y., Tsai, C.F.: ‘A privilege-based visual secret sharing model’, J. Vis. Commun. Image Represent., 2015, 33, pp. 358367.
    20. 20)
      • 24. Ito, R., Kuwakado, H., Tanaka, H.: ‘Image size invariant visual cryptography’, IEICE Trans. Fund. Electron. Commun. Comput. Sci., 1999, E82–A, (10), pp. 21722177.
    21. 21)
      • 14. Shyu, S.J.: ‘Threshold visual cryptographic scheme with meaningful shares’, IEEE Signal Process. Lett., 2014, 21, (12), pp. 15211525.
    22. 22)
      • 22. Hou, Y.C., Wei, S.C., Lin, C.Y., et al: ‘Random-grid-based visual cryptography schemes’, IEEE Trans. Circuits Syst. Video Technol., 2014, 24, (5), pp. 733744.
    23. 23)
      • 21. Chen, T.H., Tsao, K.H.: ‘User-friendly random-grid-based visual secret sharing’, IEEE Trans. Circuits Syst. Video Technol., 2011, 21, (11), pp. 16931703.
    24. 24)
      • 6. Chao, H.C., Fan, T.Y.: ‘Priority visual secret sharing of random grids for threshold access structures’, Multimed. Tools Appl., 2018, 77, (10), pp. 1186711882.
    25. 25)
      • 1. Shyu, S.J.: ‘Visual cryptograms of random grids for threshold access structures’, Theor. Comput. Sci., 2015, 565, pp. 3049.
    26. 26)
      • 5. Chao, H.C., Fan, T.Y.: ‘Generating random grid-based visual secret sharing with multi-level encoding’, Signal Process Image Commun., 2017, 57, pp. 6067.
    27. 27)
      • 23. Wu, X., Sun, W.: ‘Generalized random grid and its applications in visual cryptography’, IEEE Trans. Inf. Forensics Secur., 2013, 8, (9), pp. 15411553.
    28. 28)
      • 7. Fan, T.Y., Chieu, B.C., Chao, H.C.: ‘Robust copyright-protection scheme based on visual secret sharing and Bose–Chaudhuri–Hocquenghem code techniques’, J. Electron. Imaging, 2012, 21, (4), p. 043018.
    29. 29)
      • 2. Naor, M., Shamir, A.: ‘Visual cryptography’, in De Santis, A. (Eds.): Advances in Cryptology: EUROCRYPT’94, (LNCS, Springer, Berlin, Heidelberg, 1995, 950, pp. 112.
    30. 30)
      • 11. Shivani, S., Agarwal, S.: ‘Novel basis matrix creation and preprocessing algorithms for friendly progressive visual secret sharing with space-efficient shares’, Multimed. Tools Appl., 2017, 76, (6), pp. 87118744.
    31. 31)
      • 17. Shyu, S.J.: ‘Image encryption by multiple random grids’, Pattern Recognit., 2009, 42, (7), pp. 15821596.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-ifs.2017.0546
Loading

Related content

content/journals/10.1049/iet-ifs.2017.0546
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading