iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://doi.org/10.1007/s00530-024-01393-x
Progressive secret image sharing based on Boolean operations and polynomial interpolations | Multimedia Systems Skip to main content
Log in

Progressive secret image sharing based on Boolean operations and polynomial interpolations

  • Regular Paper
  • Published:
Multimedia Systems Aims and scope Submit manuscript

Abstract

With the expansion of network bandwidth and the rise of social networks, image sharing on open networks has become a trend. The ensuing privacy leakage events have aroused widespread concerns. Therefore, image sharing that protects privacy is desired. Progressive Secret Image Sharing (PSIS), a multilevel privacy protection technology for images, offers a promising solution. However, the progressivity of the majority of PSIS schemes depends on the preprocessing of a secret image, which increases the calculation costs. In addition, a block-based PSIS may have information leakage security risks when processing highly confidential images. Many existing PSIS schemes use a single operation to share secret images, which makes the schemes inflexible and limits the application scenarios. Therefore, we propose a PSIS based on Boolean operations and Polynomial interpolations (PSIS-BP). The proposed scheme divides the bit-plane of the pixel into two parts. One part is utilized to perform the Boolean operation, and the other part is used to perform the polynomial interpolation. Different assignment strategies can produce different progressive reconstruction levels and expand the application scenarios of the scheme. Theoretical analyses and experimental results demonstrate that the proposed scheme is secure, low-cost, and flexible.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

Data Availability

The images analysed during the current study are available in the USC-SIPI repository at https://sipi.usc.edu/database.

References

  1. Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)

    Article  MathSciNet  Google Scholar 

  2. Blakley, GR.: Safeguarding cryptographic keys. In Managing requirements knowledge, international workshop on 1979 (pp. 313–313). IEEE Computer Society 1 Dec 1979

  3. Subramanian, N., Elharrouss, O., Al-Maadeed, S., et al.: Image steganography: a review of the recent advances. IEEE access 9, 23409–23423 (2021)

    Article  Google Scholar 

  4. Xie, D., Wu, B., Chen, F., et al.: A low-overhead compressed sensing-driven multi-party secret image sharing scheme. Multimedia Syst. 29(3), 1187–1202 (2023)

    Article  Google Scholar 

  5. Thien, C.C., Lin, J.C.: Secret image sharing. Comput. Graph. 26(5), 765–770 (2002)

    Article  Google Scholar 

  6. Liu, Z., Zhu, G., Zhang, Y., et al.: An efficient cheating-detectable secret image sharing scheme with smaller share sizes. J. Inf. Secur. Appl. 81, 103709 (2024)

    Google Scholar 

  7. Naor M, Shamir, A.: Visual cryptography. In advances in cryptology—EUROCRYPT'94: Workshop on the theory and application of cryptographic techniques Perugia, Italy, May 9–12, 1994 Proceedings 13 1995 (pp. 1-12). Springer Berlin Heidelberg

  8. Fu Z, Li X, Fang L, et al.: Security issues in visual cryptography scheme with known random number sequence. J. King Saud Univ.Comput. Inf. Sci. 36(1), 101983 (2024)

    Google Scholar 

  9. Lin, Y.R., Juan, J.S.T.: RG-Based (k, n)-threshold visual cryptography with abilities of OR and XOR Decryption. Eng. Proc. 55(1), 65 (2023)

    Google Scholar 

  10. Francis, N., Monoth, T.: Security enhanced random grid visual cryptography scheme using master share and embedding method. Int. J. Inf. Technol. 15(7), 3949–3955 (2023)

    Google Scholar 

  11. Yan, X., Lu, Y., Liu, L., Wan, S., Ding, W., Liu, H.: Exploiting the homomorphic property of visual cryptography. Int. J. Digit. Crime Forensics (IJDCF) 9(2), 45–56 (2017)

    Article  Google Scholar 

  12. Salman, L.A., Hashim, A.T., Hasan, A.M.: Selective medical image encryption using polynomial-based secret image sharing and chaotic map. Int. J. Saf. Secur. Eng 12, 357–369 (2022)

    Google Scholar 

  13. Wang, Y., Chen, J., Gong, Q., et al.: Weighted polynomial-based secret image sharing scheme with lossless recovery. Secur. Commun. Netw. 2021, 1–11 (2021)

    Article  Google Scholar 

  14. Harn, L., Hsu, C.F., Xia, Z.: A novel threshold changeable secret sharing scheme. Front Comput Sci 16(1), 161807 (2022)

