Abstract
The two-in-one secret image sharing (TiOSIS) technique is a hybrid scheme that protects a secret image by combining visual cryptography (VCS) and polynomial-based secret image sharing (PSIS). There are two decoding methods available in TiOSIS: stacking-to-see decryption and lossless image recovery. However, the majority of current TiOSIS methods use Lagrange interpolation to precisely reconstruct the secret, which would result in intense computations. In this article, an efficient TiOSIS scheme using Boolean XOR operation for lossless image recovery is proposed. The proposed scheme consists of three building blocks: shared data generation, shadow construction, and image decryption. In shared data generation, the grayscale secret image is processed by a Boolean-based SIS to derive the shared bits. In shadow construction, an adaptive pixel grouping (APG) strategy is utilized to determine a grouping pattern. The halftone image adjustment algorithm is adopted to generate a suitable halftone image. With the grouping pattern and halftone image, we construct the shadows via the group-pixel embedding and sharing approach. In image decryption, we can reveal the secret image by stacking-to-see decoding or Boolean-based lossless image recovery. Extensive experiments and comparisons are illustrated to show the effectiveness and benefits of the proposed scheme.
- [1] . 1996. Visual cryptography for general access structures. Information and Computation 129, 2 (1996), 86–106. Google Scholar
Digital Library
- [2] . 2001. Improved schemes for visual cryptography. Designs, Codes and Cryptography 24, 3 (2001), 255–278.Google Scholar
Digital Library
- [3] . 2008. Sharing secrets in stego images with authentication. Pattern Recognition 41, 10 (2008), 3130–3137.Google Scholar
Digital Library
- [4] . 2002. Data hiding watermarking for halftone images. IEEE Transactions on Image Processing 11, 4 (2002), 477–484.Google Scholar
Digital Library
- [5] . 2018. Collaborative visual cryptography schemes. IEEE Transactions on Circuits and Systems for Video Technology 28, 5 (2018), 1056–1070.Google Scholar
Cross Ref
- [6] . 2018. Modern Digital Halftoning. CRC Press.Google Scholar
Cross Ref
- [7] . 2020. (t, k, n) XOR-based visual cryptography scheme with essential shadows. Journal of Visual Communication and Image Representation 72 (2020), 102911.Google Scholar
Cross Ref
- [8] . 2012. Improvements of a two-in-one image secret sharing scheme based on gray mixing model. Journal of Visual Communication and Image Representation 23, 3 (2012), 441–453.Google Scholar
Digital Library
- [9] . 2018. A novel two-in-one image secret sharing scheme based on perfect black visual cryptography. Journal of Real-Time Image Processing 14, 1 (2018), 41–50.Google Scholar
Cross Ref
- [10] . 2013. Sharing more information in gray visual cryptography scheme. Journal of Visual Communication and Image Representation 24, 8 (2013), 1380–1393.Google Scholar
Digital Library
- [11] . 2013. Essential secret image sharing scheme with different importance of shadows. Journal of Visual Communication and Image Representation 24, 7 (2013), 1106–1114.Google Scholar
Digital Library
- [12] . 2004. Secret image sharing with steganography and authentication. Journal of Systems and software 73, 3 (2004), 405–414.Google Scholar
Digital Library
- [13] . 2007. VCPSS: A two-in-one two-decoding-options image sharing method combining visual cryptography (VC) and polynomial-style sharing (PSS) approaches. Pattern Recognition 40, 12 (2007), 3652–3666.Google Scholar
Digital Library
- [14] . 2017. Scalable secret image sharing scheme with essential shadows. Signal Processing: Image Communication 58 (2017), 49–55.Google Scholar
Digital Library
- [15] . 2020. Thresholds based image extraction schemes in big data environment in intelligent traffic management. IEEE Transactions on Intelligent Transportation Systems 22, 7 (2020), 3952–3960.Google Scholar
Digital Library
- [16] . 2020. A novel (t, s, k, n)-Threshold visual secret sharing scheme based on access structure partition. ACM Transactions on Multimedia Computing, Communications, and Applications 16, 4 (2020), 1–21.Google Scholar
Digital Library
- [17] . 1995. Visual cryptography. Lecture Notes in Computer Science 950, 1 (1995), 1–12.Google Scholar
- [18] . 1979. How to share a secret. Communications of the ACM 22, 11 (1979), 612–613. Google Scholar
Digital Library
- [19] . 2011. Optimum pixel expansions for threshold visual secret sharing schemes. IEEE Transactions on Information Forensics and Security 6, 3 (2011), 960–969.Google Scholar
