Progressive Reconstruction on Region-Based Secret Image Sharing
Abstract
:1. Introduction
2. Related Works
2.1. Definition of PSIS
- At less than k shadows, no information about the image is reconstructed.
- k to n shadows can gradually decode the image. Let the symbol be the proportion of recovered information to the entire image using t shadows; we then have .
2.2. Previous Results on PSIS
3. Proposed Scheme
3.1. Motivation
- The secret image O is segmented into multiple regions .
- Each region is encoded into n sub-shadows using threshold approaches, where m is chosen from the set according to the importance level of the corresponding region.
- The shadow is a combination of all l sub-shadows that come from different l regions.
- Previous PSIS schemes applied the same progressive reconstruction strategy on the entire secret image.
- Our PSIS scheme first segments a secret image into different regions, where each region contains information with different importance levels, and then different progressive reconstruction strategies are applied to different regions.
3.2. Proposed PSIS Scheme
Algorithm 1 n shadow pixels for one pixel |
Input: one pixel p; output: n shadow-pixels .
|
- 1
- The image O is segmented into multiple regions with different importance levels. We use the symbol to denote the importance level of ; without loss of generality, let .
- 2
- Generate k-dimensional vectors that satisfy .
- 3
- For each region , which consists of pixels ,
- (1)
- Generate a group of n shadow pixels for each pixel using Algorithm 1. All these groups of n shadow pixels use the same k-dimensional vector .
- (2)
- The n sub-shadows for region are .
- 4
- The n shadows for image O are .
- 1
- Suppose that the m shadows are . Each shadow is a combination of l sub-shadows on all l regions, . Reconstruct the partial image using the equation .
- 2
- The reconstructed partial image is .
4. Experimental Results and Comparisons
5. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
Abbreviations
PSIS | Progressive secret image sharing; |
SIS | Secret image sharing; |
GEMD | Generalized exploiting modification directions. |
References
- Yang, C.N.; Chung, T.H. A general multi-secret visual cryptography schemes. Opt. Commun. 2010, 283, 4949–4962. [Google Scholar] [CrossRef]
- Shyu, S.J.; Jiang, H.W. General constructions for threshold multiple-secret visual cryptography schemes. IEEE Trans. Inf. Forensics Secur. 2013, 8, 733–743. [Google Scholar] [CrossRef]
- Hou, Y.C.; Quan, Z.Y.; Tsai, C.F.; Tseng, A.Y. Block-based progressive visual secret sharing. Inf. Sci. 2013, 233, 290–304. [Google Scholar] [CrossRef]
- Jia, X.X.; Wang, D.S.; Nie, D.X.; Zhang, C.Y. Collaborative visual cryptography schemes. IEEE Trans. Circuits Syst. Video 2018, 28, 1056–1070. [Google Scholar] [CrossRef]
- Wu, X.T.; Feng, X.J. Size invariant visual cryptography schemes with evolving threshold access structures. IEEE Trans. Multimed. 2024, 26, 1488–1503. [Google Scholar] [CrossRef]
- Thien, C.C.; Lin, J.C. Secret image sharing. Comput. Graph. 2002, 26, 765–770. [Google Scholar] [CrossRef]
- Lin, C.C.; Tsai, W.H. Secret image sharing with steganography and authentication. J. Syst. Softw. 2004, 73, 405–414. [Google Scholar] [CrossRef]
- Yang, C.N.; Ouyang, J.F.; Harn, L. Steganography and authentication in image sharing without party bits. Opt. Commun. 2012, 285, 1725–1735. [Google Scholar] [CrossRef]
