Significant Secret Image Sharing Scheme Based on Boolean Operation

Abstract Traditionally, (k, n) secret image sharing is an approach of breaking down a secret image into n number of shadow images to assign them to n number of users, so that any k or more then k users can bring back the secret image. But in case of less than k, users cannot reveal any partial information about the original image. We have proposed a significant secret image sharing technique based on XOR with arithmetic operations that upgrade the performance of traditional secret image sharing approaches by serving importance to shadow images according to user’s significance. This scheme also conserves the fault tolerance property which plays a vital role in image sharing field.

[1]  Chin-Chen Chang,et al.  A novel secret image sharing scheme in color images using small shadow images , 2008, Inf. Sci..

[2]  Gwoboa Horng,et al.  A cheating prevention scheme for binary visual cryptography with homogeneous secret images , 2007, Pattern Recognit..

[3]  G. R. BLAKLEY Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).

[4]  Gwoboa Horng,et al.  A novel secret image sharing scheme for true-color images with size constraint , 2009, Inf. Sci..

[5]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[6]  Ching-Nung Yang,et al.  Essential secret image sharing scheme with different importance of shadows , 2013, J. Vis. Commun. Image Represent..

[7]  Chien-Chang Chen,et al.  Weighted modulated secret image sharing method , 2009, J. Electronic Imaging.

[8]  Rajneesh Rani,et al.  Strong threshold secret image sharing based on boolean operation , 2016, 2016 International Conference on Computing, Communication and Automation (ICCCA).

[9]  Michael G. Strintzis,et al.  Optimized transmission of JPEG2000 streams over wireless channels , 2006, IEEE Transactions on Image Processing.

[10]  Moni Naor,et al.  Visual Cryptography , 1994, Encyclopedia of Multimedia.

[11]  Jianfei Cai,et al.  Robust Transmission of JPEG2000 Encoded Images Over Packet Loss Channels , 2007, 2007 IEEE International Conference on Multimedia and Expo.

[12]  Alfredo De Santis,et al.  Extended capabilities for visual cryptography , 2001, Theor. Comput. Sci..

[13]  Tzungher Chen,et al.  Efficient multi-secret image sharing based on Boolean operations , 2011, Signal Process..

[14]  Congxu Zhu,et al.  A novel image encryption scheme based on improved hyperchaotic sequences , 2012 .

[15]  Moni Naor,et al.  Visual cryptography for grey level images , 2000, Inf. Process. Lett..

[16]  Ja-Chen Lin,et al.  Secret image sharing , 2002, Comput. Graph..

[17]  Ning Ma,et al.  Two secret sharing schemes based on Boolean operations , 2007, Pattern Recognit..

[18]  Chang-Chou Lin,et al.  Secret image sharing with steganography and authentication , 2004, J. Syst. Softw..

[19]  Ran-Zan Wang,et al.  Secret image sharing with smaller shadow images , 2006, Pattern Recognit. Lett..

[20]  Young-Chang Hou,et al.  Visual cryptography for color images , 2003, Pattern Recognit..

[21]  Chin-Chen Chang,et al.  Sharing a verifiable secret image using two shadows , 2009, Pattern Recognit..

[22]  Chang-Chou Lin,et al.  Visual cryptography for gray-level images by dithering techniques , 2003, Pattern Recognit. Lett..

[23]  Xingyuan Wang,et al.  Image encryption using DNA complementary rule and chaotic maps , 2012, Appl. Soft Comput..

[24]  Debasree Sarkar,et al.  Secret Image Sharing Scheme Based on a Boolean Operation , 2014 .