A construction method of (t, k, n)-essential secret image sharing scheme

Abstract Secret image sharing (SIS) is a technique to decompose a secret image into multiple shadows distributed to the corresponding participants. Only qualified subsets of the shadows can reveal the secret image. Usually all shadows have the same importance. However, in some application scenario, some shadows are accorded with the special privilege due to the status or importance of the corresponding participants. A (t, k, n) essential secret image sharing (ESIS) scheme share a secret image into n shadows including t essential shadows and n–t non-essential shadows. A qualified subset of the shadows should contain at least k shadows including all t essential shadows. In this paper, we propose a construction method of (t, k, n) essential secret image sharing (ESIS) scheme. In our scheme, all shadows have the size 1/k times of the secret image. It also resolves the problems in the previous ESIS schemes, such as different shadow sizes, concatenation of sub-shadows, using multiple SIS schemes and so on. Theoretical analyses and experimental results show that the proposed scheme is secure and effective.

[1]  Chien-Chang Chen,et al.  Two-layered structure for optimally essential secret image sharing scheme , 2016, J. Vis. Commun. Image Represent..

[2]  Ziba Eslami,et al.  Secret image sharing scheme with hierarchical threshold access structure , 2014, J. Vis. Commun. Image Represent..

[3]  Shang-Kuan Chen,et al.  Essential secret image sharing with increasable shadows , 2016 .

[4]  Ching-Nung Yang,et al.  Constructions and properties of k out of n scalable secret image sharing , 2010 .

[5]  Ja-Chen Lin,et al.  Fast-weighted secret image sharing , 2009 .

[6]  Chin-Chen Chang,et al.  A scheme for threshold multi-secret sharing , 2005, Appl. Math. Comput..

[7]  Shyong Jian Shyu,et al.  Weighted Threshold Secret Image Sharing , 2009, PSIVT.

[8]  Chien-Chang Chen,et al.  Weighted modulated secret image sharing method , 2009, J. Electronic Imaging.

[9]  Ran-Zan Wang,et al.  Scalable secret image sharing , 2007, Signal Process. Image Commun..

[10]  Stelvio Cimato,et al.  Visual Cryptography and Secret Image Sharing , 2017 .

[11]  Ching-Nung Yang,et al.  A general (k, n) scalable secret image sharing scheme with the smooth scalability , 2011, J. Syst. Softw..

[12]  Vasif V. Nabiyev,et al.  Secret image sharing scheme with adaptive authentication strength , 2013, Pattern Recognit. Lett..

[13]  Chien-Chang Chen,et al.  An Expandable Essential Secret Image Sharing Structure , 2016, J. Inf. Hiding Multim. Signal Process..

[14]  Chien-Chang Chen,et al.  Tamper-proof secret image-sharing scheme for identifying cheated secret keys and shared images , 2013, J. Electronic Imaging.

[15]  Ran-Zan Wang,et al.  Secret image sharing with smaller shadow images , 2006, Pattern Recognit. Lett..

[16]  Ching-Nung Yang,et al.  Steganography and authentication in image sharing without parity bits , 2012 .

[17]  Ching-Nung Yang,et al.  Sharing more information in gray visual cryptography scheme , 2013, J. Vis. Commun. Image Represent..

[18]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[19]  Chien-Chang Chen,et al.  A new Boolean-based multiple secret image sharing scheme to share different sized secret images , 2017, J. Inf. Secur. Appl..

[20]  Chin-Chen Chang,et al.  A hierarchical threshold secret image sharing , 2012, Pattern Recognit. Lett..

[21]  Ching-Nung Yang,et al.  Essential secret image sharing scheme with different importance of shadows , 2013, J. Vis. Commun. Image Represent..

[22]  Mingchu Li,et al.  A multi-threshold secret image sharing scheme based on the generalized Chinese reminder theorem , 2015, Multimedia Tools and Applications.

[23]  Peng Li,et al.  A novel two-in-one image secret sharing scheme based on perfect black visual cryptography , 2016, Journal of Real-Time Image Processing.

[24]  Ja-Chen Lin,et al.  Secret image sharing , 2002, Comput. Graph..

[25]  Mingchu Li,et al.  (t, n) Threshold secret image sharing scheme with adversary structure , 2016, Multimedia Tools and Applications.

[26]  Ja-Chen Lin,et al.  VCPSS: A two-in-one two-decoding-options image sharing method combining visual cryptography (VC) and polynomial-style sharing (PSS) approaches , 2007, Pattern Recognit..

[27]  Ching-Nung Yang,et al.  Reducing shadow size in smooth scalable secret image sharing , 2014, Secur. Commun. Networks.

[28]  Chang-Chou Lin,et al.  Secret image sharing with steganography and authentication , 2004, J. Syst. Softw..

[29]  Peng Li,et al.  Reducing shadow size in essential secret image sharing by conjunctive hierarchical approach , 2015, Signal Process. Image Commun..

[30]  Peng Li,et al.  Essential secret image sharing scheme with the same size of shadows , 2016, Digit. Signal Process..