skip to main content
research-article

Boolean-based Two-in-One Secret Image Sharing by Adaptive Pixel Grouping

Authors Info & Claims
Published:05 January 2023Publication History
Skip Abstract Section

Abstract

The two-in-one secret image sharing (TiOSIS) technique is a hybrid scheme that protects a secret image by combining visual cryptography (VCS) and polynomial-based secret image sharing (PSIS). There are two decoding methods available in TiOSIS: stacking-to-see decryption and lossless image recovery. However, the majority of current TiOSIS methods use Lagrange interpolation to precisely reconstruct the secret, which would result in intense computations. In this article, an efficient TiOSIS scheme using Boolean XOR operation for lossless image recovery is proposed. The proposed scheme consists of three building blocks: shared data generation, shadow construction, and image decryption. In shared data generation, the grayscale secret image is processed by a Boolean-based SIS to derive the shared bits. In shadow construction, an adaptive pixel grouping (APG) strategy is utilized to determine a grouping pattern. The halftone image adjustment algorithm is adopted to generate a suitable halftone image. With the grouping pattern and halftone image, we construct the shadows via the group-pixel embedding and sharing approach. In image decryption, we can reveal the secret image by stacking-to-see decoding or Boolean-based lossless image recovery. Extensive experiments and comparisons are illustrated to show the effectiveness and benefits of the proposed scheme.

