skip to main content
research-article

Boolean-based Two-in-One Secret Image Sharing by Adaptive Pixel Grouping

Published: 05 January 2023 Publication History

Abstract

The two-in-one secret image sharing (TiOSIS) technique is a hybrid scheme that protects a secret image by combining visual cryptography (VCS) and polynomial-based secret image sharing (PSIS). There are two decoding methods available in TiOSIS: stacking-to-see decryption and lossless image recovery. However, the majority of current TiOSIS methods use Lagrange interpolation to precisely reconstruct the secret, which would result in intense computations. In this article, an efficient TiOSIS scheme using Boolean XOR operation for lossless image recovery is proposed. The proposed scheme consists of three building blocks: shared data generation, shadow construction, and image decryption. In shared data generation, the grayscale secret image is processed by a Boolean-based SIS to derive the shared bits. In shadow construction, an adaptive pixel grouping (APG) strategy is utilized to determine a grouping pattern. The halftone image adjustment algorithm is adopted to generate a suitable halftone image. With the grouping pattern and halftone image, we construct the shadows via the group-pixel embedding and sharing approach. In image decryption, we can reveal the secret image by stacking-to-see decoding or Boolean-based lossless image recovery. Extensive experiments and comparisons are illustrated to show the effectiveness and benefits of the proposed scheme.

References

[1]
G. Ateniese, C. Blundo, A. De Santis, and D. R. Stinson. 1996. Visual cryptography for general access structures. Information and Computation 129, 2 (1996), 86–106.
[2]
Carlo Blundo, Annalisa De Bonis, and Alfredo De Santis. 2001. Improved schemes for visual cryptography. Designs, Codes and Cryptography 24, 3 (2001), 255–278.
[3]
Chin-Chen Chang, Yi-Pei Hsieh, and Chia-Hsuan Lin. 2008. Sharing secrets in stego images with authentication. Pattern Recognition 41, 10 (2008), 3130–3137.
[4]
Ming Sun Fu and Oscar C. Au. 2002. Data hiding watermarking for halftone images. IEEE Transactions on Image Processing 11, 4 (2002), 477–484.
[5]
Xingxing Jia, Daoshun Wang, Daxin Nie, and Chaoyang Zhang. 2018. Collaborative visual cryptography schemes. IEEE Transactions on Circuits and Systems for Video Technology 28, 5 (2018), 1056–1070.
[6]
Daniel L. Lau and Gonzalo R. Arce. 2018. Modern Digital Halftoning. CRC Press.
[7]
Peng Li, Jianfeng Ma, and Quan Ma. 2020. (t, k, n) XOR-based visual cryptography scheme with essential shadows. Journal of Visual Communication and Image Representation 72 (2020), 102911.
[8]
Peng Li, Pei-Jun Ma, Xiao-Hong Su, and Ching-Nung Yang. 2012. Improvements of a two-in-one image secret sharing scheme based on gray mixing model. Journal of Visual Communication and Image Representation 23, 3 (2012), 441–453.
[9]
Peng Li, Ching-Nung Yang, and Qian Kong. 2018. A novel two-in-one image secret sharing scheme based on perfect black visual cryptography. Journal of Real-Time Image Processing 14, 1 (2018), 41–50.
[10]
Peng Li, Ching-Nung Yang, Qian Kong, Yanpeng Ma, and Zheng Liu. 2013. Sharing more information in gray visual cryptography scheme. Journal of Visual Communication and Image Representation 24, 8 (2013), 1380–1393.
[11]
Peng Li, Ching-Nung Yang, Chih-Cheng Wu, Qian Kong, and Yanpeng Ma. 2013. Essential secret image sharing scheme with different importance of shadows. Journal of Visual Communication and Image Representation 24, 7 (2013), 1106–1114.
[12]
Chang-Chou Lin and Wen-Hsiang Tsai. 2004. Secret image sharing with steganography and authentication. Journal of Systems and software 73, 3 (2004), 405–414.
[13]
Sian-Jheng Lin and Ja-Chen Lin. 2007. VCPSS: A two-in-one two-decoding-options image sharing method combining visual cryptography (VC) and polynomial-style sharing (PSS) approaches. Pattern Recognition 40, 12 (2007), 3652–3666.
[14]
Yanxiao Liu and Chingnung Yang. 2017. Scalable secret image sharing scheme with essential shadows. Signal Processing: Image Communication 58 (2017), 49–55.
[15]
Yanxiao Liu, Chingnung Yang, and Qindong Sun. 2020. Thresholds based image extraction schemes in big data environment in intelligent traffic management. IEEE Transactions on Intelligent Transportation Systems 22, 7 (2020), 3952–3960.
[16]
Zuquan Liu, Guopu Zhu, Yuan-Gen Wang, Jianquan Yang, and Sam Kwong. 2020. A novel (t, s, k, n)-Threshold visual secret sharing scheme based on access structure partition. ACM Transactions on Multimedia Computing, Communications, and Applications 16, 4 (2020), 1–21.
[17]
M. Naor and A. Shamir. 1995. Visual cryptography. Lecture Notes in Computer Science 950, 1 (1995), 1–12.
[18]
A. Shamir. 1979. How to share a secret. Communications of the ACM 22, 11 (1979), 612–613.
[19]
Shyong Jian Shyu and Ming Chiang Chen. 2011. Optimum pixel expansions for threshold visual secret sharing schemes. IEEE Transactions on Information Forensics and Security 6, 3 (2011), 960–969.
[20]
Shyong Jian Shyu and Ming Chiang Chen. 2015. Minimizing pixel expansion in visual cryptographic scheme for general access structures. IEEE Transactions on Circuits and Systems for Video Technology 25, 9 (2015), 1557–1561.
[21]
Chih-Ching Thien and Ja-Chen Lin. 2002. Secret image sharing. Computers & Graphics 26, 5 (2002), 765–770.
[22]
Robert A. Ulichney. 1993. Void-and-cluster method for dither array generation. In Proceedings of the Human Vision, Visual Processing, and Digital Display IV. International Society for Optics and Photonics, 332–343.
[23]
Ran-Zan Wang and Shyong-Jian Shyu. 2007. Scalable secret image sharing. Signal Processing: Image Communication 22, 4 (2007), 363–373.
[24]
X. Wu and W. Sun. 2012. Visual secret sharing for general access structures by random grids. IET Information Security 6, 4 (2012), 299–309.
[25]
X. Wu and W. Sun. 2013. Improving the visual quality of random grid-based visual secret sharing. Signal Processing 93, 5 (2013), 977–995.
[26]
Xiaotian Wu and Ching-Nung Yang. 2019. A combination of color-black-and-white visual cryptography and polynomial based secret image sharing. Journal of Visual Communication and Image Representation 61 (2019), 74–84.
[27]
Xiaotian Wu and Ching-Nung Yang. 2019. Partial reversible AMBTC-based secret image sharing with steganography. Digital Signal Processing 93 (2019), 22–33.
[28]
Xiaotian Wu, Ching-Nung Yang, and Yi-Yun Yang. 2020. Sharing and hiding a secret image in color palette images with authentication. Multimedia Tools and Applications 79, 35 (2020), 25657–25677.
[29]
Xuehu Yan, Lintao Liu, Longlong Li, and Yuliang Lu. 2021. Robust secret image sharing resistant to noise in shares. ACM Transactions on Multimedia Computing, Communications, and Applications 17, 1 (2021), 1–22.
[30]
Xuehu Yan, Yuliang Lu, and Lintao Liu. 2019. A general progressive secret image sharing construction method. Signal Processing: Image Communication 71 (2019), 66–75.
[31]
Xuehu Yan, Yuliang Lu, Ching-nung Yang, Xinpeng Zhang, and Shudong Wang. 2020. A common method of share authentication in image secret sharing. IEEE Transactions on Circuits and Systems for Video Technology 31, 7 (2020), 2896–2908.
[32]
C. N. Yang. 2004. New visual secret sharing schemes using probabilistic method. Pattern Recognition Letters 25, 4 (2004), 486–494.
[33]
C. N. Yang, T. S. Chen, K. H. Yu, and C. C. Wang. 2007. Improvements of image sharing with steganography and authentication. Journal of Systems and Software 80, 7 (2007), 1070–1076.
[34]
Ching-Nung Yang, Cheng-Hua Chen, and Song-Ruei Cai. 2016. Enhanced boolean-based multi secret image sharing scheme. Journal of Systems and Software 116 (2016), 22–34.
[35]
Ching-Nung Yang and Chuei-Bang Ciou. 2010. Image secret sharing method with two-decoding-options: Lossless recovery and previewing capability. Image and Vision Computing 28, 12 (2010), 1600–1610.
[36]
Ching-Nung Yang and Sin-Ming Huang. 2010. Constructions and properties of k out of n scalable secret image sharing. Optics Communications 283, 9 (2010), 1750–1762.
[37]
Ching-Nung Yang, Jin-Fwu Ouyang, and Lein Harn. 2012. Steganography and authentication in image sharing without parity bits. Optics Communications 285, 7 (2012), 1725–1735.
[38]
Ching-Nung Yang and Yi-Yun Yang. 2020. On the analysis and design of visual cryptography with error correcting capability. IEEE Transactions on Circuits and Systems for Video Technology 31, 6 (2020), 2465–2479.
[39]
Jamal Zarepour-Ahmadabadi, MohammadEbrahim Shiri Ahmadabadi, and AliMohammad Latif. 2016. An adaptive secret image sharing with a new bitwise steganographic property. Information Sciences 369 (2016), 467–480.