Digital Library
- [20] . 2015. Minimizing pixel expansion in visual cryptographic scheme for general access structures. IEEE Transactions on Circuits and Systems for Video Technology 25, 9 (2015), 1557–1561.Google Scholar
Digital Library
- [21] . 2002. Secret image sharing. Computers & Graphics 26, 5 (2002), 765–770.Google Scholar
Cross Ref
- [22] . 1993. Void-and-cluster method for dither array generation. In Proceedings of the Human Vision, Visual Processing, and Digital Display IV. International Society for Optics and Photonics, 332–343.Google Scholar
Cross Ref
- [23] . 2007. Scalable secret image sharing. Signal Processing: Image Communication 22, 4 (2007), 363–373.Google Scholar
Digital Library
- [24] . 2012. Visual secret sharing for general access structures by random grids. IET Information Security 6, 4 (2012), 299–309.Google Scholar
Cross Ref
- [25] . 2013. Improving the visual quality of random grid-based visual secret sharing. Signal Processing 93, 5 (2013), 977–995.Google Scholar
Digital Library
- [26] . 2019. A combination of color-black-and-white visual cryptography and polynomial based secret image sharing. Journal of Visual Communication and Image Representation 61 (2019), 74–84.Google Scholar
Digital Library
- [27] . 2019. Partial reversible AMBTC-based secret image sharing with steganography. Digital Signal Processing 93 (2019), 22–33.Google Scholar
Digital Library
- [28] . 2020. Sharing and hiding a secret image in color palette images with authentication. Multimedia Tools and Applications 79, 35 (2020), 25657–25677.Google Scholar
Digital Library
- [29] . 2021. Robust secret image sharing resistant to noise in shares. ACM Transactions on Multimedia Computing, Communications, and Applications 17, 1 (2021), 1–22.Google Scholar
Digital Library
- [30] . 2019. A general progressive secret image sharing construction method. Signal Processing: Image Communication 71 (2019), 66–75.Google Scholar
Cross Ref
- [31] . 2020. A common method of share authentication in image secret sharing. IEEE Transactions on Circuits and Systems for Video Technology 31, 7 (2020), 2896–2908.Google Scholar
Cross Ref
- [32] . 2004. New visual secret sharing schemes using probabilistic method. Pattern Recognition Letters 25, 4 (2004), 486–494. Google Scholar
Digital Library
- [33] . 2007. Improvements of image sharing with steganography and authentication. Journal of Systems and Software 80, 7 (2007), 1070–1076. Google Scholar
Digital Library
- [34] . 2016. Enhanced boolean-based multi secret image sharing scheme. Journal of Systems and Software 116 (2016), 22–34.Google Scholar
Digital Library
- [35] . 2010. Image secret sharing method with two-decoding-options: Lossless recovery and previewing capability. Image and Vision Computing 28, 12 (2010), 1600–1610.Google Scholar
Digital Library
- [36] . 2010. Constructions and properties of k out of n scalable secret image sharing. Optics Communications 283, 9 (2010), 1750–1762.Google Scholar
Cross Ref
- [37] . 2012. Steganography and authentication in image sharing without parity bits. Optics Communications 285, 7 (2012), 1725–1735.Google Scholar
Cross Ref
- [38] . 2020. On the analysis and design of visual cryptography with error correcting capability. IEEE Transactions on Circuits and Systems for Video Technology 31, 6 (2020), 2465–2479.Google Scholar
- [39] . 2016. An adaptive secret image sharing with a new bitwise steganographic property. Information Sciences 369 (2016), 467–480.Google Scholar
Digital Library
Index Terms
Boolean-based Two-in-One Secret Image Sharing by Adaptive Pixel Grouping
Recommendations
Enhanced Boolean-based multi secret image sharing scheme
Recently, Chen and Wu propose a (n, n) multi secret image sharing (MSIS) scheme that shares n secret images into n shared images. These n shared images can be together used for reconstructing n secret images by Boolean operations. However, there is an ...
Efficient multi-secret image sharing based on Boolean operations
(n,n) visual secret sharing (VSS), first proposed by Naor and Shamir (1995) [4], is used to encode (encrypt) a secret image into n meaningless share images to be superimposed later to decode (decrypt) the original secret by human visual system after ...
A new Boolean-based multiple secret image sharing scheme to share different sized secret images
The proposed Boolean-based multiple secret image sharing technique can share many secret images among participants using low computational Boolean operations. Previous studies dealt with sharing identically sized secret images; however, secret images ...






Comments