REFERENCES

  1. [1] Ateniese G., Blundo C., Santis A. De, and Stinson D. R.. 1996. Visual cryptography for general access structures. Information and Computation 129, 2 (1996), 86106. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. [2] Blundo Carlo, Bonis Annalisa De, and Santis Alfredo De. 2001. Improved schemes for visual cryptography. Designs, Codes and Cryptography 24, 3 (2001), 255278.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. [3] Chang Chin-Chen, Hsieh Yi-Pei, and Lin Chia-Hsuan. 2008. Sharing secrets in stego images with authentication. Pattern Recognition 41, 10 (2008), 31303137.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. [4] Fu Ming Sun and Au Oscar C.. 2002. Data hiding watermarking for halftone images. IEEE Transactions on Image Processing 11, 4 (2002), 477484.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. [5] Jia Xingxing, Wang Daoshun, Nie Daxin, and Zhang Chaoyang. 2018. Collaborative visual cryptography schemes. IEEE Transactions on Circuits and Systems for Video Technology 28, 5 (2018), 10561070.Google ScholarGoogle ScholarCross RefCross Ref
  6. [6] Lau Daniel L. and Arce Gonzalo R.. 2018. Modern Digital Halftoning. CRC Press.Google ScholarGoogle ScholarCross RefCross Ref
  7. [7] Li Peng, Ma Jianfeng, and Ma Quan. 2020. (t, k, n) XOR-based visual cryptography scheme with essential shadows. Journal of Visual Communication and Image Representation 72 (2020), 102911.Google ScholarGoogle ScholarCross RefCross Ref
  8. [8] Li Peng, Ma Pei-Jun, Su Xiao-Hong, and Yang Ching-Nung. 2012. Improvements of a two-in-one image secret sharing scheme based on gray mixing model. Journal of Visual Communication and Image Representation 23, 3 (2012), 441453.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. [9] Li Peng, Yang Ching-Nung, and Kong Qian. 2018. A novel two-in-one image secret sharing scheme based on perfect black visual cryptography. Journal of Real-Time Image Processing 14, 1 (2018), 4150.Google ScholarGoogle ScholarCross RefCross Ref
  10. [10] Li Peng, Yang Ching-Nung, Kong Qian, Ma Yanpeng, and Liu Zheng. 2013. Sharing more information in gray visual cryptography scheme. Journal of Visual Communication and Image Representation 24, 8 (2013), 13801393.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. [11] Li Peng, Yang Ching-Nung, Wu Chih-Cheng, Kong Qian, and Ma Yanpeng. 2013. Essential secret image sharing scheme with different importance of shadows. Journal of Visual Communication and Image Representation 24, 7 (2013), 11061114.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. [12] Lin Chang-Chou and Tsai Wen-Hsiang. 2004. Secret image sharing with steganography and authentication. Journal of Systems and software 73, 3 (2004), 405414.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. [13] Lin Sian-Jheng and Lin Ja-Chen. 2007. VCPSS: A two-in-one two-decoding-options image sharing method combining visual cryptography (VC) and polynomial-style sharing (PSS) approaches. Pattern Recognition 40, 12 (2007), 36523666.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. [14] Liu Yanxiao and Yang Chingnung. 2017. Scalable secret image sharing scheme with essential shadows. Signal Processing: Image Communication 58 (2017), 4955.Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. [15] Liu Yanxiao, Yang Chingnung, and Sun Qindong. 2020. Thresholds based image extraction schemes in big data environment in intelligent traffic management. IEEE Transactions on Intelligent Transportation Systems 22, 7 (2020), 3952–3960.Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. [16] Liu Zuquan, Zhu Guopu, Wang Yuan-Gen, Yang Jianquan, and Kwong Sam. 2020. A novel (t, s, k, n)-Threshold visual secret sharing scheme based on access structure partition. ACM Transactions on Multimedia Computing, Communications, and Applications 16, 4 (2020), 121.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. [17] Naor M. and Shamir A.. 1995. Visual cryptography. Lecture Notes in Computer Science 950, 1 (1995), 112.Google ScholarGoogle Scholar
  18. [18] Shamir A.. 1979. How to share a secret. Communications of the ACM 22, 11 (1979), 612613. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. [19] Shyu Shyong Jian and Chen Ming Chiang. 2011. Optimum pixel expansions for threshold visual secret sharing schemes. IEEE Transactions on Information Forensics and Security 6, 3 (2011), 960969.Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. [20] Shyu Shyong Jian and Chen Ming Chiang. 2015. Minimizing pixel expansion in visual cryptographic scheme for general access structures. IEEE Transactions on Circuits and Systems for Video Technology 25, 9 (2015), 15571561.Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. [21] Thien Chih-Ching and Lin Ja-Chen. 2002. Secret image sharing. Computers & Graphics 26, 5 (2002), 765770.Google ScholarGoogle ScholarCross RefCross Ref
  22. [22] Ulichney Robert A.. 1993. Void-and-cluster method for dither array generation. In Proceedings of the Human Vision, Visual Processing, and Digital Display IV. International Society for Optics and Photonics, 332343.Google ScholarGoogle ScholarCross RefCross Ref
  23. [23] Wang Ran-Zan and Shyu Shyong-Jian. 2007. Scalable secret image sharing. Signal Processing: Image Communication 22, 4 (2007), 363373.Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. [24] Wu X. and Sun W.. 2012. Visual secret sharing for general access structures by random grids. IET Information Security 6, 4 (2012), 299309.Google ScholarGoogle ScholarCross RefCross Ref
  25. [25] Wu X. and Sun W.. 2013. Improving the visual quality of random grid-based visual secret sharing. Signal Processing 93, 5 (2013), 977995.Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. [26] Wu Xiaotian and Yang Ching-Nung. 2019. A combination of color-black-and-white visual cryptography and polynomial based secret image sharing. Journal of Visual Communication and Image Representation 61 (2019), 7484.Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. [27] Wu Xiaotian and Yang Ching-Nung. 2019. Partial reversible AMBTC-based secret image sharing with steganography. Digital Signal Processing 93 (2019), 2233.Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. [28] Wu Xiaotian, Yang Ching-Nung, and Yang Yi-Yun. 2020. Sharing and hiding a secret image in color palette images with authentication. Multimedia Tools and Applications 79, 35 (2020), 2565725677.Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. [29] Yan Xuehu, Liu Lintao, Li Longlong, and Lu Yuliang. 2021. Robust secret image sharing resistant to noise in shares. ACM Transactions on Multimedia Computing, Communications, and Applications 17, 1 (2021), 122.Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. [30] Yan Xuehu, Lu Yuliang, and Liu Lintao. 2019. A general progressive secret image sharing construction method. Signal Processing: Image Communication 71 (2019), 6675.Google ScholarGoogle ScholarCross RefCross Ref
  31. [31] Yan Xuehu, Lu Yuliang, Yang Ching-nung, Zhang Xinpeng, and Wang Shudong. 2020. A common method of share authentication in image secret sharing. IEEE Transactions on Circuits and Systems for Video Technology 31, 7 (2020), 28962908.Google ScholarGoogle ScholarCross RefCross Ref
  32. [32] Yang C. N.. 2004. New visual secret sharing schemes using probabilistic method. Pattern Recognition Letters 25, 4 (2004), 486494. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. [33] Yang C. N., Chen T. S., Yu K. H., and Wang C. C.. 2007. Improvements of image sharing with steganography and authentication. Journal of Systems and Software 80, 7 (2007), 10701076. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. [34] Yang Ching-Nung, Chen Cheng-Hua, and Cai Song-Ruei. 2016. Enhanced boolean-based multi secret image sharing scheme. Journal of Systems and Software 116 (2016), 2234.Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. [35] Yang Ching-Nung and Ciou Chuei-Bang. 2010. Image secret sharing method with two-decoding-options: Lossless recovery and previewing capability. Image and Vision Computing 28, 12 (2010), 16001610.Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. [36] Yang Ching-Nung and Huang Sin-Ming. 2010. Constructions and properties of k out of n scalable secret image sharing. Optics Communications 283, 9 (2010), 17501762.Google ScholarGoogle ScholarCross RefCross Ref
  37. [37] Yang Ching-Nung, Ouyang Jin-Fwu, and Harn Lein. 2012. Steganography and authentication in image sharing without parity bits. Optics Communications 285, 7 (2012), 17251735.Google ScholarGoogle ScholarCross RefCross Ref
  38. [38] Yang Ching-Nung and Yang Yi-Yun. 2020. On the analysis and design of visual cryptography with error correcting capability. IEEE Transactions on Circuits and Systems for Video Technology 31, 6 (2020), 2465–2479.Google ScholarGoogle Scholar
  39. [39] Zarepour-Ahmadabadi Jamal, Ahmadabadi MohammadEbrahim Shiri, and Latif AliMohammad. 2016. An adaptive secret image sharing with a new bitwise steganographic property. Information Sciences 369 (2016), 467480.Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Boolean-based Two-in-One Secret Image Sharing by Adaptive Pixel Grouping

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image ACM Transactions on Multimedia Computing, Communications, and Applications
        ACM Transactions on Multimedia Computing, Communications, and Applications  Volume 19, Issue 1
        January 2023
        505 pages
        ISSN:1551-6857
        EISSN:1551-6865
        DOI:10.1145/3572858
        • Editor:
        • Abdulmotaleb El Saddik
        Issue’s Table of Contents

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 5 January 2023
        • Online AM: 18 February 2022
        • Accepted: 5 February 2022
        • Revised: 5 November 2021
        • Received: 29 April 2021
        Published in tomm Volume 19, Issue 1

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Refereed
      • Article Metrics

        • Downloads (Last 12 months)114
        • Downloads (Last 6 weeks)5

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Full Text

      View this article in Full Text.

      View Full Text

      HTML Format

      View this article in HTML Format .

      View HTML Format
      About Cookies On This Site

      We use cookies to ensure that we give you the best experience on our website.

      Learn more

      Got it!