A new meaningful secret sharing scheme based on random grids, error diffusion and chaotic encryption

Abstract In this paper, a novel secret image sharing scheme is proposed to encode a secret binary image into meaningful shadow images. It combines random grids (RG), error diffusion (ED) and chaotic permutation. The secret image is first encrypted based on chaotic permutation and then shared among n halftone shadow images RGs generated by error diffusion, while the recovered secret image is recovered from k or more shadow images. The proposed scheme has the advantages of simple computation, alternative order of shadow images in recovery, avoids the design of complex codebook, and avoids the pixel expansion problem. Experimental results and analysis show the effectiveness of the proposed scheme.

[1]  Chin-Chen Chang,et al.  Sharing visual multi-secrets using circle shares , 2005, Comput. Stand. Interfaces.

[2]  Shyong Jian Shyu,et al.  Image encryption by multiple random grids , 2009, Pattern Recognit..

[3]  ShyuShyong Jian Image encryption by multiple random grids , 2009 .

[4]  Zhi Zhou,et al.  Halftone visual cryptography , 2006, IEEE Transactions on Image Processing.

[5]  Dai Yiqi Probabilistic visual cryptography scheme with reversing , 2008 .

[6]  Daniel L. Lau,et al.  Modern Digital Halftoning , 2001 .

[7]  Ja-Chen Lin,et al.  Secret Image Sharing: a Boolean-Operations-Based Approach Combining Benefits of Polynomial-Based and Fast Approaches , 2009, Int. J. Pattern Recognit. Artif. Intell..

[8]  Hoi-Ming Wong,et al.  PI-preserve data hiding for halftone image , 2005, 2005 International Symposium on Intelligent Signal Processing and Communication Systems.

[9]  Yasuhiro Takishima,et al.  Visual Cryptography Based on Void-And-Cluster Halftoning Technique , 2006, 2006 International Conference on Image Processing.

[10]  WeiQi Yan,et al.  A Comprehensive Study of Visual Cryptography , 2010, Trans. Data Hiding Multim. Secur..

[11]  Tzung-Her Chen,et al.  Visual secret sharing by random grids revisited , 2009, Pattern Recognit..

[12]  Tzung-Her Chen,et al.  Friendly Color Visual Secret Sharing by Random Grids , 2009, Fundam. Informaticae.

[13]  Xuehu Yan,et al.  A New Assessment Measure of Shadow Image Quality Based on Error Diffusion Techniques , 2013, J. Inf. Hiding Multim. Signal Process..

[14]  Gwoboa Horng,et al.  On generating meaningful shares in visual secret sharing scheme , 2008 .

[15]  Giovanni Di Crescenzo,et al.  Halftone Visual Cryptography Via Error Diffusion , 2009, IEEE Transactions on Information Forensics and Security.

[16]  Ning Ma,et al.  Two secret sharing schemes based on Boolean operations , 2007, Pattern Recognit..

[17]  E. Keren,et al.  Encryption of pictures and shapes by random grids. , 1987, Optics letters.

[18]  Sun Wei Image sharing scheme based on error diffusion , 2011 .

[19]  Zhongmin Wang,et al.  Halftone Visual Cryptography Through Error Diffusion , 2006, 2006 International Conference on Image Processing.

[20]  Moni Naor,et al.  Visual Cryptography , 1994, Encyclopedia of Multimedia.

[21]  Ching-Nung Yang,et al.  New visual secret sharing schemes using probabilistic method , 2004, Pattern Recognit. Lett..

[22]  Yasuhiro Takishima,et al.  Halftone Visual Cryptography Embedding a Natural Grayscale Image Based on Error Diffusion Technique , 2007, 2007 IEEE International Conference on Multimedia and Expo.

[23]  Shundong Li,et al.  (2,n) secret sharing scheme for gray and color images based on Boolean operation , 2011, Science China Information Sciences.

[24]  Tzung-Her Chen,et al.  Threshold visual secret sharing by random grids , 2011, J. Syst. Softw..

[25]  Wei Sun,et al.  Image sharing scheme based on error diffusion: Image sharing scheme based on error diffusion , 2011 .

[26]  Shyong Jian Shyu,et al.  Image encryption by random grids , 2007, Pattern Recognit..

[27]  Tzung-Her Chen,et al.  User-Friendly Random-Grid-Based Visual Secret Sharing , 2011, IEEE Transactions on Circuits and Systems for Video Technology.

[28]  Alfredo De Santis,et al.  Extended capabilities for visual cryptography , 2001, Theor. Comput. Sci..

[29]  N. Otsu A threshold selection method from gray level histograms , 1979 .