Advanced Search
Volume 44 Issue 2
Feb.  2022
Turn off MathJax
Article Contents
GAO Juntao, YUE Hao, CAO Jing. Visual Multi-Secrets Sharing Scheme Based on Random Grid[J]. Journal of Electronics & Information Technology, 2022, 44(2): 573-580. doi: 10.11999/JEIT201093
Citation: GAO Juntao, YUE Hao, CAO Jing. Visual Multi-Secrets Sharing Scheme Based on Random Grid[J]. Journal of Electronics & Information Technology, 2022, 44(2): 573-580. doi: 10.11999/JEIT201093

Visual Multi-Secrets Sharing Scheme Based on Random Grid

doi: 10.11999/JEIT201093
Funds:  The Key Research and Development Program of Shaanxi Province (2021ZDLGY06-04), Guangxi Key Laboratory of Cryptography and Information Security (GCIS201802)
  • Received Date: 2020-12-30
  • Rev Recd Date: 2021-08-14
  • Available Online: 2021-09-09
  • Publish Date: 2022-02-25
  • In order to improve the restoration effect of Visual Secret Sharing (VSS), a visual multi-secret sharing scheme based on random grid is proposed. By using a multi secret image sharing scheme based on random mesh threshold of cylindrical surface, users can share multiple secret images at one time. This scheme has good robustness, so even part of the share images are tampered, the secret image can still be recovered. At the same time, the number of shares has a positive correlation with the visual quality of the final recovered image. Simulation results show that the proposed multi secret vision sharing scheme is two times better than original single secret vision sharing scheme in terms of pixel recovery accuracy, that is, it increases the number of secret images and improves the recovery accuracy.
  • loading
  • [1]
    THIEN C C and LIN J C. Secret image sharing[J]. Computers & Graphics, 2002, 26(5): 765–770. doi: 10.1016/S0097-8493(02)00131-0
    [2]
    WANG Ranzan and SHYU S J. Scalable secret image sharing[J]. Signal Processing:Image Communication, 2007, 22(4): 363–373. doi: 10.1016/j.image.2006.12.012
    [3]
    CHEN T H and WU C S. Efficient multi-secret image sharing based on Boolean operations[J]. Signal Processing, 2011, 91(1): 90–97. doi: 10.1016/j.sigpro.2010.06.012
    [4]
    CHEN C C and WU Weijie. A secure Boolean-based multi-secret image sharing scheme[J]. Journal of Systems and Software, 2014, 92: 107–114. doi: 10.1016/j.jss.2014.01.001
    [5]
    CHEN C C, WU Weijie, and CHEN Junlong. Highly efficient and secure multi-secret image sharing scheme[J]. Multimedia Tools and Applications, 2016, 75(12): 7113–7128. doi: 10.1007/s11042-015-2634-1
    [6]
    TAN Longdan, LU Yuliang, YAN Xuehu, et al. Weighted secret image sharing for a (k, n) threshold based on the Chinese remainder theorem[J]. IEEE Access, 2019, 7: 59278–59286. doi: 10.1109/ACCESS.2019.2914515
    [7]
    YAN Xuehu, LU Yuliang, LIU Lintao, et al. Secret image sharing for (k, k) threshold based on Chinese remainder theorem and image characteristics[C]. The 8th Pacific-rim Symposium on Image and Video Technology, Wuhan, China, 2017: 174–181.
    [8]
    YAN Xuehu, LU Yuliang, LIU Lintao, et al. Chinese remainder theorem-based secret image sharing for (k, n) threshold[C]. The 3rd International Conference on Cloud Computing and Security, Nanjing, China, 2017: 433–440.
    [9]
    郭钰生. 两个秘密共享方案的构造[D]. [硕士论文], 兰州大学, 2020.

    GUO Yusheng. The construction of two secret sharing schemes[D]. [Master dissertation], Lanzhou University, 2020.
    [10]
    WANG Zhihui, DI Yafeng, LI Jianjun, et al. Progressive secret image sharing scheme using meaningful shadows[J]. Security and Communication Networks, 2016, 9(17): 4075–4088. doi: 10.1002/sec.1589
    [11]
    乐志芳. GF有限域拉格朗日插值多项式图像分存方法研究[D]. [硕士论文], 陕西师范大学, 2018.

    LE Zhifang. Research on image sharing method of Lagrange interpolation polynomial based on GF Galois field[D]. [Master dissertation], Shaanxi Normal University, 2018.
    [12]
    张亚泽. 图像秘密共享技术在信息保护中的应用研究[D]. [硕士论文], 西安理工大学, 2020.

    ZHANG Yaze. Research on application of image secret sharing technology in information protection[D]. [Master dissertation], Xi’an University of Technology, 2020.
    [13]
    刘思佳. 基于QR码的图像分存方案研究与设计[D]. [硕士论文], 战略支援部队信息工程大学, 2019.