Cited By

View all

Index Terms

  1. Boolean-based Two-in-One Secret Image Sharing by Adaptive Pixel Grouping

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Transactions on Multimedia Computing, Communications, and Applications
      ACM Transactions on Multimedia Computing, Communications, and Applications  Volume 19, Issue 1
      January 2023
      505 pages
      ISSN:1551-6857
      EISSN:1551-6865
      DOI:10.1145/3572858
      • Editor:
      • Abdulmotaleb El Saddik
      Issue’s Table of Contents

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 05 January 2023
      Online AM: 18 February 2022
      Accepted: 05 February 2022
      Revised: 05 November 2021
      Received: 29 April 2021
      Published in TOMM Volume 19, Issue 1

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. Secret sharing
      2. secret image sharing
      3. visual cryptography
      4. Boolean operation

      Qualifiers

      • Research-article
      • Refereed

      Funding Sources

      • National Natural Science Foundation of China
      • Guangdong Basic and Applied Basic Research Foundation

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)88
      • Downloads (Last 6 weeks)3
      Reflects downloads up to 07 Nov 2024

      Other Metrics

      Citations

      Cited By

      View all

      View Options

      Get Access

      Login options

      Full Access

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Full Text

      View this article in Full Text.

      Full Text

      HTML Format

      View this article in HTML Format.

      HTML Format

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media