A Novel Perceptual Secret Sharing Scheme

In this paper, a novel perceptual secret sharing model namely PSS model is defined. Then, a general (1, k out of n) PSS scheme is proposed based on maximum likelihood estimation (MLE). The proposed model has a large number of valuable features that previous secret sharing schemes fail to have. Furthermore, the proposed PSS scheme satisfies P (l, k, n) threshold mechanism which means that no perceptual information of the secret data will be revealed when the number of shadows is less than l, the degraded perceptual quality will be recovered when the number of shadows is greater than or equal to l and less than k, the more shadows the better recovered perceptual quality will be. Lossless perceptual quality will be recovered when the number of shadows is greater than or equal to k and less than or equal to n that could control access for different owners. This property will be useful for prominent prevalence in real applications like pay-per-view videos, Pay- TV/Music and art-work image vending, video on demand (VOD), etc.

[1]  Bharat K. Bhargava,et al.  On the Design of Perceptual MPEG-Video Encryption Algorithms , 2005, IEEE Transactions on Circuits and Systems for Video Technology.

[2]  Tzung-Her Chen,et al.  User-Friendly Random-Grid-Based Visual Secret Sharing , 2011, IEEE Transactions on Circuits and Systems for Video Technology.

[3]  Wei Sun,et al.  Random grid-based visual secret sharing with abilities of OR and XOR decryptions , 2013, J. Vis. Commun. Image Represent..

[4]  WeiQi Yan,et al.  A Comprehensive Study of Visual Cryptography , 2010, Trans. Data Hiding Multim. Secur..

[5]  Wei Sun,et al.  Improving the visual quality of random grid-based visual secret sharing , 2013, Signal Process..

[6]  Ahmed A. Abd El-Latif,et al.  A New Loss-Tolerant Image Encryption Scheme Based on Secret Sharing and Two Chaotic Systems , 2012 .

[7]  Mohan S. Kankanhalli,et al.  Progressive color visual cryptography , 2005, J. Electronic Imaging.

[8]  Rajendra Kumar Sharma,et al.  Threshold visual secret sharing based on Boolean operations , 2014, Secur. Commun. Networks.

[9]  Alfredo De Santis,et al.  Advances in Cryptology — EUROCRYPT'94 , 1994, Lecture Notes in Computer Science.

[10]  Ching-Nung Yang,et al.  New visual secret sharing schemes using probabilistic method , 2004, Pattern Recognit. Lett..

[11]  Chaur-Heh Hsieh,et al.  Progressive sharing for a secret image , 2010, J. Syst. Softw..

[12]  Giovanni Di Crescenzo,et al.  Halftone Visual Cryptography Via Error Diffusion , 2009, IEEE Transactions on Information Forensics and Security.

[13]  Xuehu Yan,et al.  Corrigendum to "T. Chen, K. Tsao, Threshold visual secret sharing by random grids" [J. Syst. Softw. 84(2011) 1197-1208] , 2013, J. Syst. Softw..

[14]  W. -P. Fang,et al.  Progressive viewing and sharing of sensitive images , 2006, Pattern Recognition and Image Analysis.

[15]  Andres Torrubia,et al.  Perceptual cryptography on MPEG-1 layer III bit-streams , 2002, 2002 Digest of Technical Papers. International Conference on Consumer Electronics (IEEE Cat. No.02CH37300).

[16]  Young-Chang Hou,et al.  Progressive Visual Cryptography With Unexpanded Shares , 2011, IEEE Transactions on Circuits and Systems for Video Technology.

[17]  Tzung-Her Chen,et al.  Threshold visual secret sharing by random grids , 2011, J. Syst. Softw..

[18]  Sun Wei Image sharing scheme based on error diffusion , 2011 .

[19]  Ning Ma,et al.  Two secret sharing schemes based on Boolean operations , 2007, Pattern Recognit..

[20]  Dai Yiqi Probabilistic visual cryptography scheme with reversing , 2008 .

[21]  Xuehu Yan,et al.  A New Assessment Measure of Shadow Image Quality Based on Error Diffusion Techniques , 2013, J. Inf. Hiding Multim. Signal Process..

[22]  Rong Zhao,et al.  A new image secret sharing scheme to identify cheaters , 2009, Comput. Stand. Interfaces.

[23]  Xuehu Yan,et al.  Threshold Visual Secret Sharing Based on Boolean Operations and Random Grids , 2014, ICONIP.

[24]  E. Keren,et al.  Encryption of pictures and shapes by random grids. , 1987, Optics letters.

[25]  Shyong Jian Shyu,et al.  Image encryption by random grids , 2007, Pattern Recognit..

[26]  Zhi Zhou,et al.  Halftone visual cryptography , 2006, IEEE Transactions on Image Processing.

[27]  Alfredo De Santis,et al.  Extended capabilities for visual cryptography , 2001, Theor. Comput. Sci..

[28]  Bian Yang,et al.  Perceptual image encryption via reversible histogram spreading , 2009, 2009 Proceedings of 6th International Symposium on Image and Signal Processing and Analysis.

[29]  Ja-Chen Lin,et al.  An image-sharing method with user-friendly shadow images , 2003, IEEE Trans. Circuits Syst. Video Technol..

[30]  Ja-Chen Lin,et al.  Fault-tolerant and progressive transmission of images , 2005, Pattern Recognit..

[31]  Yun Q. Shi,et al.  Transactions on Data Hiding and Multimedia Security III , 2008, Trans. Data Hiding and Multimedia Security.

[32]  Moni Naor,et al.  Visual Cryptography , 1994, Encyclopedia of Multimedia.

[33]  Li Li,et al.  Meaningful Image Sharing Threshold Scheme Based on Error Diffusion , 2012 .

[34]  Chih-Fong Tsai,et al.  Block-based progressive visual secret sharing , 2013, Inf. Sci..

[35]  Shang Kuan Chen Friendly progressive visual secret sharing using generalized random grids , 2009 .