    Article  Google Scholar 

  15. Wen, W., Jian, Y., Fang, Y., Zhang, Y., Qiu, B.: Authenticable medical image-sharing scheme based on embedded small shadow QR code and blockchain framework. Multimed. Syst. 29, 831–845 (2023)

    Article  Google Scholar 

  16. Hou, Y.C., Quan, Z.Y., Tsai, C.F., Tseng, A.Y.: Block-based progressive visual secret sharing. Inf. Sci. 233, 290–304 (2013)

    Article  Google Scholar 

  17. CN Yang, YC Lin, CC Wu,: Cheating immune block-based progressive visual cryptography. In: International Workshop on Digital Watermarking. Springer, 95–108 (2013)

  18. Yang, C.N., Lin, Y.C., Li, P.: Cheating immune k-out-of-n block-based progressive visual cryptography. J. Inf. Secur. Appl. 55, 102660 (2020)

    Google Scholar 

  19. Sridhar S, Sudha, GF.: Improving quality of friendly progressive visual secret sharing using essential shares. In: 2020 International Conference on Communication and Signal Processing (ICCSP) 0282–0285 Jul 28 (2020)

  20. Yan, X.H., Lu, Y.L.: Progressive visual secret sharing for general access structure with multiple decryptions. Multimed. Tools Appl. 77(2), 2653–2672 (2018)

    Article  Google Scholar 

  21. Sridhar, S., Sudha, G.F.: Two in one image secret sharing scheme (TiOISSS) for extended progressive visual cryptography using simple modular arithmetic operations. J. Vis. Commun. Image Represent. 1(74), 102996 (2021)

    Article  Google Scholar 

  22. Wang, R.Z., Shyu, S.J.: Scalable secret image sharing. Signal Process. Image Commun. 22(4), 363–373 (2007)

    Article  Google Scholar 

  23. Guo, Y., Ma, Z., Zhao, M.: Polynomial based progressive secret image sharing scheme with smaller shadow size. IEEE Access 7, 73782–73789 (2019)

    Article  Google Scholar 

  24. Liu, Y.X., Yang, C.Y., Yeh, P.H.: Reducing shadow size in smooth scalable secret image sharing. Secure. Commun. Netw. 7(12), 2237–2244 (2014)

    Article  Google Scholar 

  25. Zhang, L., Zheng, X., Yu, K., Li, W., Wang, T., Dang, X., Yang, B.: Modular-based secret image sharing in internet of things: a global progressive-enabled approach. Concurr. Comput. Pract. Exp. 34(16), e6000 (2022)

    Article  Google Scholar 

  26. Yan, X., Lu, Y., Liu, L.: A general progressive secret image sharing construction method. Signal Process. Image Commun. 71, 66–75 (2019)

    Article  Google Scholar 

  27. Lin, C.S., Chen, C.C., Chen, Y.C.: XOR-based progressively secret image sharing. Mathematics 9, 612 (2021)

    Article  Google Scholar 

  28. Yang, C.N., Chen, T.S., Yu, K.H., Wang, C.C.: Improvements of image sharing with steganography and authentication. J. Syst. Softw. 80(7), 1070–1076 (2007)

    Article  Google Scholar 

  29. Hu, W., Wu, T., Chen, Y., Shen, Y., Yuan, L.: A lossless secret image sharing scheme using a larger finite field. Multimed. Tools Appl. 80(19), 28731–28743 (2021)

    Article  Google Scholar 

  30. Liu, Y.X., Yang, C.N., Wu, S.Y., Chou, Y.S.: Progressive (k, n) secret image sharing schemes based on boolean operations and covering codes. Signal Process. Image Commun. 66, 77–86 (2018)

    Article  Google Scholar 

Download references

Funding

This work was supported by the Collaborative Innovation Center of Atmospheric Environment and Equipment  Technology (CICAEET) fund, China.

Author information

Authors and Affiliations

Authors

Contributions

Hao Chen: Investigation; Software; Data Curation; Writing- Original Draft. Lizhi Xiong: Conceptualization; Supervision; Writing-Review. Ching-Nung Yang: Validation; Writing- Review.

Corresponding authors

Correspondence to Lizhi Xiong or Ching-Nung Yang.

Ethics declarations

Conflict of interest

The authors declare no conflict of interest.

Additional information

Communicated by Mu Mu.

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chen, H., Xiong, L. & Yang, CN. Progressive secret image sharing based on Boolean operations and polynomial interpolations. Multimedia Systems 30, 189 (2024). https://doi.org/10.1007/s00530-024-01393-x

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s00530-024-01393-x

Keywords

Navigation