Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1143))

  • 1152 Accesses

Abstract

Most secret image sharing (SIS) schemes output noise-like shadows and are fragile to any noise due to their restoring methods are based on mathematical operations. A noise-like shadow increases the suspicion of an attacker and the fragileness leads to the secret pixel is wrongly restored even if a bit error occurs. In this paper, we propose a construction-based SIS (CSIS) scheme for a (k, n)-threshold based on quick response (QR) code and the principle of polynomial-based SIS. In the proposed CSIS, each output shadow is a valid QR code, which is thus comprehensible and robust to typical noises. The secret image is losslessly restored by barcode scanning operation and Lagrange interpolation with any k or more shadows. The comprehensible shadow not only reduces the suspicion of an attacker but also improves the management efficiency of shadows. The robustness makes the proposed scheme applicable to noisy channel when transmitting shadows. We provide experiments to validate the proposed scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
EUR 29.95
Price includes VAT (Germany)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
EUR 245.03
Price includes VAT (Germany)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
EUR 320.99
Price includes VAT (Germany)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info
Hardcover Book
EUR 320.99
Price includes VAT (Germany)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Wang, W., Liu, F., Guo, T., Ren, Y.: Temporal integration based visual cryptography scheme and its application. In: Digital Forensics and Watermarking: 16th International Workshop, IWDW 2017, Magdeburg, Germany, 406–419 (August 23–25 2017)

    Google Scholar 

  2. Cheng, Y., Fu, Z., Yu, B.: Improved visual secret sharing scheme for qr code applications. IEEE Trans. Inf. Forensics Secur. 13(9), 2393–2403 (2018)

    Article  Google Scholar 

  3. Jia, X., Wang, D., Nie, D., Luo, X., Sun, J.Z.: A new threshold changeable secret sharing scheme based on the chinese remainder theorem. Inf. Sci. 473, 13–30 (2019)

    Article  MathSciNet  Google Scholar 

  4. Fuyou, M., Yan, X., **ngfu, W., Badawy, M.: Randomized component and its application to (t, m, n)-group oriented secret sharing. IEEE Trans. Inf. Forensics Secur. 10(5), 889–899 (2015)

    Article  Google Scholar 

  5. Li, Y., Guo, L.: Robust image fingerprinting via distortion-resistant sparse coding. IEEE Signal Process. Lett. 25(1), 140–144 (2018)

    Article  Google Scholar 

  6. Chavan, P.V., Atique, M., Malik, L.: Signature based authentication using contrast enhanced hierarchical visual cryptography. In: Electrical, Electronics and Computer Science, 1–5 (2014)

    Google Scholar 

  7. Luo, H., Lu, Z.M., Pan, J.S.: Multiple watermarking in visual cryptography. In: International Workshop on Digital Watermarking, 60–70 (2007)

    Google Scholar 

  8. El-Latif, A.A.A., Abd-El-Atty, B., Hossain, M.S., Rahman, M.A., Alamri, A., Gupta, B.B.: Efficient quantum information hiding for remote medical image sharing. IEEE Access (2018)

    Google Scholar 

  9. Yan, X., Lu, Y., Liu, L., Wan, S., Ding, W., Liu, H.: Exploiting the homomorphic property of visual cryptography. Int. J. Digit. Crime Forensics (IJDCF) 9(2), 45–56 (2017)

    Article  Google Scholar 

  10. Fukumitsu, M., Hasegawa, S., Iwazaki, J., Sakai, M., Takahashi, D.: A proposal of a secure p2p-type storage scheme by using the secret sharing and the blockchain. In: 2017 IEEE 31st International Conference on Advanced Information Networking and Applications (AINA), 803–810 (March 2017)

    Google Scholar 

  11. Zou, S., Liang, Y., Lai, L., Shamai, S.: An Information Theoretic Approach to Secret Sharing. Arxiv preprint (2014)

    Google Scholar 

  12. Komargodski, I., Naor, M., Yogev, E.: Secret-sharing for NP. J. Cryptol. 30(2), 444–469 (2017)

    Article  MathSciNet  Google Scholar 

  13. Stinson, D.R.: An explication of secret sharing schemes. Des. Codes Crypt. 2(4), 357–390 (1992)

    Article  MathSciNet  Google Scholar 

  14. Naor, M., Shamir, A.: Visual cryptography. In: Advances in Cryptology EUROCRYPT’94 Lecture Notes in Computer Science, Workshop on the Theory and Application of Cryptographic Techniques, May 9–12, Perugia, Italy, Springer, Springer (1995) 1–12

