An Adaptable (n, n) Secret Image Sharing Mechanism Based on Boolean Operation

Secret image sharing, as an extension of secret sharing, has attracted the attention of many scholars in recent years. Multi-secret image sharing is an extension of traditional secret image sharing in which only one secret image can be shared among one group. In order to extend the utility of the mechanism, we propose an innovative (n, n) secret image sharing scheme based on matrix transformation. Due to the skillful design of the matrix operation used in matrix transformation, the proposed scheme is applicable to more than one secret image. Further, more secret images and participants can be included in this sharing system even after the secret image sharing procedure has been constructed. Also, the proposed scheme produces highquality shadow images, and it can reconstruct the secret images losslessly. Moreover, the computational complexity of the proposed scheme is minimized by only using the XOR operation, which stands for exclusive or and is a logical operation that outputs true whenever both inputs differ. The experimental results demonstrated that the proposed scheme provides the aforementioned advantages.

[1]  Chin-Chen Chang,et al.  A novel secret image sharing scheme in color images using small shadow images , 2008, Inf. Sci..

[2]  Chin-Chen Chang,et al.  Sharing Secret Omages using Shadow Codebooks , 1998, Inf. Sci..

[3]  Chin-Chen Chang,et al.  Secret Image Sharing with Reversible Steganography , 2009, 2009 International Conference on Computational Intelligence and Natural Computing.

[4]  Rong Zhao,et al.  A new image secret sharing scheme to identify cheaters , 2009, Comput. Stand. Interfaces.

[5]  Ja-Chen Lin,et al.  Sharing and hiding secret images with size constraint , 2004, Pattern Recognit..

[6]  Chin-Chen Chang,et al.  Sharing secrets in stego images with authentication , 2008, Pattern Recognit..

[7]  G. R. Blakley,et al.  Safeguarding cryptographic keys , 1899, 1979 International Workshop on Managing Requirements Knowledge (MARK).

[8]  Chang-Chou Lin,et al.  Secret image sharing with steganography and authentication , 2004, J. Syst. Softw..

[9]  Moni Naor,et al.  Visual Cryptography , 1994, Encyclopedia of Multimedia.

[10]  Henk D. L. Hollmann,et al.  XOR-based Visual Cryptography Schemes , 2005, Des. Codes Cryptogr..

[11]  Lin Dong,et al.  Novel (n, n) Secret Image Sharing Scheme Based on Addition , 2010, 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[12]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[13]  Chin-Chen Chang,et al.  Secret Image Hiding and Sharing Based on the (t, n)-Threshold , 2007, Fundam. Informaticae.

[14]  Ran-Zan Wang,et al.  Secret image sharing with smaller shadow images , 2006, Pattern Recognit. Lett..

[15]  Chin-Chen Chang,et al.  Sharing multiple secrets in digital images , 2002, J. Syst. Softw..

[16]  Ja-Chen Lin,et al.  Secret image sharing , 2002, Comput. Graph..

[17]  Hung-Min Sun,et al.  Construction of dynamic threshold schemes , 1994 .