Novel Lossless Morphing Algorithm for Secret Sharing via Meaningful Images

Image morphing algorithms create an intermediate image that resembles both the source image and the target image simultaneously. Most existing morphing algorithms incur information loss, thus, they cannot reconstruct the original images accurately. This paper proposes a novel, lossless image morphing (LIM) algorithm, designed so that the original image can be losslessly reconstructed from the morphed image. Additionally, the proposed LIM algorithm is used for secret image sharing in which the shares are generated by the image morphing operation. The shares are high-quality, natural images, and the secret image can be losslessly reconstructed, under the condition that all of the shareholders work cooperatively. Due to non-linear warping in the LIM algorithm, the proposed secret image sharing scheme is unconditionally secure.

[1]  Chin-Chen Chang,et al.  Edge directed automatic control point selection algorithm for image morphing , 2013 .

[2]  Nicolas Passat,et al.  Topology Preserving Warping of 3-D Binary Images According to Continuous One-to-One Mappings , 2011, IEEE Transactions on Image Processing.

[3]  Aljoscha Smolic,et al.  Automatic View Synthesis by Image-Domain-Warping , 2013, IEEE Transactions on Image Processing.

[4]  Hao-Kuan Tso,et al.  Friendly Medical Image Sharing Scheme , 2014, J. Inf. Hiding Multim. Signal Process..

[5]  Harsh K. Verma,et al.  Ideal Contrast Secret Sharing Scheme through Meaningful Shares with Enveloping Digital Watermarking using Bit Plane based (k,n)-VCS , 2012 .

[6]  Xiaobo Li,et al.  Towards Shift Tolerant Visual Secret Sharing Schemes , 2010, IEEE Transactions on Information Forensics and Security.

[7]  Ching-Nung Yang,et al.  Essential secret image sharing scheme with different importance of shadows , 2013, J. Vis. Commun. Image Represent..

[8]  Ching-Nung Yang,et al.  New visual secret sharing schemes using probabilistic method , 2004, Pattern Recognit. Lett..

[9]  Mitsugu Iwamoto A Weak Security Notion for Visual Secret Sharing Schemes , 2012, IEEE Transactions on Information Forensics and Security.

[10]  Lei Zhu,et al.  An Image Morphing Technique Based on Optimal Mass Preserving Mapping , 2007, IEEE Transactions on Image Processing.

[11]  Chao-Hung Lin,et al.  Patch-Based Image Warping for Content-Aware Retargeting , 2013, IEEE Transactions on Multimedia.

[12]  Thaddeus Beier,et al.  Feature-based image metamorphosis , 1992, SIGGRAPH.

[13]  Eero P. Simoncelli,et al.  Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.

[14]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[15]  Wei Sun,et al.  Generalized Random Grid and Its Applications in Visual Cryptography , 2013, IEEE Transactions on Information Forensics and Security.

[16]  Pei-Ling Chiu,et al.  An Extended Visual Cryptography Algorithm for General Access Structures , 2012, IEEE Transactions on Information Forensics and Security.

[17]  Heung-Kyu Lee,et al.  Color extended visual cryptography using error diffusion , 2009, 2009 IEEE International Conference on Acoustics, Speech and Signal Processing.

[18]  Chin-Chen Chang,et al.  Distortion-free secret image sharing mechanism using modulus operator , 2009, Pattern Recognit..

[19]  Chien-Chang Chen,et al.  An Expandable Essential Secret Image Sharing Structure , 2016, J. Inf. Hiding Multim. Signal Process..

[20]  Chin-Chen Chang,et al.  Meaningful secret sharing technique with authentication and remedy abilities , 2011, Inf. Sci..

[21]  George Wolberg,et al.  Skeleton-based image warping , 2005, The Visual Computer.

[22]  Tzung-Her Chen,et al.  User-Friendly Random-Grid-Based Visual Secret Sharing , 2011, IEEE Transactions on Circuits and Systems for Video Technology.

[23]  Shyong Jian Shyu,et al.  Optimum Pixel Expansions for Threshold Visual Secret Sharing Schemes , 2011, IEEE Trans. Inf. Forensics Secur..

[24]  Wei Sun,et al.  Random grid-based visual secret sharing with abilities of OR and XOR decryptions , 2013, J. Vis. Commun. Image Represent..

[25]  Pei-Ling Chiu,et al.  Digital Image Sharing by Diverse Image Media , 2014, IEEE Transactions on Information Forensics and Security.

[26]  Ran-Zan Wang,et al.  Scalable Secret Image Sharing With Smaller Shadow Images , 2010, IEEE Signal Processing Letters.

[27]  Moni Naor,et al.  Visual Cryptography , 1994, Encyclopedia of Multimedia.