Secure image transmission based on visual cryptography scheme and artificial neural network-particle swarm optimization-guided adaptive vector quantization

Abstract. Image transmission holds a major share in data communication, and thus secure image transmission is currently a challenging domain of research. A secure image transmission scheme is proposed that physically transmits the encrypted image employing visual cryptography scheme (VCS). During physical transmission, the meaningless shares may attract curious hackers and if captured and stacked, the secret may be revealed. Moreover, the increase in transmission overhead due to multiple share images resulted from a single secret image after encryption is another concern regarding the physical implementation of VCS. Focusing on both observations, vector quantization (VQ) is used to encode as well as to compress each of the shares before transmission. To utilize VQ, its two parameters, cell width and dimension of grid, are needed to be optimized for various kind of images without compromising the randomness property of the shares. Hence, a particle swarm optimization-guided VQ is proposed, and furthermore, a multilayer perceptron in conjunction with an autoencoder are also trained in synchronism with that to automatically obtain the optimal VQ for each image type during the transmission. The proposed scheme is successfully implemented with different types of images for secure physical transmission with a 62.8% data volume reduction and 98.07% image quality retrieval.

[1]  Xiaobo Li,et al.  Probabilistic visual secret sharing schemes for grey-scale images and color images , 2007, Inf. Sci..

[2]  Shyong Jian Shyu,et al.  Image encryption by random grids , 2007, Pattern Recognit..

[3]  Her-Chang Chao,et al.  User-friendly XOR-based visual secret sharing by random grid , 2018, IET Inf. Secur..

[4]  Wei Su,et al.  Reversible data hiding , 2006, IEEE Transactions on Circuits and Systems for Video Technology.

[5]  Weiming Zhang,et al.  Recursive Histogram Modification: Establishing Equivalency Between Reversible Data Hiding and Lossless Data Compression , 2013, IEEE Transactions on Image Processing.

[6]  Stelvio Cimato,et al.  Visual cryptography schemes with optimal pixel expansion , 2006, Theor. Comput. Sci..

[7]  Zhi Zhou,et al.  Halftone visual cryptography , 2006, IEEE Transactions on Image Processing.

[8]  Jun Tian,et al.  Reversible data embedding using a difference expansion , 2003, IEEE Trans. Circuits Syst. Video Technol..

[9]  James Kennedy,et al.  Particle swarm optimization , 2002, Proceedings of ICNN'95 - International Conference on Neural Networks.

[10]  H.C.A. van Tilborg,et al.  A construction of a k out of n visual secret sharing scheme , 1997 .

[11]  Feng Liu,et al.  Optimal XOR Based (2, n)-Visual Cryptography Schemes , 2014, IWDW.

[12]  Chang-Chou Lin,et al.  Visual cryptography for gray-level images by dithering techniques , 2003, Pattern Recognit. Lett..

[13]  Xuehu Yan,et al.  Meaningful visual secret sharing based on error diffusion and random grids , 2015, Multimedia Tools and Applications.

[14]  Alfredo De Santis,et al.  On the Relation of Random Grid and Deterministic Visual Cryptography , 2014, IEEE Trans. Inf. Forensics Secur..

[15]  Moni Naor,et al.  Visual cryptography for grey level images , 2000, Inf. Process. Lett..

[16]  Annalisa De Bonis,et al.  Improved Schemes for Visual Cryptography , 2001, Des. Codes Cryptogr..

[17]  Henk D. L. Hollmann,et al.  XOR-based Visual Cryptography Schemes , 2005, Des. Codes Cryptogr..

[18]  Wen-Hsiang Tsai,et al.  Quotation Authentication: A New Approach and Efficient Solutions by Cascaded Hashing Techniques , 2010, IEEE Transactions on Information Forensics and Security.

[19]  Chuankun Wu,et al.  Embedded Extended Visual Cryptography Schemes , 2011, IEEE Transactions on Information Forensics and Security.

[20]  Eric R. Verheul,et al.  Constructions and Properties of k out of n Visual Secret Sharing Schemes , 1997, Des. Codes Cryptogr..

[21]  Ching-Nung Yang,et al.  Property Analysis of XOR-Based Visual Cryptography , 2014, IEEE Transactions on Circuits and Systems for Video Technology.

[22]  Tong Liu,et al.  Improving the visual quality of random grid-based visual secret sharing via error diffusion , 2013, J. Vis. Commun. Image Represent..

[23]  Wei Sun,et al.  Improving the visual quality of random grid-based visual secret sharing , 2013, Signal Process..

