Abstract
Boolean-operation-based secret image sharing (BSIS), which aims to encode a secret image into some shared images and discloses the original secret image later, has drawn more and more attention in academia. Since Chen and Wu pioneer in proposing the Boolean-operation-based multiple secret image sharing (BMSIS) scheme, there more and more BMSIS schemes proposed in the literature. In order to remove the limitation that in the existing BMSIS schemes, this paper presents Boolean-operation-based multiple-secret image sharing with general access structure for secret reconstruction. Compared with the existing related BMSIS schemes with the property of all-or-nothing reconstruction, the proposed scheme achieves a milestone, i.e., secrets can be reconstructed by the pre-defined access structure. Hence, the secret reconstruction no longer needs to collect all share images. Furthermore, distinct combinations of shares have the ability to disclose the secrets defined in the qualified set. The theoretical analysis and the experimental results demonstrate the proposed scheme does work.
Similar content being viewed by others
References
Ni Z, Shi YQ, Ansari N, Su W (2003) Reversible data hiding. Proc IEEE 2003 Int Symp Circuits Syst 2:II–II
Chen TH, Chang TC (2018) On the security of a BTC-based-compression image authentication scheme. Multimed Tools Appl 77(10):12979–12989
Chang V, Ramachandran M (2016) Towards achieving data security with the cloud computing adoption framework. IEEE Trans Serv Comput 9(1):138–151
Qin Z, Xiong H, Wu S, Batamuliza J (2016) A survey of proxy re-encryption for secure data sharing in cloud computing. IEEE Trans Serv Comput. https://doi.org/10.1109/TSC.2016.2551238
Chen TH, Tsao KH (2011) User-friendly random-grid-based visual secret sharing. IEEE Trans Circuits Syst Video Technol 21(11):1693–1703
Naor, M, Shamir A (1994) Visual cryptography. Proceedings of the workshop on the theory and application of cryptographic techniques, pp 1–12
Shyu SJ (2017) XOR-based visual cryptographic schemes with monotonously increasing and flawless reconstruction properties. IEEE Trans Circuits Syst Video Technol. https://doi.org/10.1109/TCSVT.2017.2707923
Zhou Z, Arce GR, Crescenzo GD (2006) Halftone visual cryptography. IEEE Trans Image Process 15(8):2441–2453
Ateniese G, Blundo C, Santis AD, Stinson DR (1996) Visual cryptography for general access structures. Inf Comput 129(2):86–106
Lee KH, Chiu PL (2012) An extended visual cryptography algorithm for general access structures. IEEE Trans Inf Forensics Secur 7(1):219–229
Shyu SJ, Chen MC (2015) Minimizing pixel expansion in visual cryptographic scheme for general access structures. IEEE Trans Circuits Syst Video Technol 25(9):1557–1561
Tsao KH, Shyu SJ, Lin CH, Lee YS, Chen TH (2015) Visual multiple-secret sharing for flexible general access structure by random grids. Displays 39:80–92
Thien CC, Lin JC (2002) Secret image sharing. Comput Graph 26(5):765–770
Ulutas G, Ulutas M, Nabiyev VV (2013) Secret image sharing scheme with adaptive authentication strength. Pattern Recogn Lett 34(3):283–291
Chang CC, Chen YH, Wang HC (2011) Meaningful secret sharing technique with authentication and remedy abilities. Inf Sci 181(14):3073–3084
Guo C, Chang CC, Qin C (2012) A hierarchical threshold secret image sharing. Pattern Recogn Lett 33(1):83–91
Li P, Yang CN, Wu CC, Kong Q, Ma Y (2013) Essential secret image sharing scheme with different importance of shadows. J Vis Commun Image Represent 24:1106–1114
Wang D, Zhang L, Ma N, Li X (2007) Two secret sharing schemes based on Boolean operations. Pattern Recogn 40(10):2776–2785
Chen J, Chen TS, Hsu HC, Chen HW (2005) New visual cryptography system based on circular shadow image and fixed angle segmentation. J Electron Imaging 14(3):0330181–0330185
Shyu SJ, Huang SY, Lee YK, Wang RZ, Chen K (2007) Sharing multiple secrets in visual cryptography. Pattern Recogn 40(12):3633–3651
Wu HC, Chang CC (2005) Sharing visual multi-secrets using circle shares. Comput Stand Interfaces 28(1):123–135
Chen TH, Wu CS (2011) Efficient multi-secret image sharing based on Boolean operations. Signal Process 91(1):90–97
Chen CC, Wu WJ (2014) A secure Boolean-based multi-secret image sharing scheme. J Syst Softw 92:107–114
Chen CC, Wu WJ, Chen JL (2016) Highly efficient and secure multi-secret image sharing scheme. Multimed Tools Appl 75(12):7113–7128
Yang CN, Chen CH, Cai SR (2016) Enhanced Boolean-based multi secret image sharing scheme. J Syst Softw 116:22–34
Fang WP, Lin JC (2007) Universal share for the sharing of multiple images. J Chin Inst Eng 30(4):753–757
Meghrajani YK, Mazumdar HS (2016) Universal share for multi-secret image sharing scheme based on Boolean operation. IEEE Signal Process Lett 23(10):1429–1433
Cryptography Stack Exchange. https://crypto.stackexchange.com/questions/9603/why-should-i-make-my-cipher-public
Shannon CE (1949) Communication theory of secrecy systems. Bell Labs Tech J 28(4):656–715
Acknowledgments
This work was supported in part by the Ministry of Science and Technology of Taiwan under grant MOST 107-2221-E-415 -001 -MY3.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Chen, TH., Wu, XW. Multiple secret image sharing with general access structure. Multimed Tools Appl 79, 13247–13265 (2020). https://doi.org/10.1007/s11042-019-08524-x
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-019-08524-x