Abstract
Most secret image sharing (SIS) schemes output noise-like shadows and are fragile to any noise due to their restoring methods are based on mathematical operations. A noise-like shadow increases the suspicion of an attacker and the fragileness leads to the secret pixel is wrongly restored even if a bit error occurs. In this paper, we propose a construction-based SIS (CSIS) scheme for a (k, n)-threshold based on quick response (QR) code and the principle of polynomial-based SIS. In the proposed CSIS, each output shadow is a valid QR code, which is thus comprehensible and robust to typical noises. The secret image is losslessly restored by barcode scanning operation and Lagrange interpolation with any k or more shadows. The comprehensible shadow not only reduces the suspicion of an attacker but also improves the management efficiency of shadows. The robustness makes the proposed scheme applicable to noisy channel when transmitting shadows. We provide experiments to validate the proposed scheme.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Wang, W., Liu, F., Guo, T., Ren, Y.: Temporal integration based visual cryptography scheme and its application. In: Digital Forensics and Watermarking: 16th International Workshop, IWDW 2017, Magdeburg, Germany, 406–419 (August 23–25 2017)
Cheng, Y., Fu, Z., Yu, B.: Improved visual secret sharing scheme for qr code applications. IEEE Trans. Inf. Forensics Secur. 13(9), 2393–2403 (2018)
Jia, X., Wang, D., Nie, D., Luo, X., Sun, J.Z.: A new threshold changeable secret sharing scheme based on the chinese remainder theorem. Inf. Sci. 473, 13–30 (2019)
Fuyou, M., Yan, X., **ngfu, W., Badawy, M.: Randomized component and its application to (t, m, n)-group oriented secret sharing. IEEE Trans. Inf. Forensics Secur. 10(5), 889–899 (2015)
Li, Y., Guo, L.: Robust image fingerprinting via distortion-resistant sparse coding. IEEE Signal Process. Lett. 25(1), 140–144 (2018)
Chavan, P.V., Atique, M., Malik, L.: Signature based authentication using contrast enhanced hierarchical visual cryptography. In: Electrical, Electronics and Computer Science, 1–5 (2014)
Luo, H., Lu, Z.M., Pan, J.S.: Multiple watermarking in visual cryptography. In: International Workshop on Digital Watermarking, 60–70 (2007)
El-Latif, A.A.A., Abd-El-Atty, B., Hossain, M.S., Rahman, M.A., Alamri, A., Gupta, B.B.: Efficient quantum information hiding for remote medical image sharing. IEEE Access (2018)
Yan, X., Lu, Y., Liu, L., Wan, S., Ding, W., Liu, H.: Exploiting the homomorphic property of visual cryptography. Int. J. Digit. Crime Forensics (IJDCF) 9(2), 45–56 (2017)
Fukumitsu, M., Hasegawa, S., Iwazaki, J., Sakai, M., Takahashi, D.: A proposal of a secure p2p-type storage scheme by using the secret sharing and the blockchain. In: 2017 IEEE 31st International Conference on Advanced Information Networking and Applications (AINA), 803–810 (March 2017)
Zou, S., Liang, Y., Lai, L., Shamai, S.: An Information Theoretic Approach to Secret Sharing. Arxiv preprint (2014)
Komargodski, I., Naor, M., Yogev, E.: Secret-sharing for NP. J. Cryptol. 30(2), 444–469 (2017)
Stinson, D.R.: An explication of secret sharing schemes. Des. Codes Crypt. 2(4), 357–390 (1992)
Naor, M., Shamir, A.: Visual cryptography. In: Advances in Cryptology EUROCRYPT’94 Lecture Notes in Computer Science, Workshop on the Theory and Application of Cryptographic Techniques, May 9–12, Perugia, Italy, Springer, Springer (1995) 1–12
Wang, G., Liu, F., Yan, W.Q.: Basic visual cryptography using braille. Int. J. Digit. Crime Forensics 8(3), 85–93 (2016)
Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)
Weir, J., Yan, W.: A comprehensive study of visual cryptography. Trans. DHMS V, LNCS 6010. Springer, Berlin, 70–105 (2010)
Wang, Z., Arce, G.R., Di Crescenzo, G.: Halftone visual cryptography via error discussion. IEEE Trans. Inf. Forensics Secur. 4(3), 383–396 (2009)
Fu, Z.x., Yu, B.: Visual cryptography and random grids schemes. In: Digital Forensics and Watermarking. Springer, Auckland, New Zealand, 109–122 (2014)
Guo, T., Liu, F., Wu, C.: Threshold visual secret sharing by random grids with improved contrast. J. Syst. Softw. 86(8), 2094–2109 (2013)
Yan, X., Liu, X., Yang, C.N.: An enhanced threshold visual secret sharing based on random grids. J. Real-Time Image Proc. 14(1), 61–73 (2018)
Yan, X., Lu, Y.: Progressive visual secret sharing for general access structure with multiple decryptions. Multimed. Tools Appl. 77(2), 2653–2672 (2018)
Thien, C.C., Lin, J.C.: Secret image sharing. Comput. Graph. 26(5), 765–770 (2002)
Yang, C.N., Ciou, C.B.: Image secret sharing method with two-decoding-options: lossless recovery and previewing capability. Image Vis. Comput. 28(12), 1600–1610 (2010)
Li, P., Liu, Z., Yang, C.N.: A construction method of (t, k, n)-essential secret image sharing scheme. Sig. Process. Image Commun. 65, 210–220 (2018)
Liu, Y., Yang, C., Wang, Y., Zhu, L., Ji, W.: Cheating identifiable secret sharing scheme using symmetric bivariate polynomial. Inf. Sci. 453, 21–29 (2018)
Zhou, X., Lu, Y., Yan, X., Wang, Y., Liu, L.: Lossless and efficient polynomial-based secret image sharing with reduced shadow size. Symmetry 10(7) (2018)
Li, S., Zhang, X.: Toward construction-based data hiding: from secrets to fingerprint images. IEEE Trans. Image Process. 28(3), 1482–1497 (2019)
Denso, W.: qrcode. http://www.qrcode.com
Saito, K., Morii, M.: Efficient decoding of qr code using error correcting capability: decoding method using erasure error correction and the ability. Techn. Rep. IEICE ISEC 111, 79–84 (2011)
Wan, S., Lu, Y., Yan, X., Wang, Y., Chang, C.: Visual secret sharing scheme for (k, n) threshold based on qr code with multiple decryptions. J. Real-Time Image Process. 9, 1–16 (2017)
Acknowledgements
This work is supported by the National Natural Science Foundation of China (Grant Number: 61602491) and the Key Program of the National University of Defense Technology (Grant Number: ZK-17-02-07).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Yan, X., Yang, G., Qi, L., Liu, J., Lu, Y. (2021). Construction-Based Secret Image Sharing. In: Liu, Q., Liu, X., Li, L., Zhou, H., Zhao, HH. (eds) Proceedings of the 9th International Conference on Computer Engineering and Networks . Advances in Intelligent Systems and Computing, vol 1143. Springer, Singapore. https://doi.org/10.1007/978-981-15-3753-0_60
Download citation
DOI: https://doi.org/10.1007/978-981-15-3753-0_60
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-3752-3
Online ISBN: 978-981-15-3753-0
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)