[24]  Feng Liu,et al.  Step Construction of Visual Cryptography Schemes , 2010, IEEE Transactions on Information Forensics and Security.

[25]  Lee-Ming Cheng,et al.  Hiding data in images by simple LSB substitution , 2004, Pattern Recognit..

[26]  Alwyn Roshan Pais,et al.  Randomised visual secret sharing scheme for grey-scale and colour images , 2018, IET Image Process..

[27]  Ja-Chen Lin,et al.  Secret Image Sharing: a Boolean-Operations-Based Approach Combining Benefits of Polynomial-Based and Fast Approaches , 2009, Int. J. Pattern Recognit. Artif. Intell..

[28]  Ching-Nung Yang,et al.  New visual secret sharing schemes using probabilistic method , 2004, Pattern Recognit. Lett..

[29]  Vascan O. Orest,et al.  Improving vector quantization in image compression with Hilbert scan , 2013, 2013 20th International Conference on Systems, Signals and Image Processing (IWSSIP).

[30]  Jayanta K. Chandra,et al.  Quantum signal processing-based visual cryptography with unexpanded shares , 2015, J. Electronic Imaging.

[31]  Giovanni Di Crescenzo,et al.  Halftone Visual Cryptography Via Error Diffusion , 2009, IEEE Transactions on Information Forensics and Security.

[32]  Alfredo De Santis,et al.  Color visual cryptography schemes for black and white secret images , 2013, Theor. Comput. Sci..

[33]  Wei Sun,et al.  Random grid-based visual secret sharing with abilities of OR and XOR decryptions , 2013, J. Vis. Commun. Image Represent..

[34]  Pei-Ling Chiu,et al.  Digital Image Sharing by Diverse Image Media , 2014, IEEE Transactions on Information Forensics and Security.

[35]  Chong Fu,et al.  Medical image protection using hyperchaos-based encryption , 2015, 2015 9th International Symposium on Medical Information and Communication Technology (ISMICT).

[36]  Wei Sun,et al.  Extended Capabilities for XOR-Based Visual Cryptography , 2014, IEEE Transactions on Information Forensics and Security.

[37]  Ching-Nung Yang,et al.  Extended color visual cryptography for black and white secret image , 2016, Theor. Comput. Sci..

[38]  Bin Yu,et al.  Perfect recovery of XOR-based visual cryptography scheme , 2018, Multimedia Tools and Applications.

[39]  Douglas R. Stinson,et al.  Threshold Visual Cryptography Schemes with Specified Whiteness Levels of Reconstructed Pixels , 2002, Des. Codes Cryptogr..

[40]  Mingjun Wei,et al.  Double-feedback image encryption based on chaotic dynamic grouping of FRFT , 2016, 2016 6th International Conference on Electronics Information and Emergency Communication (ICEIEC).

[41]  Xuehu Yan,et al.  Threshold progressive visual cryptography construction with unexpanded shares , 2015, Multimedia Tools and Applications.

[42]  Rohit Srivastava,et al.  Hierarchical visual cryptography for grayscale image , 2016, 2016 Online International Conference on Green Engineering and Technologies (IC-GET).

[43]  Bin Yu,et al.  Perfect contrast XOR-based visual cryptography schemes via linear algebra , 2017, Des. Codes Cryptogr..

[44]  張兆源,et al.  彩色影像視覺密碼之製作; Visual Cryptography for Color Images , 2000 .

[45]  Shih-Chieh Wei,et al.  Random-Grid-Based Visual Cryptography Schemes , 2014, IEEE Transactions on Circuits and Systems for Video Technology.

[46]  Yasushi Yamaguchi,et al.  Extended Visual Cryptography for Natural Images , 2002, WSCG.

[47]  Fernando Pérez-González,et al.  Digital-Forensics and Watermarking , 2014, Lecture Notes in Computer Science.

[48]  Feng Liu,et al.  Colour visual cryptography schemes , 2008, IET Inf. Secur..

[49]  Ning Ma,et al.  Two secret sharing schemes based on Boolean operations , 2007, Pattern Recognit..

[50]  Stelvio Cimato,et al.  Probabilistic Visual Cryptography Schemes , 2006, Comput. J..

[51]  Young-Chang Hou,et al.  Visual cryptography for color images , 2003, Pattern Recognit..

[52]  Tieyong Zeng,et al.  Efficient Reversible Watermarking Based on Adaptive Prediction-Error Expansion and Pixel Selection , 2011, IEEE Transactions on Image Processing.

[53]  E. Keren,et al.  Encryption of pictures and shapes by random grids. , 1987, Optics letters.