Reducing shadow size in essential secret image sharing by conjunctive hierarchical approach

Abstract Recently, Li et al. proposed a ( t , s , k , n ) essential secret image sharing (ESIS) scheme with different importance of shadows, which has s essential shadow images and n − s non-essential shadow images. This ( t , s , k , n )-ESIS scheme can simultaneously provide the conventional threshold property ( k or more shadow images are required in reconstruction) and the essential-threshold property (these involved k shadow images should include at least t essential shadow images). Generally, small shadow images have advantages in storage or transmission, and will be suitable for modern visual communication applications where features such as secure transmission and storage are required. Therefore, the size of shadow image is a critical consideration for designing ESIS-( t , s , k , n ) scheme. In this paper, we propose a ( t , s , k , n )-ESIS scheme to achieve the less size of total shadow images and the less size of required shadow images in reconstruction when compared with Li et al.’s ( t , s , k , n )-ESIS scheme.

[1]  Ran-Zan Wang,et al.  Scalable secret image sharing , 2007, Signal Process. Image Commun..

[2]  Ching-Nung Yang,et al.  $k$ Out of $n$ Region Incrementing Scheme in Visual Cryptography , 2012, IEEE Transactions on Circuits and Systems for Video Technology.

[3]  Ching-Nung Yang,et al.  $k$ Out of $n$ Region Incrementing Scheme in Visual Cryptography , 2012, IEEE Trans. Circuits Syst. Video Technol..

[4]  Xiaobo Li,et al.  Probabilistic visual secret sharing schemes for grey-scale images and color images , 2007, Inf. Sci..

[5]  Ching-Nung Yang,et al.  A general multi-secret visual cryptography scheme , 2010 .

[6]  Ran-Zan Wang,et al.  Scalable Secret Image Sharing With Smaller Shadow Images , 2010, IEEE Signal Processing Letters.

[7]  Ching-Nung Yang,et al.  Steganography and authentication in image sharing without parity bits , 2012 .

[8]  Moni Naor,et al.  Visual Cryptography , 1994, Encyclopedia of Multimedia.

[9]  Ziba Eslami,et al.  Secret image sharing scheme with hierarchical threshold access structure , 2014, J. Vis. Commun. Image Represent..

[10]  Ran-Zan Wang,et al.  Secret image sharing with smaller shadow images , 2006, Pattern Recognit. Lett..

[11]  Shang-Juh Kao,et al.  Enhance the Image Sharing with Steganography and Authentication , 2008, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[12]  Amos Beimel,et al.  Secret Sharing with Public Reconstruction , 1998, IEEE Trans. Inf. Theory.

[13]  Chang-Chou Lin,et al.  Secret image sharing with steganography and authentication , 2004, J. Syst. Softw..

[14]  Ching-Nung Yang,et al.  A general (k, n) scalable secret image sharing scheme with the smooth scalability , 2011, J. Syst. Softw..

[15]  Ching-Nung Yang,et al.  Constructions and properties of k out of n scalable secret image sharing , 2010 .

[16]  Shang-Juh Kao,et al.  A high quality image sharing with steganography and adaptive authentication scheme , 2011, J. Syst. Softw..

[17]  Aversa,et al.  General k , 1994, Physical review. B, Condensed matter.

[18]  Ching-Nung Yang,et al.  Essential secret image sharing scheme with different importance of shadows , 2013, J. Vis. Commun. Image Represent..

[19]  Chih-Fong Tsai,et al.  Block-based progressive visual secret sharing , 2013, Inf. Sci..

[20]  Shyong Jian Shyu,et al.  General Constructions for Threshold Multiple-Secret Visual Cryptographic Schemes , 2013, IEEE Transactions on Information Forensics and Security.

[21]  Chin-Chen Chang,et al.  A hierarchical threshold secret image sharing , 2012, Pattern Recognit. Lett..

[22]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[23]  Feng Liu,et al.  Some Extensions on Threshold Visual Cryptography Schemes , 2010, Comput. J..

[24]  Ja-Chen Lin,et al.  Secret image sharing , 2002, Comput. Graph..

[25]  Chin-Chen Chang,et al.  Sharing secrets in stego images with authentication , 2008, Pattern Recognit..