Skip to main content
Log in

Multiple secret image sharing with general access structure

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Boolean-operation-based secret image sharing (BSIS), which aims to encode a secret image into some shared images and discloses the original secret image later, has drawn more and more attention in academia. Since Chen and Wu pioneer in proposing the Boolean-operation-based multiple secret image sharing (BMSIS) scheme, there more and more BMSIS schemes proposed in the literature. In order to remove the limitation that in the existing BMSIS schemes, this paper presents Boolean-operation-based multiple-secret image sharing with general access structure for secret reconstruction. Compared with the existing related BMSIS schemes with the property of all-or-nothing reconstruction, the proposed scheme achieves a milestone, i.e., secrets can be reconstructed by the pre-defined access structure. Hence, the secret reconstruction no longer needs to collect all share images. Furthermore, distinct combinations of shares have the ability to disclose the secrets defined in the qualified set. The theoretical analysis and the experimental results demonstrate the proposed scheme does work.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2.
Fig. 3.
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Ni Z, Shi YQ, Ansari N, Su W (2003) Reversible data hiding. Proc IEEE 2003 Int Symp Circuits Syst 2:II–II

    Google Scholar 

  2. Chen TH, Chang TC (2018) On the security of a BTC-based-compression image authentication scheme. Multimed Tools Appl 77(10):12979–12989

    Article  Google Scholar 

  3. Chang V, Ramachandran M (2016) Towards achieving data security with the cloud computing adoption framework. IEEE Trans Serv Comput 9(1):138–151

    Article  Google Scholar 

  4. Qin Z, Xiong H, Wu S, Batamuliza J (2016) A survey of proxy re-encryption for secure data sharing in cloud computing. IEEE Trans Serv Comput. https://doi.org/10.1109/TSC.2016.2551238

  5. Chen TH, Tsao KH (2011) User-friendly random-grid-based visual secret sharing. IEEE Trans Circuits Syst Video Technol 21(11):1693–1703

    Article  Google Scholar 

  6. Naor, M, Shamir A (1994) Visual cryptography. Proceedings of the workshop on the theory and application of cryptographic techniques, pp 1–12

    Google Scholar 

  7. Shyu SJ (2017) XOR-based visual cryptographic schemes with monotonously increasing and flawless reconstruction properties. IEEE Trans Circuits Syst Video Technol. https://doi.org/10.1109/TCSVT.2017.2707923

    Article  Google Scholar 

  8. Zhou Z, Arce GR, Crescenzo GD (2006) Halftone visual cryptography. IEEE Trans Image Process 15(8):2441–2453

    Article  Google Scholar 

  9. Ateniese G, Blundo C, Santis AD, Stinson DR (1996) Visual cryptography for general access structures. Inf Comput 129(2):86–106

    Article  MathSciNet  Google Scholar 

  10. Lee KH, Chiu PL (2012) An extended visual cryptography algorithm for general access structures. IEEE Trans Inf Forensics Secur 7(1):219–229

    Article  Google Scholar 

  11. Shyu SJ, Chen MC (2015) Minimizing pixel expansion in visual cryptographic scheme for general access structures. IEEE Trans Circuits Syst Video Technol 25(9):1557–1561

    Article  Google Scholar 

  12. Tsao KH, Shyu SJ, Lin CH, Lee YS, Chen TH (2015) Visual multiple-secret sharing for flexible general access structure by random grids. Displays 39:80–92

    Article  Google Scholar 

  13. Thien CC, Lin JC (2002) Secret image sharing. Comput Graph 26(5):765–770

    Article  Google Scholar 

  14. Ulutas G, Ulutas M, Nabiyev VV (2013) Secret image sharing scheme with adaptive authentication strength. Pattern Recogn Lett 34(3):283–291

    Article  Google Scholar 

  15. Chang CC, Chen YH, Wang HC (2011) Meaningful secret sharing technique with authentication and remedy abilities. Inf Sci 181(14):3073–3084

    Article  MathSciNet  Google Scholar 

  16. Guo C, Chang CC, Qin C (2012) A hierarchical threshold secret image sharing. Pattern Recogn Lett 33(1):83–91

    Article  Google Scholar 

  17. Li P, Yang CN, Wu CC, Kong Q, Ma Y (2013) Essential secret image sharing scheme with different importance of shadows. J Vis Commun Image Represent 24:1106–1114

    Article  Google Scholar 

  18. Wang D, Zhang L, Ma N, Li X (2007) Two secret sharing schemes based on Boolean operations. Pattern Recogn 40(10):2776–2785

    Article  Google Scholar 

  19. Chen J, Chen TS, Hsu HC, Chen HW (2005) New visual cryptography system based on circular shadow image and fixed angle segmentation. J Electron Imaging 14(3):0330181–0330185

    Article  Google Scholar 

  20. Shyu SJ, Huang SY, Lee YK, Wang RZ, Chen K (2007) Sharing multiple secrets in visual cryptography. Pattern Recogn 40(12):3633–3651

    Article  Google Scholar 

  21. Wu HC, Chang CC (2005) Sharing visual multi-secrets using circle shares. Comput Stand Interfaces 28(1):123–135

    Article  Google Scholar 

  22. Chen TH, Wu CS (2011) Efficient multi-secret image sharing based on Boolean operations. Signal Process 91(1):90–97

    Article  Google Scholar 

  23. Chen CC, Wu WJ (2014) A secure Boolean-based multi-secret image sharing scheme. J Syst Softw 92:107–114

    Article  Google Scholar 

  24. Chen CC, Wu WJ, Chen JL (2016) Highly efficient and secure multi-secret image sharing scheme. Multimed Tools Appl 75(12):7113–7128

    Article  Google Scholar 

  25. Yang CN, Chen CH, Cai SR (2016) Enhanced Boolean-based multi secret image sharing scheme. J Syst Softw 116:22–34

    Article  Google Scholar 

  26. Fang WP, Lin JC (2007) Universal share for the sharing of multiple images. J Chin Inst Eng 30(4):753–757

    Article  Google Scholar 

  27. Meghrajani YK, Mazumdar HS (2016) Universal share for multi-secret image sharing scheme based on Boolean operation. IEEE Signal Process Lett 23(10):1429–1433

    Article  Google Scholar 

  28. Cryptography Stack Exchange. https://crypto.stackexchange.com/questions/9603/why-should-i-make-my-cipher-public

  29. Shannon CE (1949) Communication theory of secrecy systems. Bell Labs Tech J 28(4):656–715

    Article  MathSciNet  Google Scholar 

Download references

Acknowledgments

This work was supported in part by the Ministry of Science and Technology of Taiwan under grant MOST 107-2221-E-415 -001 -MY3.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tzung-Her Chen.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chen, TH., Wu, XW. Multiple secret image sharing with general access structure. Multimed Tools Appl 79, 13247–13265 (2020). https://doi.org/10.1007/s11042-019-08524-x

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-019-08524-x

Keywords

Navigation