Abstract
With the expansion of network bandwidth and the rise of social networks, image sharing on open networks has become a trend. The ensuing privacy leakage events have aroused widespread concerns. Therefore, image sharing that protects privacy is desired. Progressive Secret Image Sharing (PSIS), a multilevel privacy protection technology for images, offers a promising solution. However, the progressivity of the majority of PSIS schemes depends on the preprocessing of a secret image, which increases the calculation costs. In addition, a block-based PSIS may have information leakage security risks when processing highly confidential images. Many existing PSIS schemes use a single operation to share secret images, which makes the schemes inflexible and limits the application scenarios. Therefore, we propose a PSIS based on Boolean operations and Polynomial interpolations (PSIS-BP). The proposed scheme divides the bit-plane of the pixel into two parts. One part is utilized to perform the Boolean operation, and the other part is used to perform the polynomial interpolation. Different assignment strategies can produce different progressive reconstruction levels and expand the application scenarios of the scheme. Theoretical analyses and experimental results demonstrate that the proposed scheme is secure, low-cost, and flexible.
Similar content being viewed by others
Data Availability
The images analysed during the current study are available in the USC-SIPI repository at https://sipi.usc.edu/database.
References
Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)
Blakley, GR.: Safeguarding cryptographic keys. In Managing requirements knowledge, international workshop on 1979 (pp. 313–313). IEEE Computer Society 1 Dec 1979
Subramanian, N., Elharrouss, O., Al-Maadeed, S., et al.: Image steganography: a review of the recent advances. IEEE access 9, 23409–23423 (2021)
Xie, D., Wu, B., Chen, F., et al.: A low-overhead compressed sensing-driven multi-party secret image sharing scheme. Multimedia Syst. 29(3), 1187–1202 (2023)
Thien, C.C., Lin, J.C.: Secret image sharing. Comput. Graph. 26(5), 765–770 (2002)
Liu, Z., Zhu, G., Zhang, Y., et al.: An efficient cheating-detectable secret image sharing scheme with smaller share sizes. J. Inf. Secur. Appl. 81, 103709 (2024)
Naor M, Shamir, A.: Visual cryptography. In advances in cryptology—EUROCRYPT'94: Workshop on the theory and application of cryptographic techniques Perugia, Italy, May 9–12, 1994 Proceedings 13 1995 (pp. 1-12). Springer Berlin Heidelberg
Fu Z, Li X, Fang L, et al.: Security issues in visual cryptography scheme with known random number sequence. J. King Saud Univ.Comput. Inf. Sci. 36(1), 101983 (2024)
Lin, Y.R., Juan, J.S.T.: RG-Based (k, n)-threshold visual cryptography with abilities of OR and XOR Decryption. Eng. Proc. 55(1), 65 (2023)
Francis, N., Monoth, T.: Security enhanced random grid visual cryptography scheme using master share and embedding method. Int. J. Inf. Technol. 15(7), 3949–3955 (2023)
Yan, X., Lu, Y., Liu, L., Wan, S., Ding, W., Liu, H.: Exploiting the homomorphic property of visual cryptography. Int. J. Digit. Crime Forensics (IJDCF) 9(2), 45–56 (2017)
Salman, L.A., Hashim, A.T., Hasan, A.M.: Selective medical image encryption using polynomial-based secret image sharing and chaotic map. Int. J. Saf. Secur. Eng 12, 357–369 (2022)
Wang, Y., Chen, J., Gong, Q., et al.: Weighted polynomial-based secret image sharing scheme with lossless recovery. Secur. Commun. Netw. 2021, 1–11 (2021)
Harn, L., Hsu, C.F., Xia, Z.: A novel threshold changeable secret sharing scheme. Front Comput Sci 16(1), 161807 (2022)
Wen, W., Jian, Y., Fang, Y., Zhang, Y., Qiu, B.: Authenticable medical image-sharing scheme based on embedded small shadow QR code and blockchain framework. Multimed. Syst. 29, 831–845 (2023)
Hou, Y.C., Quan, Z.Y., Tsai, C.F., Tseng, A.Y.: Block-based progressive visual secret sharing. Inf. Sci. 233, 290–304 (2013)
CN Yang, YC Lin, CC Wu,: Cheating immune block-based progressive visual cryptography. In: International Workshop on Digital Watermarking. Springer, 95–108 (2013)
Yang, C.N., Lin, Y.C., Li, P.: Cheating immune k-out-of-n block-based progressive visual cryptography. J. Inf. Secur. Appl. 55, 102660 (2020)
Sridhar S, Sudha, GF.: Improving quality of friendly progressive visual secret sharing using essential shares. In: 2020 International Conference on Communication and Signal Processing (ICCSP) 0282–0285 Jul 28 (2020)
Yan, X.H., Lu, Y.L.: Progressive visual secret sharing for general access structure with multiple decryptions. Multimed. Tools Appl. 77(2), 2653–2672 (2018)
Sridhar, S., Sudha, G.F.: Two in one image secret sharing scheme (TiOISSS) for extended progressive visual cryptography using simple modular arithmetic operations. J. Vis. Commun. Image Represent. 1(74), 102996 (2021)
Wang, R.Z., Shyu, S.J.: Scalable secret image sharing. Signal Process. Image Commun. 22(4), 363–373 (2007)
Guo, Y., Ma, Z., Zhao, M.: Polynomial based progressive secret image sharing scheme with smaller shadow size. IEEE Access 7, 73782–73789 (2019)
Liu, Y.X., Yang, C.Y., Yeh, P.H.: Reducing shadow size in smooth scalable secret image sharing. Secure. Commun. Netw. 7(12), 2237–2244 (2014)
Zhang, L., Zheng, X., Yu, K., Li, W., Wang, T., Dang, X., Yang, B.: Modular-based secret image sharing in internet of things: a global progressive-enabled approach. Concurr. Comput. Pract. Exp. 34(16), e6000 (2022)
Yan, X., Lu, Y., Liu, L.: A general progressive secret image sharing construction method. Signal Process. Image Commun. 71, 66–75 (2019)
Lin, C.S., Chen, C.C., Chen, Y.C.: XOR-based progressively secret image sharing. Mathematics 9, 612 (2021)
Yang, C.N., Chen, T.S., Yu, K.H., Wang, C.C.: Improvements of image sharing with steganography and authentication. J. Syst. Softw. 80(7), 1070–1076 (2007)
Hu, W., Wu, T., Chen, Y., Shen, Y., Yuan, L.: A lossless secret image sharing scheme using a larger finite field. Multimed. Tools Appl. 80(19), 28731–28743 (2021)
Liu, Y.X., Yang, C.N., Wu, S.Y., Chou, Y.S.: Progressive (k, n) secret image sharing schemes based on boolean operations and covering codes. Signal Process. Image Commun. 66, 77–86 (2018)
Funding
This work was supported by the Collaborative Innovation Center of Atmospheric Environment and Equipment Technology (CICAEET) fund, China.
Author information
Authors and Affiliations
Contributions
Hao Chen: Investigation; Software; Data Curation; Writing- Original Draft. Lizhi Xiong: Conceptualization; Supervision; Writing-Review. Ching-Nung Yang: Validation; Writing- Review.
Corresponding authors
Ethics declarations
Conflict of interest
The authors declare no conflict of interest.
Additional information
Communicated by Mu Mu.
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Chen, H., Xiong, L. & Yang, CN. Progressive secret image sharing based on Boolean operations and polynomial interpolations. Multimedia Systems 30, 189 (2024). https://doi.org/10.1007/s00530-024-01393-x
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s00530-024-01393-x