    Google Scholar 

  15. Wang, G., Liu, F., Yan, W.Q.: Basic visual cryptography using braille. Int. J. Digit. Crime Forensics 8(3), 85–93 (2016)

    Article  Google Scholar 

  16. Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)

    Article  MathSciNet  Google Scholar 

  17. Weir, J., Yan, W.: A comprehensive study of visual cryptography. Trans. DHMS V, LNCS 6010. Springer, Berlin, 70–105 (2010)

    Google Scholar 

  18. Wang, Z., Arce, G.R., Di Crescenzo, G.: Halftone visual cryptography via error discussion. IEEE Trans. Inf. Forensics Secur. 4(3), 383–396 (2009)

    Article  Google Scholar 

  19. Fu, Z.x., Yu, B.: Visual cryptography and random grids schemes. In: Digital Forensics and Watermarking. Springer, Auckland, New Zealand, 109–122 (2014)

    Google Scholar 

  20. Guo, T., Liu, F., Wu, C.: Threshold visual secret sharing by random grids with improved contrast. J. Syst. Softw. 86(8), 2094–2109 (2013)

    Article  Google Scholar 

  21. Yan, X., Liu, X., Yang, C.N.: An enhanced threshold visual secret sharing based on random grids. J. Real-Time Image Proc. 14(1), 61–73 (2018)

    Article  Google Scholar 

  22. Yan, X., Lu, Y.: Progressive visual secret sharing for general access structure with multiple decryptions. Multimed. Tools Appl. 77(2), 2653–2672 (2018)

    Article  Google Scholar 

  23. Thien, C.C., Lin, J.C.: Secret image sharing. Comput. Graph. 26(5), 765–770 (2002)

    Article  Google Scholar 

  24. Yang, C.N., Ciou, C.B.: Image secret sharing method with two-decoding-options: lossless recovery and previewing capability. Image Vis. Comput. 28(12), 1600–1610 (2010)

    Article  Google Scholar 

  25. Li, P., Liu, Z., Yang, C.N.: A construction method of (t, k, n)-essential secret image sharing scheme. Sig. Process. Image Commun. 65, 210–220 (2018)

    Article  Google Scholar 

  26. Liu, Y., Yang, C., Wang, Y., Zhu, L., Ji, W.: Cheating identifiable secret sharing scheme using symmetric bivariate polynomial. Inf. Sci. 453, 21–29 (2018)

    Article  MathSciNet  Google Scholar 

  27. Zhou, X., Lu, Y., Yan, X., Wang, Y., Liu, L.: Lossless and efficient polynomial-based secret image sharing with reduced shadow size. Symmetry 10(7) (2018)

    Google Scholar 

  28. Li, S., Zhang, X.: Toward construction-based data hiding: from secrets to fingerprint images. IEEE Trans. Image Process. 28(3), 1482–1497 (2019)

    Article  MathSciNet  Google Scholar 

  29. Denso, W.: qrcode. http://www.qrcode.com

  30. Saito, K., Morii, M.: Efficient decoding of qr code using error correcting capability: decoding method using erasure error correction and the ability. Techn. Rep. IEICE ISEC 111, 79–84 (2011)

    Google Scholar 

  31. Wan, S., Lu, Y., Yan, X., Wang, Y., Chang, C.: Visual secret sharing scheme for (k, n) threshold based on qr code with multiple decryptions. J. Real-Time Image Process. 9, 1–16 (2017)

    Google Scholar 

Download references

Acknowledgements

This work is supported by the National Natural Science Foundation of China (Grant Number: 61602491) and the Key Program of the National University of Defense Technology (Grant Number: ZK-17-02-07).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xuehu Yan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Yan, X., Yang, G., Qi, L., Liu, J., Lu, Y. (2021). Construction-Based Secret Image Sharing. In: Liu, Q., Liu, X., Li, L., Zhou, H., Zhao, HH. (eds) Proceedings of the 9th International Conference on Computer Engineering and Networks . Advances in Intelligent Systems and Computing, vol 1143. Springer, Singapore. https://doi.org/10.1007/978-981-15-3753-0_60

Download citation

Publish with us

Policies and ethics

Navigation