Polynomial Based Progressive Secret Image Sharing Scheme With Smaller Shadow Size

Progressive secret image sharing (PSIS) scheme attracts the interests of researchers in recent years. Many approaches have been proposed to construct PSIS schemes. In most of these schemes, the size of the shadow is expanded from the original image. On the contrary, polynomial-based PSIS can reduce shadow size from the original image. Recently, Yang and Huang proposed a polynomial-based <inline-formula> <tex-math notation="LaTeX">$(k,n)$ </tex-math></inline-formula> PSIS, where the image can be progressively reconstructed from <inline-formula> <tex-math notation="LaTeX">$k$ </tex-math></inline-formula> to <inline-formula> <tex-math notation="LaTeX">$n$ </tex-math></inline-formula> shadows. However, the problem of Yang–Huang’s scheme is that the percentage of the recovered partial image from <inline-formula> <tex-math notation="LaTeX">$t$ </tex-math></inline-formula> shadows is extremely low when <inline-formula> <tex-math notation="LaTeX">$t$ </tex-math></inline-formula> is close to <inline-formula> <tex-math notation="LaTeX">$k$ </tex-math></inline-formula>. Later, Yang and Chu constructed another polynomial-based <inline-formula> <tex-math notation="LaTeX">$(k,n)$ </tex-math></inline-formula> PSIS with smooth property to solve this problem, but the size of the shadow is expanded greatly from Yang–Huang’ scheme. In this paper, we propose a new <inline-formula> <tex-math notation="LaTeX">$(k,n)$ </tex-math></inline-formula> PSIS based on polynomial to overcome the drawbacks of these two schemes. In our scheme, <inline-formula> <tex-math notation="LaTeX">$t$ </tex-math></inline-formula> shadows (<inline-formula> <tex-math notation="LaTeX">$t$ </tex-math></inline-formula> is close to <inline-formula> <tex-math notation="LaTeX">$k$ </tex-math></inline-formula>) can recover more percentage partial image than Yang–Huang’s scheme with a little shadow size expansion; comparing with Yang–Chu’s scheme, our scheme achieves almost the same smooth property with much smaller shadow size.

[1]  Ran-Zan Wang,et al.  Scalable secret image sharing , 2007, Signal Process. Image Commun..

[2]  Ching-Nung Yang,et al.  Progressive (k, n) secret image sharing Scheme with meaningful shadow images by GEMD and RGEMD , 2018, J. Vis. Commun. Image Represent..

[3]  Ching-Nung Yang,et al.  $k$ Out of $n$ Region Incrementing Scheme in Visual Cryptography , 2012, IEEE Transactions on Circuits and Systems for Video Technology.

[4]  Yining Liu,et al.  A Secure Authentication Protocol for Internet of Vehicles , 2019, IEEE Access.

[5]  Ching-Nung Yang,et al.  A general (k, n) scalable secret image sharing scheme with the smooth scalability , 2011, J. Syst. Softw..

[6]  Ran-Zan Wang,et al.  Region Incrementing Visual Cryptography , 2009, IEEE Signal Processing Letters.

[7]  Shyong Jian Shyu,et al.  Efficient Construction for Region Incrementing Visual Cryptography , 2012, IEEE Transactions on Circuits and Systems for Video Technology.

[8]  Ran-Zan Wang,et al.  Secret image sharing with smaller shadow images , 2006, Pattern Recognit. Lett..

[9]  Yanan Zhao,et al.  Efficient and Provably Secure Certificateless Parallel Key-Insulated Signature Without Pairing for IIoT Environments , 2020, IEEE Systems Journal.

[10]  Shyong Jian Shyu,et al.  General Constructions for Threshold Multiple-Secret Visual Cryptographic Schemes , 2013, IEEE Transactions on Information Forensics and Security.

[11]  Chih-Fong Tsai,et al.  Block-based progressive visual secret sharing , 2013, Inf. Sci..

[12]  Nan Wang,et al.  Identification of Influential Online Social Network Users Based on Multi-Features , 2016, Int. J. Pattern Recognit. Artif. Intell..

[13]  Nan Wang,et al.  Local spatial obesity analysis and estimation using online social network sensors , 2018, J. Biomed. Informatics.

[14]  Ching-Nung Yang,et al.  Scalable secret image sharing scheme with essential shadows , 2017, Signal Process. Image Commun..

[15]  Ching-Nung Yang,et al.  Progressive (k, n) secret image sharing schemes based on Boolean operations and covering codes , 2018, Signal Process. Image Commun..

[16]  Jianfeng Ma,et al.  Integrating Gaze Tracking and Head-Motion Prediction for Mobile Device Authentication: A Proof of Concept , 2018, Sensors.

[17]  Chien-Ming Chen,et al.  A provably secure certificateless public key encryption with keyword search , 2019, Journal of the Chinese Institute of Engineers.

[18]  Chien-Ming Chen,et al.  Security Analysis and Enhancement of a Certificateless Searchable Public Key Encryption Scheme for IIoT Environments , 2019, IEEE Access.

[19]  Ching-Nung Yang,et al.  Constructions and properties of k out of n scalable secret image sharing , 2010 .

[20]  Yang Liu,et al.  A machine learning-based scheme for the security analysis of authentication and key agreement protocols , 2018, Neural Computing and Applications.

[21]  W. Marsden I and J , 2012 .

[22]  Hao Zhang,et al.  Partially policy-hidden attribute-based broadcast encryption with secure delegation in edge computing , 2019, Future Gener. Comput. Syst..

[23]  Moni Naor,et al.  Visual Cryptography , 1994, Encyclopedia of Multimedia.

[24]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[25]  Ja-Chen Lin,et al.  Secret image sharing , 2002, Comput. Graph..

[26]  Yuliang Lu,et al.  Greyscale-images-oriented progressive secret sharing based on the linear congruence equation , 2017, Multimedia Tools and Applications.

[27]  Ching-Nung Yang,et al.  A general multi-secret visual cryptography scheme , 2010 .

[28]  Yang Liu,et al.  Lightweight Privacy-Preserving Ensemble Classification for Face Recognition , 2019, IEEE Internet of Things Journal.

[29]  Jiamin Wang,et al.  Node importance evaluation method in wireless sensor network based on energy field model , 2016, EURASIP J. Wirel. Commun. Netw..

[30]  Li Liu,et al.  Secret sharing: using meaningful image shadows based on Gray code , 2016, Multimedia Tools and Applications.

[31]  Aversa,et al.  General k , 1994, Physical review. B, Condensed matter.

[32]  Chien-Ming Chen,et al.  Attacks and solutions on a three-party password-based authenticated key exchange protocol for wireless communications , 2018, Journal of Ambient Intelligence and Humanized Computing.

[33]  Jianfeng Ma,et al.  A Combination Method for Android Malware Detection Based on Control Flow Graphs and Machine Learning Algorithms , 2019, IEEE Access.