- Wang, R.Z.; Su, C.H. Secret image sharing with smaller shadow images. Pattern Recognit. Lett. 2006, 27, 551–555. [Google Scholar] [CrossRef]
- Liu, Y.X.; Yang, C.N.; Sun, Q.D. Thresholds based image extraction schemes in big data environment in intelligent traffic management. IEEE Trans. Intell. Transp. Syst. 2021, 22, 3952–3960. [Google Scholar] [CrossRef]
- Wu, W.; Peng, H.P.; Tong, F.H.; Li, L.X. A chaotic compressed sensing-based multigroup secret image sharing method for IoT with critical information concealment function. IEEE Internet Things J. 2023, 10, 1192–1270. [Google Scholar] [CrossRef]
- Xiong, L.Z.; Han, X.; Zhong, X.W.; Yang, C.N.; Xiong, N. RSIS: A secure and reliable secret image sharing system based on extended hamming codes in industrial internet of things. IEEE Internet Things J. 2023, 10, 1933–1945. [Google Scholar] [CrossRef]
- Wang, R.Z. Region incrementing visual cryptography. IEEE Signal Process. Lett. 2009, 16, 659–662. [Google Scholar] [CrossRef]
- Yang, C.N.; Shih, H.W.; Harn, L. k out of n region incrementing scheme in visual cryptography. IEEE Trans. Circuits Syst. Video Technol. 2012, 22, 799–810. [Google Scholar] [CrossRef]
- Yang, C.N.; Huang, S.M. Constructions and properties of k out of n scalable secret image sharing. Opt. Commun. 2010, 283, 1750–1762. [Google Scholar] [CrossRef]
- Yang, C.N.; Chu, Y.Y. A general (k,n) scalable secret image sharing scheme with the smooth scalability. J. Syst. Softw. 2011, 84, 1726–1733. [Google Scholar] [CrossRef]
- Liu, Y.X.; Yang, C.N. Reducing shadow size in smooth scalable secret image sharing. Secur. Commun. Netw. 2014, 7, 2237–2244. [Google Scholar] [CrossRef]
- Hou, Y.C.; Quan, Z.Y. Progressive visual cryptography with unexpanded shares. IEEE Trans. Circuits Syst. Video Technol. 2011, 21, 1760–1764. [Google Scholar] [CrossRef]
- Liu, Y.X.; Yang, C.N.; Wu, S.Y.; Chou, Y.S. Progressive (k,n) secret image sharing schemes based on Boolean operations and covering codes. Signal Process. Image Commun. 2018, 66, 77–86. [Google Scholar] [CrossRef]
- Liu, Y.X.; Yang, C.N.; Wu, S.Y.; Chou, Y.S.; Sun, Q.D. Progressive (k,n) secret image sharing scheme with meaningful shadow images by GEMD and RGEMD. J. Vis. Commun. Image Represent. 2018, 55, 766–777. [Google Scholar] [CrossRef]
Number of Shadows | Previous PSIS | Proposed PSIS | ||
---|---|---|---|---|
Region 1 | Region 2 | Region 3 | ||
3 | ||||
4 | ||||
5 | ||||
6 |
Number of Shadows | Previous PSIS | Proposed PSIS | |||
---|---|---|---|---|---|
Region 1 | Region 2 | Region 3 | Region 4 | ||
4 | |||||
5 | |||||
6 | |||||
7 | |||||
8 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Liu, Y.; Sun, Q.; Yang, Z.; Zhou, Y.; Zhao, W.; Shi, D. Progressive Reconstruction on Region-Based Secret Image Sharing. Electronics 2024, 13, 1529. https://doi.org/10.3390/electronics13081529
Liu Y, Sun Q, Yang Z, Zhou Y, Zhao W, Shi D. Progressive Reconstruction on Region-Based Secret Image Sharing. Electronics. 2024; 13(8):1529. https://doi.org/10.3390/electronics13081529
Chicago/Turabian StyleLiu, Yanxiao, Qindong Sun, Zhihai Yang, Yongluan Zhou, Weihua Zhao, and Dantong Shi. 2024. "Progressive Reconstruction on Region-Based Secret Image Sharing" Electronics 13, no. 8: 1529. https://doi.org/10.3390/electronics13081529
APA StyleLiu, Y., Sun, Q., Yang, Z., Zhou, Y., Zhao, W., & Shi, D. (2024). Progressive Reconstruction on Region-Based Secret Image Sharing. Electronics, 13(8), 1529. https://doi.org/10.3390/electronics13081529