An improved threshold multi-level image recovery scheme

Abstract Nowadays, publishing photos over social network is very popular. In order to obtain more benefit, the new business model is design. For example, the photo should be browsed, or downloaded according to different level. Specifically, a single user only obtains the low quality image, but if he recommends more users to join in, more higher quality image can be obtained. In this paper, an improved (t, r, n)-hierarchical threshold multi-level image recovery scheme is proposed. When the number of collaborators is less than t, the browsed image's quality is gradually improved with the increasement of the number of collaborators. If the number of the collaborators reaches t, the complete image is obtained. Moreover, system analysis shows that the proposed scheme achieves the steganography and practicability.

[1]  Peng Li,et al.  Reducing shadow size in essential secret image sharing by conjunctive hierarchical approach , 2015, Signal Process. Image Commun..

[2]  Xuehu Yan,et al.  Threshold progressive visual cryptography construction with unexpanded shares , 2015, Multimedia Tools and Applications.

[3]  Peng Li,et al.  Essential secret image sharing scheme with the same size of shadows , 2016, Digit. Signal Process..

[4]  Her-Chang Chao,et al.  Random-grid based progressive visual secret sharing scheme with adaptive priority , 2017, Digit. Signal Process..

[5]  Qian Kong,et al.  Image Secret Sharing and Hiding with Authentication Based on PSNR Estimation , 2014, J. Inf. Hiding Multim. Signal Process..

[6]  Vasif V. Nabiyev,et al.  Secret image sharing scheme with adaptive authentication strength , 2013, Pattern Recognit. Lett..

[7]  Chin-Chen Chang,et al.  A hierarchical threshold secret image sharing , 2012, Pattern Recognit. Lett..

[8]  Chang-Chou Lin,et al.  Secret image sharing with steganography and authentication , 2004, J. Syst. Softw..

[9]  Chunming Tang,et al.  Privacy-preserving face recognition with outsourced computation , 2016, Soft Comput..

[10]  Ziba Eslami,et al.  Secret image sharing scheme with hierarchical threshold access structure , 2014, J. Vis. Commun. Image Represent..

[11]  Moni Naor,et al.  Visual Cryptography , 1994, Encyclopedia of Multimedia.

[12]  Ching-Nung Yang,et al.  Constructions and Properties of General ( k, n ) Block-Based Progressive Visual Cryptography , 2015 .

[13]  Chin-Chen Chang,et al.  Sharing secrets in stego images with authentication , 2008, Pattern Recognit..

[14]  Ziba Eslami,et al.  Secret image sharing with authentication-chaining and dynamic embedding , 2011, J. Syst. Softw..

[15]  Chin-Chen Chang,et al.  A novel image protection scheme using bit-plane compression and secret sharing , 2017 .

[16]  Kuang-Shyr Wu A secret image sharing scheme for light images , 2013, EURASIP J. Adv. Signal Process..

[17]  Ching-Nung Yang,et al.  Scalable secret image sharing scheme with essential shadows , 2017, Signal Process. Image Commun..

[18]  Tamir Tassa,et al.  Hierarchical Threshold Secret Sharing , 2004, Journal of Cryptology.

[19]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[20]  Xiaojing Wang,et al.  A New Approach to Image Sharing with High-Security Threshold Structure , 2014, JACM.

[21]  Shaohua Tang,et al.  A secure image sharing scheme with high quality stego-images based on steganography , 2017, Multimedia Tools and Applications.

[22]  Jung-San Lee,et al.  Selective scalable secret image sharing with verification , 2015, Multimedia Tools and Applications.

[23]  Ja-Chen Lin,et al.  Secret image sharing , 2002, Comput. Graph..

[24]  Ching-Nung Yang,et al.  Improvements of image sharing with steganography and authentication , 2007, J. Syst. Softw..

[25]  Chin-Chen Chang,et al.  Distortion-free secret image sharing mechanism using modulus operator , 2009, Pattern Recognit..

[26]  Chin-Chen Chang,et al.  A grouped-scalable secret image sharing scheme , 2014, Multimedia Tools and Applications.