    LIU Sijia. Research on design of secret image sharing scheme based on QR codes[D]. [Master dissertation], Information Engineering University, 2019.
    [14]
    NAOR M and SHAMIR A. Visual cryptography[C]. Workshop on the Theory and Application of Cryptographic Techniques, Perugia, Italy, 1995: 1–12. doi: 10.1007/BFb0053419.
    [15]
    KAFRI O and KEREN E. Encryption of pictures and shapes by random grids[J]. Optics Letters, 1987, 12(6): 377–379. doi: 10.1364/OL.12.000377
    [16]
    CHEN T H and TSAO K H. Visual secret sharing by random grids revisited[J]. Pattern Recognition, 2009, 42(9): 2203–2217. doi: 10.1016/j.patcog.2008.11.015
    [17]
    CHEN T H and TSAO K H. Threshold visual secret sharing by random grids[J]. Journal of Systems and Software, 2011, 84(7): 1197–1208. doi: 10.1016/j.jss.2011.02.023
    [18]
    CHEN T H, LEE Y S, HUANG Weilun, et al. Quality-adaptive visual secret sharing by random grids[J]. Journal of Systems and Software, 2013, 86(5): 1267–1274. doi: 10.1016/j.jss.2012.12.022
    [19]
    SALEHI S and BALAFAR M A. Visual multi secret sharing by cylindrical random grid[J]. Journal of Information Security and Applications, 2014, 19(3): 245–255. doi: 10.1016/j.jisa.2014.05.003
    [20]
    SUPRAJA A and KUMAR K A. Analysis on hybrid approach for (k, n) secret sharing in visual cryptography[C]. 2019 International Conference on Data Science and Communication, Bangalore, India, 2019: 1–6.
    [21]
    BHOSALE A G and PATIL V S. A (2, 2) visual cryptography technique to share two secrets[C]. 2020 International Conference on Inventive Computation Technologies (ICICT), Coimbatore, India, 2020: 563–569.
    [22]
    LIU Wenjie, XU Yinsong, ZHANG Maojun, et al. A novel quantum visual secret sharing scheme[J]. IEEE Access, 2019, 7: 114374–114384. doi: 10.1109/ACCESS.2019.2931073
    [23]
    CHEN T H, TSAO K H, and WEI Kuochen. Multiple-image encryption by rotating random grids[C]. 2008 Eighth International Conference on Intelligent Systems Design and Applications, Kaohsuing, China, 2008: 252–256.
    [24]
    CHEN T H, TSAO K H, and WU C S. Multi-secrets visual secret sharing[C]. The 14th Asia-Pacific Conference on Communications, Akihabara, Japan, 2008: 1–5.
    [25]
    SHYU S J. Image encryption by random grids[J]. Pattern Recognition, 2007, 40(3): 1014–1031. doi: 10.1016/j.patcog.2006.02.025
    [26]
    CHANG J J Y, LI M J, WANG Yichun, et al. Two-image encryption by random grids[C]. 2010 10th International Symposium on Communications and Information Technologies, Tokyo, Japan, 2010: 458–463. doi: 10.1109/ISCIT.2010.5664885.
    [27]
    PRASETYO H, ROSIYADI D, and HORNG S J. Modified generalized random grids-based progressive secret sharing with lossless ability for binary image[C]. International Conference on Computer, Control, Informatics and its Applications, Tangerang, Indonesia, 2018: 181–186.
    [28]
    CHAO H C and FAN T Y. XOR-based progressive visual secret sharing using generalized random grids[J]. Displays, 2017, 49: 6–15. doi: 10.1016/j.displa.2017.05.004
    [29]
    HOU Y C, WEI S C, and LIN C Y. Random-grid-based visual cryptography schemes[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2014, 24(5): 733–744. doi: 10.1109/TCSVT.2013.2280097
    [30]
    SRIDHAR S and SUDHA G F. Improving quality of friendly progressive visual secret sharing using essential shares[C]. 2020 International Conference on Communication and Signal Processing (ICCSP), Chennai, India, 2020: 282–285.
    [31]
    FAN T Y and CHAO H C. User-friendly XOR-based visual secret sharing by random grid[J]. IET Information Security, 2018, 12(5): 398–403. doi: 10.1049/iet-ifs.2017.0546
    [32]
    KUKREJA S and KASANA G. A secure reversible data hiding scheme for digital images using random grid visual secret sharing[C]. Amity International Conference on Artificial Intelligence, Dubai, United Arab Emirates, 2019: 864–869.
    [33]
    乔明秋, 赵振洲. 可变可视密码[J]. 密码学报, 2020, 7(1): 48–55. doi: 10.13868/j.cnki.jcr.000348

    QIAO Mingqiu and ZHAO Zhenzhou. Variable visual cryptography[J]. Journal of Cryptologic Research, 2020, 7(1): 48–55. doi: 10.13868/j.cnki.jcr.000348
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(8)  / Tables(2)

    Article Metrics

    Article views (1218) PDF downloads(129) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return