A Secret Image Sharing Scheme Based on Vector Quantization Mechanism

In this paper, we proposed an image sharing method adopting (t, n) threshold scheme. The secret image goes through Vector Quantization (VQ) scheme and permutes the locations of indices to obtain permuted indexed secret image. We select t indices to form a (t-1)-degree polynomial by taking t indices as its coefficients. Then, the values of blocks' indices in cover image are fed into the (t-1)-degree polynomial to get the output values. After embedding the output values back to the pixels in block, we can obtain meaningful shadow images. Any t out of n shadow images can reconstruct the permuted indexed secret image. By inversing permutation and decoding VQ indices, we can finally reconstruct the secret image. Experimental results show that our method can get high image quality for the resultant shadow images and reconstruct secret images as well.

[1]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[2]  Robert M. Gray,et al.  An Algorithm for Vector Quantizer Design , 1980, IEEE Trans. Commun..

[3]  Amos Beimel,et al.  Secret Sharing with Public Reconstruction , 1998, IEEE Trans. Inf. Theory.

[4]  Chin-Chen Chang,et al.  Recent Development of Visual Cryptography , 2004 .

[5]  Ehud D. Karnin,et al.  On secret sharing systems , 1983, IEEE Trans. Inf. Theory.

[6]  Douglas R. Stinson,et al.  Decomposition constructions for secret-sharing schemes , 1994, IEEE Trans. Inf. Theory.

[7]  Chin-Chen Chang,et al.  An image intellectual property protection scheme for gray-level images using visual secret sharing strategy , 2002, Pattern Recognit. Lett..

[8]  G. R. Blakley,et al.  Safeguarding cryptographic keys , 1899, 1979 International Workshop on Managing Requirements Knowledge (MARK).

[9]  R. Gray,et al.  Vector quantization , 1984, IEEE ASSP Magazine.

[10]  Amos Beimel,et al.  Universally ideal secret-sharing schemes , 1994, IEEE Trans. Inf. Theory.

[11]  Chin-Chen Chang,et al.  A scheme for threshold multi-secret sharing , 2005, Appl. Math. Comput..

[12]  Ernest F. Brickell,et al.  On the classification of ideal secret sharing schemes , 1989, Journal of Cryptology.

[13]  Ja-Chen Lin,et al.  Secret image sharing , 2002, Comput. Graph..