Reversible Image Secret Sharing

In reversible image secret sharing (RISS), the cover image can be recovered to some degree, and a share can be comprehensible rather than noise-like. Reversible cover images play an important role in law enforcement and medical diagnosis. The comprehensible share can not only reduce the suspicion of attackers but also improve the management efficiency of shares. In this paper, we first provide a formal definition of RISS. Then, we propose an RISS algorithm for a $(k,n)$ -threshold based on the principle of the Chinese remainder theorem-based ISS (CRTISS). In the proposed RISS, the secret image is losslessly decoded by a modular operation, and the original cover image is recovered by a binarization operation, both of which are just simple operations. Theoretical analyses and experiments are provided to validate the proposed definition and algorithm.

[1]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[2]  Xin Liu,et al.  An enhanced threshold visual secret sharing based on random grids , 2015, Journal of Real-Time Image Processing.

[3]  Chin-Chen Chang,et al.  Lossless and unlimited multi-image sharing based on Chinese remainder theorem and Lagrange interpolation , 2014, Signal Process..

[4]  Jeng-Shyang Pan,et al.  Multiple Watermarking in Visual Cryptography , 2008, IWDW.

[5]  Chin-Chen Chang,et al.  Distortion-free secret image sharing mechanism using modulus operator , 2009, Pattern Recognit..

[6]  Giovanni Di Crescenzo,et al.  Halftone Visual Cryptography Via Error Diffusion , 2009, IEEE Transactions on Information Forensics and Security.

[7]  V. Ralph Algazi,et al.  Objective picture quality scale (PQS) for image coding , 1998, IEEE Trans. Commun..

[8]  Bin Yu,et al.  Improved Visual Secret Sharing Scheme for QR Code Applications , 2018, IEEE Transactions on Information Forensics and Security.

[9]  Shyong Jian Shyu,et al.  Threshold Secret Image Sharing by Chinese Remainder Theorem , 2008, 2008 IEEE Asia-Pacific Services Computing Conference.

[10]  Lei Zhu,et al.  Cheating identifiable secret sharing scheme using symmetric bivariate polynomial , 2018, Inf. Sci..

[11]  Song Wan,et al.  Exploiting the Homomorphic Property of Visual Cryptography , 2017, Int. J. Digit. Crime Forensics.

[12]  Ching-Nung Yang,et al.  Halftone visual cryptography with minimum auxiliary black pixels and uniform image quality , 2015, Digit. Signal Process..

[13]  Song Wan,et al.  Chinese Remainder Theorem-Based Secret Image Sharing for (k, n) Threshold , 2017, ICCCS.

[14]  Moni Naor,et al.  Secret-Sharing for NP , 2014, Journal of Cryptology.

[15]  Song Wan,et al.  Security Analysis of Secret Image Sharing , 2017, ICPCSEE.

[16]  Moni Naor,et al.  Visual Cryptography , 1994, Encyclopedia of Multimedia.

[17]  Neil Genzlinger A. and Q , 2006 .

[18]  Feng Liu,et al.  Threshold visual secret sharing by random grids with improved contrast , 2013, J. Syst. Softw..

[19]  Bin Yu,et al.  Visual Cryptography and Random Grids Schemes , 2013, IWDW.

[20]  John Bloom,et al.  A modular approach to key safeguarding , 1983, IEEE Trans. Inf. Theory.

[21]  Douglas R. Stinson,et al.  An explication of secret sharing schemes , 1992, Des. Codes Cryptogr..

[22]  WeiQi Yan,et al.  A Comprehensive Study of Visual Cryptography , 2010, Trans. Data Hiding Multim. Secur..

[23]  Masayuki Fukumitsu,et al.  A Proposal of a Secure P2P-Type Storage Scheme by Using the Secret Sharing and the Blockchain , 2017, 2017 IEEE 31st International Conference on Advanced Information Networking and Applications (AINA).

[24]  Ching-Nung Yang,et al.  Image secret sharing method with two-decoding-options: Lossless recovery and previewing capability , 2010, Image Vis. Comput..

[25]  Yuliang Lu,et al.  Progressive visual secret sharing for general access structure with multiple decryptions , 2016, 2016 8th International Conference on Information Technology in Medicine and Education (ITME).

[26]  Ja-Chen Lin,et al.  Secret image sharing , 2002, Comput. Graph..

[27]  Feng Liu,et al.  Basic Visual Cryptography Using Braille , 2016, Int. J. Digit. Crime Forensics.

[28]  Aaas News,et al.  Book Reviews , 1893, Buffalo Medical and Surgical Journal.

[29]  Linlin Guo,et al.  Robust Image Fingerprinting via Distortion-Resistant Sparse Coding , 2018, IEEE Signal Processing Letters.

[30]  Mohammad Atique,et al.  Signature based authentication using contrast enhanced hierarchical visual cryptography , 2014, 2014 IEEE Students' Conference on Electrical, Electronics and Computer Science.

[31]  Shlomo Shamai,et al.  An Information Theoretic Approach to Secret Sharing , 2015, IEEE Transactions on Information Theory.

[32]  Vasif V. Nabiyev,et al.  Invertible secret image sharing for gray level and dithered cover images , 2013, J. Syst. Softw..

[33]  Vasif V. Nabiyev,et al.  A new secret image sharing technique based on Asmuth Bloom's scheme , 2009, 2009 International Conference on Application of Information and Communication Technologies.

[34]  Ting-Wei Chuang,et al.  Image Sharing and Recovering Based on Chinese Remainder Theorem , 2016, 2016 International Symposium on Computer, Consumer and Control (IS3C).

[35]  Xiaofeng Liao,et al.  Secret Image Sharing Based on Chaotic Map and Chinese Remainder Theorem , 2012, Int. J. Wavelets Multiresolution Inf. Process..

[36]  Wen Wang,et al.  Temporal Integration Based Visual Cryptography Scheme and Its Application , 2017, IWDW.

[37]  Pei-Yu Lin,et al.  Invertible secret image sharing with steganography , 2010, Pattern Recognit. Lett..

[38]  Atif Alamri,et al.  Efficient Quantum Information Hiding for Remote Medical Image Sharing , 2018, IEEE Access.

[39]  A. Murat Tekalp,et al.  Reversible data hiding , 2002, Proceedings. International Conference on Image Processing.

[40]  W. Marsden I and J , 2012 .

[41]  Chin-Chen Chang,et al.  Sharing secrets in stego images with authentication , 2008, Pattern Recognit..

[42]  Nenghai Yu,et al.  Emerging applications of reversible data hiding , 2018, ICIGP.